Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2019-18340 (GCVE-0-2019-18340)
Vulnerability from cvelistv5
- CWE-327 - Use of a Broken or Risky Cryptographic Algorithm
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Siemens | Control Center Server (CCS) |
Version: All versions < V1.5.0 |
|||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:54:14.118Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-761617.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-761844.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Control Center Server (CCS)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V1.5.0" } ] }, { "defaultStatus": "unknown", "product": "Control Center Server (CCS)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V1.5.0" } ] }, { "defaultStatus": "unknown", "product": "SiNVR/SiVMS Video Server", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.0.0" } ] }, { "defaultStatus": "unknown", "product": "SiNVR/SiVMS Video Server", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V5.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in Control Center Server (CCS) (All versions \u003c V1.5.0), Control Center Server (CCS) (All versions \u003e= V1.5.0), SiNVR/SiVMS Video Server (All versions \u003c V5.0.0), SiNVR/SiVMS Video Server (All versions \u003e= V5.0.0). Both the SiVMS/SiNVR Video Server and the Control Center Server (CCS) store\nuser and device passwords by applying weak cryptography.\n\nA local attacker could exploit this vulnerability to extract\nthe passwords from the user database and/or the device configuration files\nto conduct further attacks." } ], "metrics": [ { "cvssV3_1": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:F/RL:U/RC:C", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-327", "description": "CWE-327: Use of a Broken or Risky Cryptographic Algorithm", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-09T09:56:14.606Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-761617.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-761844.pdf" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2019-18340", "datePublished": "2019-12-12T19:08:49", "dateReserved": "2019-10-23T00:00:00", "dateUpdated": "2024-08-05T01:54:14.118Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2019-18340\",\"sourceIdentifier\":\"productcert@siemens.com\",\"published\":\"2019-12-12T19:15:20.560\",\"lastModified\":\"2024-11-21T04:33:04.860\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability has been identified in Control Center Server (CCS) (All versions \u003c V1.5.0), Control Center Server (CCS) (All versions \u003e= V1.5.0), SiNVR/SiVMS Video Server (All versions \u003c V5.0.0), SiNVR/SiVMS Video Server (All versions \u003e= V5.0.0). Both the SiVMS/SiNVR Video Server and the Control Center Server (CCS) store\\nuser and device passwords by applying weak cryptography.\\n\\nA local attacker could exploit this vulnerability to extract\\nthe passwords from the user database and/or the device configuration files\\nto conduct further attacks.\"},{\"lang\":\"es\",\"value\":\"Se ha identificado una vulnerabilidad en Central Control Server (CCS) (Todas las versiones anteriores a V1.5.0), Control Center Server (CCS) (Todas las versiones anteriores o iguales a V1.5.0), SiNVR/SiVMS Video Server (Todas las versiones anteriores a V5.0.0). Tanto el servidor de video SiVMS/SiNVR 3 como el Central Control Server (CCS) almacenan las contrase\u00f1as de usuarios y dispositivos mediante una aplicaci\u00f3n de criptograf\u00eda d\u00e9bil. Un atacante local podr\u00eda explotar esta vulnerabilidad para extraer las contrase\u00f1as de la base de datos del usuario y/o los archivos de configuraci\u00f3n del dispositivo para conducir nuevos ataques adicionales.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"productcert@siemens.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6},{\"source\":\"nvd@nist.gov\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":2.1,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"productcert@siemens.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-327\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-327\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:sinvr_3_central_control_server:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16668E9A-2D0A-425E-87F4-18CFC50551D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:sinvr_3_video_server:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F21BB6D-BFE0-4B69-97F2-1A871A390B1E\"}]}]}],\"references\":[{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-761617.pdf\",\"source\":\"productcert@siemens.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-761844.pdf\",\"source\":\"productcert@siemens.com\"},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-761617.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-761844.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
ICSA-21-103-10
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "names": [ "Rapha\u00ebl Rigo" ], "organization": "Airbus Security Lab", "summary": "reporting some of these vulnerabilities to Siemens" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities may allow an attacker to read and write arbitrary files and sensitive data and execute commands and arbitrary code.", "title": "Risk evaluation" }, { "category": "other", "text": "Commercial Facilities", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Germany", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should:", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.\nCISA also provides a section for control systems security recommended practices on the ICS webpage onus-cert.cisa.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on us-cert.cisa.gov in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.\nOrganizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "other", "text": "No known public exploits specifically target these vulnerabilities.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "external", "summary": "SSA-761844: Multiple Vulnerabilities in Control Center Server (CCS) - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-761844.json" }, { "category": "self", "summary": "ICS Advisory ICSA-21-103-10 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2021/icsa-21-103-10.json" }, { "category": "self", "summary": "ICS Advisory ICSA-21-103-10 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-21-103-10" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/ics/tips/ICS-TIP-12-146-01B" }, { "category": "external", "summary": "SSA-761844: Multiple Vulnerabilities in Control Center Server (CCS) - PDF Version", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-761844.pdf" }, { "category": "external", "summary": "SSA-761844: Multiple Vulnerabilities in Control Center Server (CCS) - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/ssa-761844.txt" } ], "title": "Siemens and PKE Control Center Server", "tracking": { "current_release_date": "2021-04-13T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-21-103-10", "initial_release_date": "2021-04-13T00:00:00.000000Z", "revision_history": [ { "date": "2021-04-13T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-21-103-10 Siemens / PKE Control Center Server" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c V1.5.0", "product": { "name": "Control Center Server (CCS)", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "Control Center Server (CCS)" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= V1.5.0", "product": { "name": "Control Center Server (CCS)", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "Control Center Server (CCS)" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-13947", "cwe": { "id": "CWE-317", "name": "Cleartext Storage of Sensitive Information in GUI" }, "notes": [ { "category": "summary", "text": "The user configuration menu in the web interface of the Control Center Server (CCS) transfers user passwords in clear to the client (browser).\n\nAn attacker with administrative privileges for the web interface could be able to read (and not only reset) passwords of other CCS users.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2019-13947 - Control Center Server (CCS)", "url": "https://sivms.cloud/control-center-server-ccs/" }, { "summary": "CVE-2019-13947 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-13947.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-13947" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://sivms.cloud/control-center-server-ccs/" }, { "category": "mitigation", "details": "General (applies to all vulnerabilities listed in this advisory) - Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-18340 - Harden the CCS server to prevent local access by unauthorized users", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-19290, CVE-2019-19293, CVE-2019-19294 - Disable the web interface of CCS if not used. Alternatively, restrict access from localhost only, or only to trusted hosts of CCS administrators. Enable TLS for the web interface of CCS.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-19291 - Disable the FTP service of the CCS", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure Siemens strongly recommends to protect network access to affected products with appropriate mechanisms. It is advised to follow recommended security practices in order to run the devices in a protected IT environment.", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:F/RL:U/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-13947" }, { "cve": "CVE-2019-18337", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "The Control Center Server (CCS) contains an authentication bypass vulnerability in its XML-based communication protocol as provided by default on ports 5444/tcp and 5440/tcp.\n\nA remote attacker with network access to the CCS server could exploit this vulnerability to read the CCS users database, including the passwords of all users in obfuscated cleartext.