cnvd-2022-45221
Vulnerability from cnvd
Title
Siemens SINEMA Remote Connect Server用户管理错误漏洞
Description
SINEMA Remote Connect是一个远程网络管理平台,可轻松管理总部、服务技术人员和已安装机器或工厂之间的隧道连接 (VPN)。 Siemens SINEMA Remote Connect Server存在用户管理错误漏洞,该漏洞源于受影响的应用程序会为 UMC(用户管理组件)用户创建临时用户凭据,攻击者可利用该漏洞使用这些临时凭据绕过身份验证。
Severity
Patch Name
Siemens SINEMA Remote Connect Server用户管理错误漏洞的补丁
Patch Description
SINEMA Remote Connect是一个远程网络管理平台,可轻松管理总部、服务技术人员和已安装机器或工厂之间的隧道连接 (VPN)。 Siemens SINEMA Remote Connect Server存在用户管理错误漏洞,该漏洞源于受影响的应用程序会为 UMC(用户管理组件)用户创建临时用户凭据,攻击者可利用该漏洞使用这些临时凭据绕过身份验证。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

厂商已发布了漏洞修复程序,请及时关注更新: https://cert-portal.siemens.com/productcert/html/ssa-484086.html

Reference
https://cert-portal.siemens.com/productcert/html/ssa-484086.html
Impacted products
Name
Siemens SINEMA Remote Connect Server <3.1
Show details on source website


{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2022-32260"
    }
  },
  "description": "SINEMA Remote Connect\u662f\u4e00\u4e2a\u8fdc\u7a0b\u7f51\u7edc\u7ba1\u7406\u5e73\u53f0\uff0c\u53ef\u8f7b\u677e\u7ba1\u7406\u603b\u90e8\u3001\u670d\u52a1\u6280\u672f\u4eba\u5458\u548c\u5df2\u5b89\u88c5\u673a\u5668\u6216\u5de5\u5382\u4e4b\u95f4\u7684\u96a7\u9053\u8fde\u63a5 (VPN)\u3002\n\nSiemens SINEMA Remote Connect Server\u5b58\u5728\u7528\u6237\u7ba1\u7406\u9519\u8bef\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u53d7\u5f71\u54cd\u7684\u5e94\u7528\u7a0b\u5e8f\u4f1a\u4e3a UMC\uff08\u7528\u6237\u7ba1\u7406\u7ec4\u4ef6\uff09\u7528\u6237\u521b\u5efa\u4e34\u65f6\u7528\u6237\u51ed\u636e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u4f7f\u7528\u8fd9\u4e9b\u4e34\u65f6\u51ed\u636e\u7ed5\u8fc7\u8eab\u4efd\u9a8c\u8bc1\u3002",
  "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://cert-portal.siemens.com/productcert/html/ssa-484086.html",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2022-45221",
  "openTime": "2022-06-15",
  "patchDescription": "SINEMA Remote Connect\u662f\u4e00\u4e2a\u8fdc\u7a0b\u7f51\u7edc\u7ba1\u7406\u5e73\u53f0\uff0c\u53ef\u8f7b\u677e\u7ba1\u7406\u603b\u90e8\u3001\u670d\u52a1\u6280\u672f\u4eba\u5458\u548c\u5df2\u5b89\u88c5\u673a\u5668\u6216\u5de5\u5382\u4e4b\u95f4\u7684\u96a7\u9053\u8fde\u63a5 (VPN)\u3002\r\n\r\nSiemens SINEMA Remote Connect Server\u5b58\u5728\u7528\u6237\u7ba1\u7406\u9519\u8bef\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u53d7\u5f71\u54cd\u7684\u5e94\u7528\u7a0b\u5e8f\u4f1a\u4e3a UMC\uff08\u7528\u6237\u7ba1\u7406\u7ec4\u4ef6\uff09\u7528\u6237\u521b\u5efa\u4e34\u65f6\u7528\u6237\u51ed\u636e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u4f7f\u7528\u8fd9\u4e9b\u4e34\u65f6\u51ed\u636e\u7ed5\u8fc7\u8eab\u4efd\u9a8c\u8bc1\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "Siemens SINEMA Remote Connect Server\u7528\u6237\u7ba1\u7406\u9519\u8bef\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": "Siemens SINEMA Remote Connect Server \u003c3.1"
  },
  "referenceLink": "https://cert-portal.siemens.com/productcert/html/ssa-484086.html",
  "serverity": "\u9ad8",
  "submitTime": "2022-06-15",
  "title": "Siemens SINEMA Remote Connect Server\u7528\u6237\u7ba1\u7406\u9519\u8bef\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…