First published: Tue Jun 14 2022(Updated: )
A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.1). The application does not perform the integrity check of the update packages. Without validation, an admin user might be tricked to install a malicious package, granting root privileges to an attacker.
Credit: productcert@siemens.com productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens SINEMA Remote Connect Server | <3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-32252.
The severity of CVE-2022-32252 is critical with a CVSS score of 7.8.
All versions of Siemens SINEMA Remote Connect Server prior to V3.1 are affected by CVE-2022-32252.
The impact of CVE-2022-32252 is that an attacker could trick an admin user into installing a malicious package, granting root privileges.
Yes, upgrading to version 3.1 or above of Siemens SINEMA Remote Connect Server will fix the vulnerability.