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2019-18337 - Control Center Server (CCS)", "url": "https://sivms.cloud/control-center-server-ccs/" }, { "summary": "CVE-2019-18337 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-18337.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-18337" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://sivms.cloud/control-center-server-ccs/" }, { "category": "mitigation", "details": "General (applies to all vulnerabilities listed in this advisory) - Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-18340 - Harden the CCS server to prevent local access by unauthorized users", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-19290, CVE-2019-19293, CVE-2019-19294 - Disable the web interface of CCS if not used. Alternatively, restrict access from localhost only, or only to trusted hosts of CCS administrators. Enable TLS for the web interface of CCS.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-19291 - Disable the FTP service of the CCS", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure Siemens strongly recommends to protect network access to affected products with appropriate mechanisms. It is advised to follow recommended security practices in order to run the devices in a protected IT environment.", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:U/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-18337" }, { "cve": "CVE-2019-18338", "cwe": { "id": "CWE-23", "name": "Relative Path Traversal" }, "notes": [ { "category": "summary", "text": "The Control Center Server (CCS) contains a directory traversal vulnerability in its XML-based communication protocol as provided by default on ports 5444/tcp and 5440/tcp.\n\nAn authenticated remote attacker with network access to the CCS server could exploit this vulnerability to list arbitrary directories or read files outside of the CCS application context.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2019-18338 - Control Center Server (CCS)", "url": "https://sivms.cloud/control-center-server-ccs/" }, { "summary": "CVE-2019-18338 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-18338.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-18338" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://sivms.cloud/control-center-server-ccs/" }, { "category": "mitigation", "details": "General (applies to all vulnerabilities listed in this advisory) - Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-18340 - Harden the CCS server to prevent local access by unauthorized users", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-19290, CVE-2019-19293, CVE-2019-19294 - Disable the web interface of CCS if not used. Alternatively, restrict access from localhost only, or only to trusted hosts of CCS administrators. Enable TLS for the web interface of CCS.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-19291 - Disable the FTP service of the CCS", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure Siemens strongly recommends to protect network access to affected products with appropriate mechanisms. It is advised to follow recommended security practices in order to run the devices in a protected IT environment.", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:F/RL:U/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-18338" }, { "cve": "CVE-2019-18340", "cwe": { "id": "CWE-327", "name": "Use of a Broken or Risky Cryptographic Algorithm" }, "notes": [ { "category": "summary", "text": "Both the SiVMS/SiNVR Video Server and the Control Center Server (CCS) store user and device passwords by applying weak cryptography.\n\nA local attacker could exploit this vulnerability to extract the passwords from the user database and/or the device configuration files to conduct further attacks.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "summary": "CVE-2019-18340 - Control Center Server (CCS)", "url": "https://sivms.cloud/control-center-server-ccs/" }, { "summary": "CVE-2019-18340 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-18340.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-18340" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://sivms.cloud/control-center-server-ccs/" }, { "category": "none_available", "details": "Currently no remediation is available", "product_ids": [ "CSAFPID-0002" ] }, { "category": "mitigation", "details": "General (applies to all vulnerabilities listed in this advisory) - Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "CVE-2019-18340 - Harden the CCS server to prevent local access by unauthorized users", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "CVE-2019-19290, CVE-2019-19293, CVE-2019-19294 - Disable the web interface of CCS if not used. Alternatively, restrict access from localhost only, or only to trusted hosts of CCS administrators. Enable TLS for the web interface of CCS.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "CVE-2019-19291 - Disable the FTP service of the CCS", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "As a general security measure Siemens strongly recommends to protect network access to affected products with appropriate mechanisms. It is advised to follow recommended security practices in order to run the devices in a protected IT environment.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:F/RL:U/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ], "title": "CVE-2019-18340" }, { "cve": "CVE-2019-18341", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "The SFTP service (default port 22/tcp) of the Control Center Server (CCS) contains an authentication bypass vulnerability.\n\nA remote attacker with network access to the CCS server could exploit this vulnerability to read data from the EDIR directory (for example, the list of all configured stations).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2019-18341 - Control Center Server (CCS)", "url": "https://sivms.cloud/control-center-server-ccs/" }, { "summary": "CVE-2019-18341 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-18341.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-18341" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://sivms.cloud/control-center-server-ccs/" }, { "category": "mitigation", "details": "General (applies to all vulnerabilities listed in this advisory) - Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-18340 - Harden the CCS server to prevent local access by unauthorized users", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-19290, CVE-2019-19293, CVE-2019-19294 - Disable the web interface of CCS if not used. Alternatively, restrict access from localhost only, or only to trusted hosts of CCS administrators. Enable TLS for the web interface of CCS.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-19291 - Disable the FTP service of the CCS", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure Siemens strongly recommends to protect network access to affected products with appropriate mechanisms. It is advised to follow recommended security practices in order to run the devices in a protected IT environment.", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:F/RL:U/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-18341" }, { "cve": "CVE-2019-18342", "cwe": { "id": "CWE-749", "name": "Exposed Dangerous Method or Function" }, "notes": [ { "category": "summary", "text": "The SFTP service (default port 22/tcp) of the Control Center Server (CCS) does not properly limit its capabilities to the specified purpose.\n\nIn conjunction with CVE-2019-18341, an unauthenticated remote attacker with network access to the CCS server could exploit this vulnerability to read or delete arbitrary files, or access other resources on the same server.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2019-18342 - Control Center Server (CCS)", "url": "https://sivms.cloud/control-center-server-ccs/" }, { "summary": "CVE-2019-18342 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-18342.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-18342" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://sivms.cloud/control-center-server-ccs/" }, { "category": "mitigation", "details": "General (applies to all vulnerabilities listed in this advisory) - Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-18340 - Harden the CCS server to prevent local access by unauthorized users", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-19290, CVE-2019-19293, CVE-2019-19294 - Disable the web interface of CCS if not used. Alternatively, restrict access from localhost only, or only to trusted hosts of CCS administrators. Enable TLS for the web interface of CCS.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-19291 - Disable the FTP service of the CCS", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure Siemens strongly recommends to protect network access to affected products with appropriate mechanisms. It is advised to follow recommended security practices in order to run the devices in a protected IT environment.", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.9, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:F/RL:U/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-18342" }, { "cve": "CVE-2019-19290", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "summary", "text": "The DOWNLOADS section in the web interface of the Control Center Server (CCS) contains a path traversal vulnerability that could allow an authenticated remote attacker to access and download arbitrary files from the server where CCS is installed.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2019-19290 - Control Center Server (CCS)", "url": "https://sivms.cloud/control-center-server-ccs/" }, { "summary": "CVE-2019-19290 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19290.