#VU56658 Modification of assumed-immutable data in SINEMA Remote Connect Server


Published: 2021-09-16

Vulnerability identifier: #VU56658

Vulnerability risk: Low

CVSSv3.1: 5.7 [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-37177

CWE-ID: CWE-471

Exploitation vector: Local network

Exploit availability: No

Vulnerable software:
SINEMA Remote Connect Server
Server applications / SCADA systems

Vendor:

Description

The vulnerability allows a remote attacker to bypass certain security restrictions.

The vulnerability exists due to application does not perform validation of the attacker-controlled data, assuming that data is valid and safe. A remote attacker on the local network can manipulate with the status provided by the syslog clients managed by the affected software.

Mitigation
Install updates from vendor's website.

Vulnerable software versions


External links
http://cert-portal.siemens.com/productcert/pdf/ssa-334944.pdf


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability