SB2020031127 - Multiple vulnerabilities in Siemens SiNVR 3



SB2020031127 - Multiple vulnerabilities in Siemens SiNVR 3

Published: March 11, 2020

Security Bulletin ID SB2020031127
Severity
High
Patch available
NO
Number of vulnerabilities 10
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

High 20% Medium 60% Low 20%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 10 secuirty vulnerabilities.


1) Path traversal (CVE-ID: CVE-2019-19290)

The vulnerability allows a remote attacker to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences. A remote authenticated attacker can send a specially crafted HTTP request and read arbitrary files on the system.


2) Cleartext storage of sensitive information (CVE-ID: CVE-2019-19291)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to the affected product maintains a log file that stores login credentials in cleartext. A remote authenticated attacker can obtain credentials when the FTP service is enabled.


3) SQL injection (CVE-ID: CVE-2019-19292)

The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.

The vulnerability exists due to insufficient sanitization of user-supplied data in XML-based communication protocol. A remote authenticated attacker can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database.

Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.


4) Cross-site scripting (CVE-ID: CVE-2019-19293)

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.


5) Stored cross-site scripting (CVE-ID: CVE-2019-19294)

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data in several input fields. A remote authenticated attacker can inject and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.


6) Insufficient Logging (CVE-ID: CVE-2019-19295)

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to the affected device does not enforce logging of security-relevant activities in the XML-based communication protocol. A remote authenticated attacker can perform covert actions not visible in the application log.


7) Path traversal (CVE-ID: CVE-2019-19296)

The vulnerability allows a remote attacker to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences in FTP service. A remote authenticated attacker can send a specially crafted HTTP request and read arbitrary files on the system.


8) Path traversal (CVE-ID: CVE-2019-19297)

The vulnerability allows a remote attacker to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences in the streaming service. A remote attacker can send a specially crafted HTTP request and read arbitrary files on the system.


9) Input validation error (CVE-ID: CVE-2019-19298)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can send specially crafted HTTP requests and perform a denial of service (DoS) attack.


10) Cryptographic issues (CVE-ID: CVE-2019-19299)

The vulnerability allows a remote attacker to decrypt the passwords on the system.

The vulnerability exists due to the affected product contains weak cryptography when exposing device passwords. A remote attacker can decrypt the passwords on the target system.


Remediation

Cybersecurity Help is not aware of any official remediation provided by the vendor.