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-19290" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://sivms.cloud/control-center-server-ccs/" }, { "category": "mitigation", "details": "General (applies to all vulnerabilities listed in this advisory) - Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-18340 - Harden the CCS server to prevent local access by unauthorized users", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-19290, CVE-2019-19293, CVE-2019-19294 - Disable the web interface of CCS if not used. Alternatively, restrict access from localhost only, or only to trusted hosts of CCS administrators. Enable TLS for the web interface of CCS.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-19291 - Disable the FTP service of the CCS", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure Siemens strongly recommends to protect network access to affected products with appropriate mechanisms. It is advised to follow recommended security practices in order to run the devices in a protected IT environment.", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:U/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19290" }, { "cve": "CVE-2019-19291", "cwe": { "id": "CWE-313", "name": "Cleartext Storage in a File or on Disk" }, "notes": [ { "category": "summary", "text": "The FTP services of the SiVMS/SiNVR Video Server and the Control Center Server (CCS) maintain log files that store login credentials in cleartext. In configurations where the FTP service is enabled, authenticated remote attackers could extract login credentials of other users of the service.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2019-19291 - Control Center Server (CCS)", "url": "https://sivms.cloud/control-center-server-ccs/" }, { "summary": "CVE-2019-19291 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19291.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-19291" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://sivms.cloud/control-center-server-ccs/" }, { "category": "mitigation", "details": "General (applies to all vulnerabilities listed in this advisory) - Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-18340 - Harden the CCS server to prevent local access by unauthorized users", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-19290, CVE-2019-19293, CVE-2019-19294 - Disable the web interface of CCS if not used. Alternatively, restrict access from localhost only, or only to trusted hosts of CCS administrators. Enable TLS for the web interface of CCS.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-19291 - Disable the FTP service of the CCS", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure Siemens strongly recommends to protect network access to affected products with appropriate mechanisms. It is advised to follow recommended security practices in order to run the devices in a protected IT environment.", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:U/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19291" }, { "cve": "CVE-2019-19292", "cwe": { "id": "CWE-89", "name": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)" }, "notes": [ { "category": "summary", "text": "The Control Center Server (CCS) contains an SQL injection vulnerability in its XML-based communication protocol as provided by default on ports 5444/tcp and 5440/tcp. An authenticated remote attacker could exploit this vulnerability to read or modify the CCS database and potentially execute administrative database operations or operating system commands.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2019-19292 - Control Center Server (CCS)", "url": "https://sivms.cloud/control-center-server-ccs/" }, { "summary": "CVE-2019-19292 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19292.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-19292" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://sivms.cloud/control-center-server-ccs/" }, { "category": "mitigation", "details": "General (applies to all vulnerabilities listed in this advisory) - Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-18340 - Harden the CCS server to prevent local access by unauthorized users", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-19290, CVE-2019-19293, CVE-2019-19294 - Disable the web interface of CCS if not used. Alternatively, restrict access from localhost only, or only to trusted hosts of CCS administrators. Enable TLS for the web interface of CCS.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-19291 - Disable the FTP service of the CCS", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure Siemens strongly recommends to protect network access to affected products with appropriate mechanisms. It is advised to follow recommended security practices in order to run the devices in a protected IT environment.", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19292" }, { "cve": "CVE-2019-19293", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "summary", "text": "The web interface of the Control Center Server (CCS) contains a reflected Cross-site Scripting (XSS) vulnerability that could allow an unauthenticated remote attacker to steal sensitive data or execute administrative actions on behalf of a legitimate administrator of the CCS web interface.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2019-19293 - Control Center Server (CCS)", "url": "https://sivms.cloud/control-center-server-ccs/" }, { "summary": "CVE-2019-19293 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19293.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-19293" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://sivms.cloud/control-center-server-ccs/" }, { "category": "mitigation", "details": "General (applies to all vulnerabilities listed in this advisory) - Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-18340 - Harden the CCS server to prevent local access by unauthorized users", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-19290, CVE-2019-19293, CVE-2019-19294 - Disable the web interface of CCS if not used. Alternatively, restrict access from localhost only, or only to trusted hosts of CCS administrators. Enable TLS for the web interface of CCS.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-19291 - Disable the FTP service of the CCS", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure Siemens strongly recommends to protect network access to affected products with appropriate mechanisms. It is advised to follow recommended security practices in order to run the devices in a protected IT environment.", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N/E:P/RL:U/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19293" }, { "cve": "CVE-2019-19294", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "summary", "text": "The web interface of the Control Center Server (CCS) contains multiple stored Cross-site Scripting (XSS) vulnerabilities in several input fields. This could allow an authenticated remote attacker to inject malicious JavaScript code into the CCS web application that is later executed in the browser context of any other user who views the relevant CCS web content.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2019-19294 - Control Center Server (CCS)", "url": "https://sivms.cloud/control-center-server-ccs/" }, { "summary": "CVE-2019-19294 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19294.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-19294" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:N" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://sivms.cloud/control-center-server-ccs/" }, { "category": "mitigation", "details": "General (applies to all vulnerabilities listed in this advisory) - Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-18340 - Harden the CCS server to prevent local access by unauthorized users", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-19290, CVE-2019-19293, CVE-2019-19294 - Disable the web interface of CCS if not used. Alternatively, restrict access from localhost only, or only to trusted hosts of CCS administrators. Enable TLS for the web interface of CCS.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-19291 - Disable the FTP service of the CCS", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure Siemens strongly recommends to protect network access to affected products with appropriate mechanisms. It is advised to follow recommended security practices in order to run the devices in a protected IT environment.", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:N/E:P/RL:U/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19294" }, { "cve": "CVE-2019-19295", "cwe": { "id": "CWE-778", "name": "Insufficient Logging" }, "notes": [ { "category": "summary", "text": "The Control Center Server (CCS) does not enforce logging of security-relevant activities in its XML-based communication protocol as provided by default on ports 5444/tcp and 5440/tcp. An authenticated remote attacker could exploit this vulnerability to perform covert actions that are not visible in the application log.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2019-19295 - Control Center Server (CCS)", "url": "https://sivms.cloud/control-center-server-ccs/" }, { "summary": "CVE-2019-19295 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19295.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-19295" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://sivms.cloud/control-center-server-ccs/" }, { "category": "mitigation", "details": "General (applies to all vulnerabilities listed in this advisory) - Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-18340 - Harden the CCS server to prevent local access by unauthorized users", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-19290, CVE-2019-19293, CVE-2019-19294 - Disable the web interface of CCS if not used. Alternatively, restrict access from localhost only, or only to trusted hosts of CCS administrators. Enable TLS for the web interface of CCS.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-19291 - Disable the FTP service of the CCS", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure Siemens strongly recommends to protect network access to affected products with appropriate mechanisms. It is advised to follow recommended security practices in order to run the devices in a protected IT environment.", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:P/RL:U/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19295" } ] }
