First published: Tue Jun 14 2022(Updated: )
A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.1). An attacker in machine-in-the-middle could obtain plaintext secret values by observing length differences during a series of guesses in which a string in an HTTP request URL potentially matches an unknown string in an HTTP response body, aka a "BREACH" attack.
Credit: productcert@siemens.com productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens SINEMA Remote Connect Server | <3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-27221 is medium with a CVSS score of 5.9.
All versions of SINEMA Remote Connect Server prior to V3.1 are affected by CVE-2022-27221.
An attacker in the middle can obtain plaintext secret values by observing length differences during a series of guesses in which a string in an HTTP request URL potentially matches an unknown string.
The Common Weakness Enumeration (CWE) ID associated with CVE-2022-27221 is CWE-203 and CWE-310.
You can find more information about CVE-2022-27221 in the Siemens ProductCERT advisory at https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf.