Path traversal in SiNVR 3 Central Control Server (CCS) - CVE-2019-18342

 

Path traversal in SiNVR 3 Central Control Server (CCS) - CVE-2019-18342

Published: December 13, 2019


Vulnerability identifier: #VU23604
CSH Severity: High
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:U/U:Amber
CVE-ID: CVE-2019-18342
CWE-ID: CWE-22
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Siemens
Affected software:
SiNVR 3 Central Control Server (CCS)

Detailed vulnerability description

The vulnerability allows a remote attacker to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences in the SFTP service. A remote authenticated attacker can send a specially crafted SFTP request and read arbitrary files on the system.

Note: In conjunction with CVE-2019-18341, an unauthenticated remote attacker with network access to the CCS server can exploit this vulnerability to read or delete arbitrary files, or access other resources on the same server.


How to mitigate CVE-2019-18342

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Sources