icsa-21-103-10
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "names": [ "Rapha\u00ebl Rigo" ], "organization": "Airbus Security Lab", "summary": "reporting some of these vulnerabilities to Siemens" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities may allow an attacker to read and write arbitrary files and sensitive data and execute commands and arbitrary code.", "title": "Risk evaluation" }, { "category": "other", "text": "Commercial Facilities", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Germany", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should:", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.\nCISA also provides a section for control systems security recommended practices on the ICS webpage onus-cert.cisa.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on us-cert.cisa.gov in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.\nOrganizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "other", "text": "No known public exploits specifically target these vulnerabilities.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "external", "summary": "SSA-761844: Multiple Vulnerabilities in Control Center Server (CCS) - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-761844.json" }, { "category": "self", "summary": "ICS Advisory ICSA-21-103-10 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2021/icsa-21-103-10.json" }, { "category": "self", "summary": "ICS Advisory ICSA-21-103-10 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-21-103-10" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/ics/tips/ICS-TIP-12-146-01B" }, { "category": "external", "summary": "SSA-761844: Multiple Vulnerabilities in Control Center Server (CCS) - PDF Version", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-761844.pdf" }, { "category": "external", "summary": "SSA-761844: Multiple Vulnerabilities in Control Center Server (CCS) - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/ssa-761844.txt" } ], "title": "Siemens and PKE Control Center Server", "tracking": { "current_release_date": "2021-04-13T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-21-103-10", "initial_release_date": "2021-04-13T00:00:00.000000Z", "revision_history": [ { "date": "2021-04-13T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-21-103-10 Siemens / PKE Control Center Server" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c V1.5.0", "product": { "name": "Control Center Server (CCS)", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "Control Center Server (CCS)" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= V1.5.0", "product": { "name": "Control Center Server (CCS)", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "Control Center Server (CCS)" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-13947", "cwe": { "id": "CWE-317", "name": "Cleartext Storage of Sensitive Information in GUI" }, "notes": [ { "category": "summary", "text": "The user configuration menu in the web interface of the Control Center Server (CCS) transfers user passwords in clear to the client (browser).\n\nAn attacker with administrative privileges for the web interface could be able to read (and not only reset) passwords of other CCS users.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2019-13947 - Control Center Server (CCS)", "url": "https://sivms.cloud/control-center-server-ccs/" }, { "summary": "CVE-2019-13947 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-13947.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-13947" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://sivms.cloud/control-center-server-ccs/" }, { "category": "mitigation", "details": "General (applies to all vulnerabilities listed in this advisory) - Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-18340 - Harden the CCS server to prevent local access by unauthorized users", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-19290, CVE-2019-19293, CVE-2019-19294 - Disable the web interface of CCS if not used. Alternatively, restrict access from localhost only, or only to trusted hosts of CCS administrators. Enable TLS for the web interface of CCS.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-19291 - Disable the FTP service of the CCS", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure Siemens strongly recommends to protect network access to affected products with appropriate mechanisms. It is advised to follow recommended security practices in order to run the devices in a protected IT environment.", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:F/RL:U/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-13947" }, { "cve": "CVE-2019-18337", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "The Control Center Server (CCS) contains an authentication bypass vulnerability in its XML-based communication protocol as provided by default on ports 5444/tcp and 5440/tcp.\n\nA remote attacker with network access to the CCS server could exploit this vulnerability to read the CCS users database, including the passwords of all users in obfuscated cleartext.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2019-18337 - Control Center Server (CCS)", "url": "https://sivms.cloud/control-center-server-ccs/" }, { "summary": "CVE-2019-18337 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-18337.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-18337" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://sivms.cloud/control-center-server-ccs/" }, { "category": "mitigation", "details": "General (applies to all vulnerabilities listed in this advisory) - Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-18340 - Harden the CCS server to prevent local access by unauthorized users", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-19290, CVE-2019-19293, CVE-2019-19294 - Disable the web interface of CCS if not used. Alternatively, restrict access from localhost only, or only to trusted hosts of CCS administrators. Enable TLS for the web interface of CCS.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-19291 - Disable the FTP service of the CCS", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure Siemens strongly recommends to protect network access to affected products with appropriate mechanisms. It is advised to follow recommended security practices in order to run the devices in a protected IT environment.", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:U/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-18337" }, { "cve": "CVE-2019-18338", "cwe": { "id": "CWE-23", "name": "Relative Path Traversal" }, "notes": [ { "category": "summary", "text": "The Control Center Server (CCS) contains a directory traversal vulnerability in its XML-based communication protocol as provided by default on ports 5444/tcp and 5440/tcp.\n\nAn authenticated remote attacker with network access to the CCS server could exploit this vulnerability to list arbitrary directories or read files outside of the CCS application context.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2019-18338 - Control Center Server (CCS)", "url": "https://sivms.cloud/control-center-server-ccs/" }, { "summary": "CVE-2019-18338 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-18338.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-18338" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://sivms.cloud/control-center-server-ccs/" }, { "category": "mitigation", "details": "General (applies to all vulnerabilities listed in this advisory) - Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-18340 - Harden the CCS server to prevent local access by unauthorized users", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-19290, CVE-2019-19293, CVE-2019-19294 - Disable the web interface of CCS if not used. Alternatively, restrict access from localhost only, or only to trusted hosts of CCS administrators. Enable TLS for the web interface of CCS.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-19291 - Disable the FTP service of the CCS", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure Siemens strongly recommends to protect network access to affected products with appropriate mechanisms. It is advised to follow recommended security practices in order to run the devices in a protected IT environment.", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:F/RL:U/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-18338" }, { "cve": "CVE-2019-18340", "cwe": { "id": "CWE-327", "name": "Use of a Broken or Risky Cryptographic Algorithm" }, "notes": [ { "category": "summary", "text": "Both the SiVMS/SiNVR Video Server and the Control Center Server (CCS) store user and device passwords by applying weak cryptography.\n\nA local attacker could exploit this vulnerability to extract the passwords from the user database and/or the device configuration files to conduct further attacks.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "summary": "CVE-2019-18340 - Control Center Server (CCS)", "url": "https://sivms.cloud/control-center-server-ccs/" }, { "summary": "CVE-2019-18340 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-18340.