Siemens SINEMA Remote Connect Server 3.0

CPE Details

Siemens SINEMA Remote Connect Server 3.0
3.0
2021-03-15
22h28 +00:00
2021-05-19
15h19 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:siemens:sinema_remote_connect_server:3.0:*:*:*:*:*:*:*

Informations

Vendor

siemens

Product

sinema_remote_connect_server

Version

3.0

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2024-42345 2024-09-10
09h36 +00:00
A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.2 SP2). The affected application does not properly handle user session establishment and invalidation. This could allow a remote attacker to circumvent the additional multi factor authentication for user session establishment.
5.3
Medium
CVE-2024-39876 2024-07-09
12h05 +00:00
A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.2 SP1). Affected applications do not properly handle log rotation. This could allow an unauthenticated remote attacker to cause a denial of service condition through resource exhaustion on the device.
5.3
Medium
CVE-2024-39875 2024-07-09
12h05 +00:00
A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.2 SP1). The affected application allows authenticated, low privilege users with the 'Manage own remote connections' permission to retrieve details about other users and group memberships.
5.3
Medium
CVE-2024-39874 2024-07-09
12h05 +00:00
A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.2 SP1). The affected application does not properly implement brute force protection against user credentials in its Client Communication component. This could allow an attacker to learn user credentials that are vulnerable to brute force attacks.
8.7
High
CVE-2024-39873 2024-07-09
12h05 +00:00
A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.2 SP1). The affected application does not properly implement brute force protection against user credentials in its web API. This could allow an attacker to learn user credentials that are vulnerable to brute force attacks.
8.7
High
CVE-2024-39872 2024-07-09
12h05 +00:00
A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.2 SP1). The affected application does not properly assign rights to temporary files created during its update process. This could allow an authenticated attacker with the 'Manage firmware updates' role to escalate their privileges on the underlying OS level.
9.3
Critical
CVE-2024-39871 2024-07-09
12h05 +00:00
A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.2 SP1). Affected applications do not properly separate the rights to edit device settings and to edit settings for communication relations. This could allow an authenticated attacker with the permission to manage devices to gain access to participant groups that the attacked does not belong to.
5.3
Medium
CVE-2024-39870 2024-07-09
12h05 +00:00
A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.2 SP1). The affected applications can be configured to allow users to manage own users. A local authenticated user with this privilege could use this modify users outside of their own scope as well as to escalate privileges.
7.1
High
CVE-2024-39869 2024-07-09
12h05 +00:00
A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.2 SP1). Affected products allow to upload certificates. An authenticated attacker could upload a crafted certificates leading to a permanent denial-of-service situation. In order to recover from such an attack, the offending certificate needs to be removed manually.
7.1
High
CVE-2024-39868 2024-07-09
12h05 +00:00
A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.2 SP1). Affected devices do not properly validate the authentication when performing certain actions in the web interface allowing an unauthenticated attacker to access and edit VxLAN configuration information of networks for which they have no privileges.
7.2
High
CVE-2024-39867 2024-07-09
12h05 +00:00
A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.2 SP1). Affected devices do not properly validate the authentication when performing certain actions in the web interface allowing an unauthenticated attacker to access and edit device configuration information of devices for which they have no privileges.
7.2
High
CVE-2024-39866 2024-07-09
12h05 +00:00
A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.2 SP1). The affected application allows users to upload encrypted backup files. This could allow an attacker with access to the backup encryption key and with the right to upload backup files to create a user with administrative privileges.
8.7
High
CVE-2024-39865 2024-07-09
12h05 +00:00
A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.2 SP1). The affected application allows users to upload encrypted backup files. As part of this backup, files can be restored without correctly checking the path of the restored file. This could allow an attacker with access to the backup encryption key to upload malicious files, that could potentially lead to remote code execution.
8.7
High
CVE-2024-39571 2024-07-09
12h05 +00:00
A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.2 HF1). Affected applications are vulnerable to command injection due to missing server side input sanitation when loading SNMP configurations. This could allow an attacker with the right to modify the SNMP configuration to execute arbitrary code with root privileges.
8.7
High
CVE-2024-39570 2024-07-09
12h05 +00:00
A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.2 HF1). Affected applications are vulnerable to command injection due to missing server side input sanitation when loading VxLAN configurations. This could allow an authenticated attacker to execute arbitrary code with root privileges.
8.7
High
CVE-2022-32257 2024-03-12
10h41 +00:00
A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.2). The affected application consists of a web service that lacks proper access control for some of the endpoints. This could lead to unauthorized access to resources and potentially lead to code execution.
9.8
Critical
CVE-2022-32262 2022-06-14
07h22 +00:00
A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.1). The affected application contains a file upload server that is vulnerable to command injection. An attacker could use this to achieve arbitrary code execution.
9.8
Critical
CVE-2022-32261 2022-06-14
07h22 +00:00
A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.1). The affected application contains a misconfiguration in the APT update. This could allow an attacker to add insecure packages to the application.
7.5
High
CVE-2022-32260 2022-06-14
07h22 +00:00
A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.2 SP1). The affected application creates temporary user credentials for UMC (User Management Component) users. An attacker could use these temporary credentials for authentication bypass in certain scenarios.
9.8
Critical
CVE-2022-32259 2022-06-14
07h22 +00:00
A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.1). The system images for installation or update of the affected application contain unit test scripts with sensitive information. An attacker could gain information about testing architecture and also tamper with test configuration.
6.5
Medium
CVE-2022-32258 2022-06-14
07h22 +00:00
A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.1). The affected application contains an older feature that allows to import device configurations via a specific endpoint. An attacker could use this vulnerability for information disclosure.
7.5
High
CVE-2022-32256 2022-06-14
07h22 +00:00
A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.1). The affected application consists of a web service that lacks proper access control for some of the endpoints. This could lead to low privileged users accessing privileged information.
6.5
Medium
CVE-2022-32255 2022-06-14
07h22 +00:00
A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.1). The affected application consists of a web service that lacks proper access control for some of the endpoints. This could lead to unauthorized access to limited information.
5.3
Medium
CVE-2022-32254 2022-06-14
07h22 +00:00
A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.1). A customized HTTP POST request could force the application to write the status of a given user to a log file, exposing sensitive user information that could provide valuable guidance to an attacker.
7.5
High
CVE-2022-32253 2022-06-14
07h22 +00:00
A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.1). Due to improper input validation, the OpenSSL certificate's password could be printed to a file reachable by an attacker.
7.5
High
CVE-2022-32252 2022-06-14
07h22 +00:00
A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.1). The application does not perform the integrity check of the update packages. Without validation, an admin user might be tricked to install a malicious package, granting root privileges to an attacker.
7.8
High
CVE-2022-32251 2022-06-14
07h22 +00:00
A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.1). There is a missing authentication verification for a resource used to change the roles and permissions of a user. This could allow an attacker to change the permissions of any user and gain the privileges of an administrative user.
9.8
Critical
CVE-2022-29034 2022-06-14
07h21 +00:00
A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.1). An error message pop up window in the web interface of the affected application does not prevent injection of JavaScript code. This could allow attackers to perform reflected cross-site scripting (XSS) attacks.
6.1
Medium
CVE-2022-27221 2022-06-14
07h21 +00:00
A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.1). An attacker in machine-in-the-middle could obtain plaintext secret values by observing length differences during a series of guesses in which a string in an HTTP request URL potentially matches an unknown string in an HTTP response body, aka a "BREACH" attack.
5.9
Medium
CVE-2022-25314 2022-02-18
03h25 +00:00
In Expat (aka libexpat) before 2.4.5, there is an integer overflow in copyString.
7.5
High
CVE-2022-25315 2022-02-18
03h24 +00:00
In Expat (aka libexpat) before 2.4.5, there is an integer overflow in storeRawNames.
9.8
Critical
CVE-2022-25313 2022-02-18
03h23 +00:00
In Expat (aka libexpat) before 2.4.5, an attacker can trigger stack exhaustion in build_model via a large nesting depth in the DTD element.
6.5
Medium
CVE-2022-25235 2022-02-15
23h40 +00:00
xmltok_impl.c in Expat (aka libexpat) before 2.4.5 lacks certain validation of encoding, such as checks for whether a UTF-8 character is valid in a certain context.
9.8
Critical
CVE-2022-25236 2022-02-15
23h39 +00:00
xmlparse.c in Expat (aka libexpat) before 2.4.5 allows attackers to insert namespace-separator characters into namespace URIs.
9.8
Critical
CVE-2022-23990 2022-01-26
17h02 +00:00
Expat (aka libexpat) before 2.4.4 has an integer overflow in the doProlog function.
7.5
High
CVE-2022-23852 2022-01-24
00h06 +00:00
Expat (aka libexpat) before 2.4.4 has a signed integer overflow in XML_GetBuffer, for configurations with a nonzero XML_CONTEXT_BYTES.
9.8
Critical
CVE-2022-22822 2022-01-08
01h57 +00:00
addBinding in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.
9.8
Critical
CVE-2022-22823 2022-01-08
01h57 +00:00
build_model in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.
9.8
Critical
CVE-2022-22824 2022-01-08
01h56 +00:00
defineAttribute in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.
9.8
Critical
CVE-2022-22825 2022-01-08
01h56 +00:00
lookup in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.
8.8
High
CVE-2022-22826 2022-01-08
01h56 +00:00
nextScaffoldPart in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.
8.8
High
CVE-2022-22827 2022-01-08
01h56 +00:00
storeAtts in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.
8.8
High
CVE-2021-46143 2022-01-06
02h48 +00:00
In doProlog in xmlparse.c in Expat (aka libexpat) before 2.4.3, an integer overflow exists for m_groupSize.
8.1
High
CVE-2021-45960 2022-01-01
17h47 +00:00
In Expat (aka libexpat) before 2.4.3, a left shift by 29 (or more) places in the storeAtts function in xmlparse.c can lead to realloc misbehavior (e.g., allocating too few bytes, or only freeing memory).
8.8
High
CVE-2021-40438 2021-09-16
14h40 +00:00
A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier.
9
Critical
CVE-2021-34798 2021-09-16
12h40 +00:00
Malformed requests may cause the server to dereference a NULL pointer. This issue affects Apache HTTP Server 2.4.48 and earlier.
7.5
High
CVE-2021-22924 2021-08-05
18h16 +00:00
libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse, if one of them matches the setup.Due to errors in the logic, the config matching function did not take 'issuercert' into account and it compared the involved paths *case insensitively*,which could lead to libcurl reusing wrong connections.File paths are, or can be, case sensitive on many systems but not all, and caneven vary depending on used file systems.The comparison also didn't include the 'issuer cert' which a transfer can setto qualify how to verify the server certificate.
3.7
Low
CVE-2021-22925 2021-08-04
22h00 +00:00
curl supports the `-t` command line option, known as `CURLOPT_TELNETOPTIONS`in libcurl. This rarely used option is used to send variable=content pairs toTELNET servers.Due to flaw in the option parser for sending `NEW_ENV` variables, libcurlcould be made to pass on uninitialized data from a stack based buffer to theserver. Therefore potentially revealing sensitive internal information to theserver using a clear-text network protocol.This could happen because curl did not call and use sscanf() correctly whenparsing the string provided by the application.
5.3
Medium