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-18340" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://sivms.cloud/control-center-server-ccs/" }, { "category": "none_available", "details": "Currently no remediation is available", "product_ids": [ "CSAFPID-0002" ] }, { "category": "mitigation", "details": "General (applies to all vulnerabilities listed in this advisory) - Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "CVE-2019-18340 - Harden the CCS server to prevent local access by unauthorized users", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "CVE-2019-19290, CVE-2019-19293, CVE-2019-19294 - Disable the web interface of CCS if not used. Alternatively, restrict access from localhost only, or only to trusted hosts of CCS administrators. Enable TLS for the web interface of CCS.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "CVE-2019-19291 - Disable the FTP service of the CCS", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "As a general security measure Siemens strongly recommends to protect network access to affected products with appropriate mechanisms. It is advised to follow recommended security practices in order to run the devices in a protected IT environment.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:F/RL:U/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ], "title": "CVE-2019-18340" }, { "cve": "CVE-2019-18341", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "The SFTP service (default port 22/tcp) of the Control Center Server (CCS) contains an authentication bypass vulnerability.\n\nA remote attacker with network access to the CCS server could exploit this vulnerability to read data from the EDIR directory (for example, the list of all configured stations).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2019-18341 - Control Center Server (CCS)", "url": "https://sivms.cloud/control-center-server-ccs/" }, { "summary": "CVE-2019-18341 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-18341.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-18341" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://sivms.cloud/control-center-server-ccs/" }, { "category": "mitigation", "details": "General (applies to all vulnerabilities listed in this advisory) - Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-18340 - Harden the CCS server to prevent local access by unauthorized users", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-19290, CVE-2019-19293, CVE-2019-19294 - Disable the web interface of CCS if not used. Alternatively, restrict access from localhost only, or only to trusted hosts of CCS administrators. Enable TLS for the web interface of CCS.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-19291 - Disable the FTP service of the CCS", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure Siemens strongly recommends to protect network access to affected products with appropriate mechanisms. It is advised to follow recommended security practices in order to run the devices in a protected IT environment.", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:F/RL:U/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-18341" }, { "cve": "CVE-2019-18342", "cwe": { "id": "CWE-749", "name": "Exposed Dangerous Method or Function" }, "notes": [ { "category": "summary", "text": "The SFTP service (default port 22/tcp) of the Control Center Server (CCS) does not properly limit its capabilities to the specified purpose.\n\nIn conjunction with CVE-2019-18341, an unauthenticated remote attacker with network access to the CCS server could exploit this vulnerability to read or delete arbitrary files, or access other resources on the same server.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2019-18342 - Control Center Server (CCS)", "url": "https://sivms.cloud/control-center-server-ccs/" }, { "summary": "CVE-2019-18342 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-18342.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-18342" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://sivms.cloud/control-center-server-ccs/" }, { "category": "mitigation", "details": "General (applies to all vulnerabilities listed in this advisory) - Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-18340 - Harden the CCS server to prevent local access by unauthorized users", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-19290, CVE-2019-19293, CVE-2019-19294 - Disable the web interface of CCS if not used. Alternatively, restrict access from localhost only, or only to trusted hosts of CCS administrators. Enable TLS for the web interface of CCS.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-19291 - Disable the FTP service of the CCS", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure Siemens strongly recommends to protect network access to affected products with appropriate mechanisms. It is advised to follow recommended security practices in order to run the devices in a protected IT environment.", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.9, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:F/RL:U/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-18342" }, { "cve": "CVE-2019-19290", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "summary", "text": "The DOWNLOADS section in the web interface of the Control Center Server (CCS) contains a path traversal vulnerability that could allow an authenticated remote attacker to access and download arbitrary files from the server where CCS is installed.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2019-19290 - Control Center Server (CCS)", "url": "https://sivms.cloud/control-center-server-ccs/" }, { "summary": "CVE-2019-19290 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19290.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-19290" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://sivms.cloud/control-center-server-ccs/" }, { "category": "mitigation", "details": "General (applies to all vulnerabilities listed in this advisory) - Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-18340 - Harden the CCS server to prevent local access by unauthorized users", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-19290, CVE-2019-19293, CVE-2019-19294 - Disable the web interface of CCS if not used. Alternatively, restrict access from localhost only, or only to trusted hosts of CCS administrators. Enable TLS for the web interface of CCS.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-19291 - Disable the FTP service of the CCS", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure Siemens strongly recommends to protect network access to affected products with appropriate mechanisms. It is advised to follow recommended security practices in order to run the devices in a protected IT environment.", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:U/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19290" }, { "cve": "CVE-2019-19291", "cwe": { "id": "CWE-313", "name": "Cleartext Storage in a File or on Disk" }, "notes": [ { "category": "summary", "text": "The FTP services of the SiVMS/SiNVR Video Server and the Control Center Server (CCS) maintain log files that store login credentials in cleartext. In configurations where the FTP service is enabled, authenticated remote attackers could extract login credentials of other users of the service.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2019-19291 - Control Center Server (CCS)", "url": "https://sivms.cloud/control-center-server-ccs/" }, { "summary": "CVE-2019-19291 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19291.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-19291" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://sivms.cloud/control-center-server-ccs/" }, { "category": "mitigation", "details": "General (applies to all vulnerabilities listed in this advisory) - Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-18340 - Harden the CCS server to prevent local access by unauthorized users", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-19290, CVE-2019-19293, CVE-2019-19294 - Disable the web interface of CCS if not used. Alternatively, restrict access from localhost only, or only to trusted hosts of CCS administrators. Enable TLS for the web interface of CCS.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-19291 - Disable the FTP service of the CCS", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure Siemens strongly recommends to protect network access to affected products with appropriate mechanisms. It is advised to follow recommended security practices in order to run the devices in a protected IT environment.", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:U/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19291" }, { "cve": "CVE-2019-19292", "cwe": { "id": "CWE-89", "name": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)" }, "notes": [ { "category": "summary", "text": "The Control Center Server (CCS) contains an SQL injection vulnerability in its XML-based communication protocol as provided by default on ports 5444/tcp and 5440/tcp. An authenticated remote attacker could exploit this vulnerability to read or modify the CCS database and potentially execute administrative database operations or operating system commands.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2019-19292 - Control Center Server (CCS)", "url": "https://sivms.cloud/control-center-server-ccs/" }, { "summary": "CVE-2019-19292 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19292.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-19292" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://sivms.cloud/control-center-server-ccs/" }, { "category": "mitigation", "details": "General (applies to all vulnerabilities listed in this advisory) - Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-18340 - Harden the CCS server to prevent local access by unauthorized users", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-19290, CVE-2019-19293, CVE-2019-19294 - Disable the web interface of CCS if not used. Alternatively, restrict access from localhost only, or only to trusted hosts of CCS administrators. Enable TLS for the web interface of CCS.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-19291 - Disable the FTP service of the CCS", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure Siemens strongly recommends to protect network access to affected products with appropriate mechanisms. It is advised to follow recommended security practices in order to run the devices in a protected IT environment.", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19292" }, { "cve": "CVE-2019-19293", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "summary", "text": "The web interface of the Control Center Server (CCS) contains a reflected Cross-site Scripting (XSS) vulnerability that could allow an unauthenticated remote attacker to steal sensitive data or execute administrative actions on behalf of a legitimate administrator of the CCS web interface.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2019-19293 - Control Center Server (CCS)", "url": "https://sivms.cloud/control-center-server-ccs/" }, { "summary": "CVE-2019-19293 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19293.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-19293" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://sivms.cloud/control-center-server-ccs/" }, { "category": "mitigation", "details": "General (applies to all vulnerabilities listed in this advisory) - Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-18340 - Harden the CCS server to prevent local access by unauthorized users", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-19290, CVE-2019-19293, CVE-2019-19294 - Disable the web interface of CCS if not used. Alternatively, restrict access from localhost only, or only to trusted hosts of CCS administrators. Enable TLS for the web interface of CCS.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-19291 - Disable the FTP service of the CCS", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure Siemens strongly recommends to protect network access to affected products with appropriate mechanisms. It is advised to follow recommended security practices in order to run the devices in a protected IT environment.", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N/E:P/RL:U/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19293" }, { "cve": "CVE-2019-19294", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "summary", "text": "The web interface of the Control Center Server (CCS) contains multiple stored Cross-site Scripting (XSS) vulnerabilities in several input fields. This could allow an authenticated remote attacker to inject malicious JavaScript code into the CCS web application that is later executed in the browser context of any other user who views the relevant CCS web content.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2019-19294 - Control Center Server (CCS)", "url": "https://sivms.cloud/control-center-server-ccs/" }, { "summary": "CVE-2019-19294 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19294.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-19294" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:N" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://sivms.cloud/control-center-server-ccs/" }, { "category": "mitigation", "details": "General (applies to all vulnerabilities listed in this advisory) - Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-18340 - Harden the CCS server to prevent local access by unauthorized users", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-19290, CVE-2019-19293, CVE-2019-19294 - Disable the web interface of CCS if not used. Alternatively, restrict access from localhost only, or only to trusted hosts of CCS administrators. Enable TLS for the web interface of CCS.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-19291 - Disable the FTP service of the CCS", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure Siemens strongly recommends to protect network access to affected products with appropriate mechanisms. It is advised to follow recommended security practices in order to run the devices in a protected IT environment.", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:N/E:P/RL:U/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19294" }, { "cve": "CVE-2019-19295", "cwe": { "id": "CWE-778", "name": "Insufficient Logging" }, "notes": [ { "category": "summary", "text": "The Control Center Server (CCS) does not enforce logging of security-relevant activities in its XML-based communication protocol as provided by default on ports 5444/tcp and 5440/tcp. An authenticated remote attacker could exploit this vulnerability to perform covert actions that are not visible in the application log.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2019-19295 - Control Center Server (CCS)", "url": "https://sivms.cloud/control-center-server-ccs/" }, { "summary": "CVE-2019-19295 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19295.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-19295" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://sivms.cloud/control-center-server-ccs/" }, { "category": "mitigation", "details": "General (applies to all vulnerabilities listed in this advisory) - Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-18340 - Harden the CCS server to prevent local access by unauthorized users", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-19290, CVE-2019-19293, CVE-2019-19294 - Disable the web interface of CCS if not used. Alternatively, restrict access from localhost only, or only to trusted hosts of CCS administrators. Enable TLS for the web interface of CCS.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-19291 - Disable the FTP service of the CCS", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure Siemens strongly recommends to protect network access to affected products with appropriate mechanisms. It is advised to follow recommended security practices in order to run the devices in a protected IT environment.", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:P/RL:U/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19295" } ] }
icsa-19-344-02
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "names": [ "Rapha\u00ebl Rigo" ], "organization": "Airbus Security Lab", "summary": "reporting these vulnerabilities to Siemens" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could allow an attacker to read the SiVMS/SiNVR users database, including the passwords of all users in obfuscated cleartext and configuration files.", "title": "Risk evaluation" }, { "category": "other", "text": "Commercial Facilities", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Germany", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.\nCISA also provides a section for control systems security recommended practices on the ICS webpage onus-cert.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on us-cert.gov in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.\nOrganizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-19-344-02 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2019/icsa-19-344-02.json" }, { "category": "self", "summary": "ICS Advisory ICSA-19-344-02 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-19-344-02" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.us-cert.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.us-cert.gov/ics/tips/ICS-TIP-12-146-01B" } ], "title": "Siemens and PKE SiNVR, SiVMS Video Server (Update A)", "tracking": { "current_release_date": "2021-04-13T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-19-344-02", "initial_release_date": "2019-12-10T00:00:00.000000Z", "revision_history": [ { "date": "2019-12-10T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-19-344-02 Siemens SiNVR 3" }, { "date": "2021-04-13T00:00:00.000000Z", "legacy_version": "A", "number": "2", "summary": "ICSA-19-344-02 Siemens and PKE SiNVR SiVMS Video Server (Update A)" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003e= 5.0.0 | CVE-2019-18340", "product": { "name": "SiNVR/SiVMS Video Server: v5.0.0 and later is affected by CVE-2019-18340", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "SiNVR/SiVMS Video Server" }, { "branches": [ { "category": "product_version", "name": "- SSA-761844 and ICSA-21-103-10", "product": { "name": "SiNVR 3 Central Control Server (CCS): all versions Moved to SSA-761844 and ICSA-21-103-10", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "SiNVR 3 Central Control Server (CCS)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c 5.0.0", "product": { "name": "SiNVR/SiVMS Video Server: All versions prior to v5.0.0", "product_id": "CSAFPID-0003" } } ], "category": "product_name", "name": "SiNVR/SiVMS Video Server" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-18339", "cwe": { "id": "CWE-306", "name": "Missing Authentication for Critical Function" }, "notes": [ { "category": "summary", "text": "The HTTP service (default specific port) of the SiNVR 3 Video Server contains an authentication bypass vulnerability, even when properly configured with enforced authentication. CVE-2019-13947, CVE-2019-18337, CVE-2019-18338, CVE-2019-18341, and CVE-2019-18342 have been moved to SSA-761844 and ICSA-21-103-10.CVE-2019-18339 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-18339" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Siemens recommends users to update to v5.0.0 or later.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://sivms.cloud/sivms-platform/" }, { "category": "vendor_fix", "details": "Siemens has identified the following specific workarounds and mitigations that users can apply to reduce the risk:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "vendor_fix", "details": "As a general security measure, Siemens strongly recommends protecting network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens \u0027 operational guidelines for industrial security and to following the recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "vendor_fix", "details": "Additional information on industrial security by Siemens can be found at:https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "vendor_fix", "details": "For more information on these vulnerabilities and more detailed mitigation instructions, please see Siemens security advisory SSA-761617 and the PKE security advisory.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://sivms.cloud/wp-content/uploads/2021/03/sivms-cve-fixes_1.0_EN.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ] }, { "cve": "CVE-2019-18340", "cwe": { "id": "CWE-261", "name": "Weak Encoding for Password" }, "notes": [ { "category": "summary", "text": "Both the SiNVR 3 Video Server and the CCS store user and device passwords by applying weak cryptography. CVE-2019-18340 has been assigned to this vulnerability. A CVSS v3 base score of 5.5 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).. --------- End Update A Part 4 of 6 ---------CVE-2019-18340 has been assigned to this vulnerability. A CVSS v3 base score of 5.5 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-18340" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "vendor_fix", "details": "Siemens recommends users to update to v5.0.0 or later.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://sivms.cloud/sivms-platform/" }, { "category": "vendor_fix", "details": "Siemens has identified the following specific workarounds and mitigations that users can apply to reduce the risk:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "vendor_fix", "details": "As a general security measure, Siemens strongly recommends protecting network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens \u0027 operational guidelines for industrial security and to following the recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "vendor_fix", "details": "Additional information on industrial security by Siemens can be found at:https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "vendor_fix", "details": "For more information on these vulnerabilities and more detailed mitigation instructions, please see Siemens security advisory SSA-761617 and the PKE security advisory.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://sivms.cloud/wp-content/uploads/2021/03/sivms-cve-fixes_1.0_EN.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ] } ] }
icsa-20-070-01
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "Siemens ProductCERT", "summary": "reporting these vulnerabilities to CISA." } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "The advisory informs about multiple vulnerabilities in the Central Control Server (CCS) application, as initially\nreported in SSA-761617 (\nhttps://cert-portal.siemens.com/productcert/html/ssa-761617.html) on 2019-12-10\nand SSA-844761 (https://cert-portal.siemens.com/productcert/html/ssa-844761.html) on 2020-03-10.\nThe vulnerabilities involve authentication bypass (CVE-2019-18337, CVE-2019-18341),\npath traversal (CVE-2019-18338, CVE-2019-19290), information disclosure (CVE-2019-13947, CVE-2019-18340, CVE-2019-19291),\nprivilege escalation (CVE-2019-18342), SQL injection (CVE-2019-19292), cross-site scripting (CVE-2019-19293, CVE-2019-19294), and\ninsufficient logging (CVE-2019-19295).\n\nPKE has released an update for CCS that fixes the reported vulnerabilities, except for CVE-2019-18340. For details contact PKE (\nhttps://pke.at/).\nSiemens recommends to update to the latest version and recommends specific countermeasures to mitigate the vulnerabilities.", "title": "Summary" }, { "category": "general", "text": "As a general security measure Siemens strongly recommends to protect network access to affected products with appropriate mechanisms. It is advised to follow recommended security practices in order to run the devices in a protected IT environment.", "title": "General Recommendations" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "legal_disclaimer", "text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.", "title": "Terms of Use" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "other", "text": "This CISA CSAF advisory was converted from Siemens ProductCERT\u0027s CSAF advisory.", "title": "Advisory Conversion Disclaimer" }, { "category": "other", "text": "Multiple", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Germany", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.", "title": "Recommended Practices" }, { "category": "general", "text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.", "title": "Recommended Practices" }, { "category": "general", "text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.", "title": "Recommended Practices" }, { "category": "general", "text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" } ], "publisher": { "category": "other", "contact_details": "central@cisa.dhs.gov", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "SSA-761844: Multiple Vulnerabilities in Control Center Server (CCS) - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-761844.json" }, { "category": "self", "summary": "SSA-761844: Multiple Vulnerabilities in Control Center Server (CCS) - HTML Version", "url": "https://cert-portal.siemens.com/productcert/html/ssa-761844.html" }, { "category": "self", "summary": "SSA-761844: Multiple Vulnerabilities in Control Center Server (CCS) - PDF Version", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-761844.pdf" }, { "category": "self", "summary": "SSA-761844: Multiple Vulnerabilities in Control Center Server (CCS) - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/ssa-761844.txt" }, { "category": "self", "summary": "ICS Advisory ICSA-20-070-01 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2021/icsa-20-070-01.json" }, { "category": "self", "summary": "ICS Advisory ICSA-20-070-01 - Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-20-070-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/topics/industrial-control-systems" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" } ], "title": "ICSA-20-070-01_Siemens and PKE SiNVR/SiVMS Video Server (Update B)", "tracking": { "current_release_date": "2024-01-09T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-20-070-01", "initial_release_date": "2021-04-13T00:00:00.000000Z", "revision_history": [ { "date": "2021-04-13T00:00:00.000000Z", "legacy_version": "1.0", "number": "1", "summary": "Publication Date" }, { "date": "2024-01-09T00:00:00.000000Z", "legacy_version": "1.1", "number": "2", "summary": "Cleanup: removed orphaned links to vendor advisories and software downloads" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003cV1.5.0", "product": { "name": "Control Center Server (CCS)", "product_id": "CSAFPID-0001" } }, { "category": "product_version_range", "name": "\u003e=V1.5.0", "product": { "name": "Control Center Server (CCS)", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "Control Center Server (CCS)" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-13947", "cwe": { "id": "CWE-317", "name": "Cleartext Storage of Sensitive Information in GUI" }, "notes": [ { "category": "summary", "text": "The user configuration menu in the web interface of the\nControl Center Server (CCS) transfers user passwords in clear to the\nclient (browser).\n\nAn attacker with administrative privileges for the web interface could be\nable to read (and not only reset) passwords of other CCS users.\n", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "mitigation", "details": "Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:F/RL:U/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-13947" }, { "cve": "CVE-2019-18337", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "The Control Center Server (CCS) contains an authentication bypass\nvulnerability in its XML-based communication protocol as provided by default\non ports 5444/tcp and 5440/tcp.\n\nA remote attacker with network access to the CCS server could\nexploit this vulnerability to read the CCS users database, including\nthe passwords of all users in obfuscated cleartext.\n", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "mitigation", "details": "Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:U/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-18337" }, { "cve": "CVE-2019-18338", "cwe": { "id": "CWE-23", "name": "Relative Path Traversal" }, "notes": [ { "category": "summary", "text": "The Control Center Server (CCS) contains a directory traversal\nvulnerability in its XML-based communication protocol as provided by default\non ports 5444/tcp and 5440/tcp.\n\nAn authenticated remote attacker with network access to the CCS server\ncould exploit this vulnerability to list arbitrary directories\nor read files outside of the CCS application context.\n", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "mitigation", "details": "Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:F/RL:U/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-18338" }, { "cve": "CVE-2019-18340", "cwe": { "id": "CWE-327", "name": "Use of a Broken or Risky Cryptographic Algorithm" }, "notes": [ { "category": "summary", "text": "Both the SiVMS/SiNVR Video Server and the Control Center Server (CCS) store\nuser and device passwords by applying weak cryptography.\n\nA local attacker could exploit this vulnerability to extract\nthe passwords from the user database and/or the device configuration files\nto conduct further attacks.\n", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "remediations": [ { "category": "mitigation", "details": "Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "CVE-2019-18340: Harden the CCS server to prevent local access by unauthorized users", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "no_fix_planned", "details": "Currently no fix is planned", "product_ids": [ "CSAFPID-0002" ] }, { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:F/RL:U/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ], "title": "CVE-2019-18340" }, { "cve": "CVE-2019-18341", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "The SFTP service (default port 22/tcp) of the Control Center Server\n(CCS) contains an authentication bypass vulnerability.\n\nA remote attacker with network access to the CCS server could\nexploit this vulnerability to read data from the EDIR directory\n(for example, the list of all configured stations).\n", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "mitigation", "details": "Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:F/RL:U/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-18341" }, { "cve": "CVE-2019-18342", "cwe": { "id": "CWE-749", "name": "Exposed Dangerous Method or Function" }, "notes": [ { "category": "summary", "text": "The SFTP service (default port 22/tcp) of the Control Center Server\n(CCS) does not properly limit its capabilities to the specified purpose.\n\nIn conjunction with CVE-2019-18341, an unauthenticated remote attacker with\nnetwork access to the CCS server could exploit this vulnerability\nto read or delete arbitrary files, or access other resources on the same\nserver.\n", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "mitigation", "details": "Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.9, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:F/RL:U/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-18342" }, { "cve": "CVE-2019-19290", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "summary", "text": "The DOWNLOADS section in the web interface of the Control Center\nServer (CCS) contains a path traversal vulnerability\nthat could allow an authenticated remote attacker to access and download\narbitrary files from the server where CCS is installed.\n", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "mitigation", "details": "Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-19290, CVE-2019-19293, CVE-2019-19294: Disable the web interface of CCS if not used. Alternatively, restrict access from localhost only, or only to trusted hosts of CCS administrators. Enable TLS for the web interface of CCS.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:U/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19290" }, { "cve": "CVE-2019-19291", "cwe": { "id": "CWE-313", "name": "Cleartext Storage in a File or on Disk" }, "notes": [ { "category": "summary", "text": "The FTP services of the SiVMS/SiNVR Video Server and the Control Center Server (CCS) maintain\nlog files that store login credentials in cleartext.\nIn configurations where the FTP service is enabled, authenticated remote\nattackers could extract login credentials of other users of the service.\n\n", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "mitigation", "details": "Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-19291: Disable the FTP service of the CCS", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:U/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19291" }, { "cve": "CVE-2019-19292", "cwe": { "id": "CWE-89", "name": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)" }, "notes": [ { "category": "summary", "text": "The Control Center Server (CCS) contains an SQL injection\nvulnerability in its XML-based communication protocol as provided by default\non ports 5444/tcp and 5440/tcp.\nAn authenticated remote attacker could exploit this vulnerability to\nread or modify the CCS database and potentially execute administrative\ndatabase operations or operating system commands.\n", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "mitigation", "details": "Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19292" }, { "cve": "CVE-2019-19293", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "summary", "text": "The web interface of the Control Center Server (CCS) contains a\nreflected Cross-site Scripting (XSS) vulnerability\nthat could allow an unauthenticated remote attacker to steal sensitive data\nor execute administrative actions on behalf of a legitimate administrator\nof the CCS web interface.\n", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "mitigation", "details": "Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-19290, CVE-2019-19293, CVE-2019-19294: Disable the web interface of CCS if not used. Alternatively, restrict access from localhost only, or only to trusted hosts of CCS administrators. Enable TLS for the web interface of CCS.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N/E:P/RL:U/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19293" }, { "cve": "CVE-2019-19294", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "summary", "text": "The web interface of the Control Center Server (CCS) contains\nmultiple stored Cross-site Scripting (XSS) vulnerabilities in several input\nfields.\nThis could allow an authenticated remote attacker to inject malicious\nJavaScript code into the CCS web application that is later executed\nin the browser context of any other user who views the relevant CCS\nweb content.\n", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "mitigation", "details": "Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-19290, CVE-2019-19293, CVE-2019-19294: Disable the web interface of CCS if not used. Alternatively, restrict access from localhost only, or only to trusted hosts of CCS administrators. Enable TLS for the web interface of CCS.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:N/E:P/RL:U/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19294" }, { "cve": "CVE-2019-19295", "cwe": { "id": "CWE-778", "name": "Insufficient Logging" }, "notes": [ { "category": "summary", "text": "The Control Center Server (CCS) does not enforce logging of\nsecurity-relevant activities in its XML-based communication protocol\nas provided by default on ports 5444/tcp and 5440/tcp.\nAn authenticated remote attacker could exploit this vulnerability to\nperform covert actions that are not visible in the application log.\n", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "mitigation", "details": "Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:P/RL:U/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19295" } ] }
ICSA-19-344-02
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "names": [ "Rapha\u00ebl Rigo" ], "organization": "Airbus Security Lab", "summary": "reporting these vulnerabilities to Siemens" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could allow an attacker to read the SiVMS/SiNVR users database, including the passwords of all users in obfuscated cleartext and configuration files.", "title": "Risk evaluation" }, { "category": "other", "text": "Commercial Facilities", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Germany", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.\nCISA also provides a section for control systems security recommended practices on the ICS webpage onus-cert.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on us-cert.gov in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.\nOrganizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-19-344-02 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2019/icsa-19-344-02.json" }, { "category": "self", "summary": "ICS Advisory ICSA-19-344-02 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-19-344-02" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.us-cert.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.us-cert.gov/ics/tips/ICS-TIP-12-146-01B" } ], "title": "Siemens and PKE SiNVR, SiVMS Video Server (Update A)", "tracking": { "current_release_date": "2021-04-13T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-19-344-02", "initial_release_date": "2019-12-10T00:00:00.000000Z", "revision_history": [ { "date": "2019-12-10T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-19-344-02 Siemens SiNVR 3" }, { "date": "2021-04-13T00:00:00.000000Z", "legacy_version": "A", "number": "2", "summary": "ICSA-19-344-02 Siemens and PKE SiNVR SiVMS Video Server (Update A)" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003e= 5.0.0 | CVE-2019-18340", "product": { "name": "SiNVR/SiVMS Video Server: v5.0.0 and later is affected by CVE-2019-18340", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "SiNVR/SiVMS Video Server" }, { "branches": [ { "category": "product_version", "name": "- SSA-761844 and ICSA-21-103-10", "product": { "name": "SiNVR 3 Central Control Server (CCS): all versions Moved to SSA-761844 and ICSA-21-103-10", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "SiNVR 3 Central Control Server (CCS)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c 5.0.0", "product": { "name": "SiNVR/SiVMS Video Server: All versions prior to v5.0.0", "product_id": "CSAFPID-0003" } } ], "category": "product_name", "name": "SiNVR/SiVMS Video Server" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-18339", "cwe": { "id": "CWE-306", "name": "Missing Authentication for Critical Function" }, "notes": [ { "category": "summary", "text": "The HTTP service (default specific port) of the SiNVR 3 Video Server contains an authentication bypass vulnerability, even when properly configured with enforced authentication. CVE-2019-13947, CVE-2019-18337, CVE-2019-18338, CVE-2019-18341, and CVE-2019-18342 have been moved to SSA-761844 and ICSA-21-103-10.CVE-2019-18339 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-18339" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Siemens recommends users to update to v5.0.0 or later.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://sivms.cloud/sivms-platform/" }, { "category": "vendor_fix", "details": "Siemens has identified the following specific workarounds and mitigations that users can apply to reduce the risk:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "vendor_fix", "details": "As a general security measure, Siemens strongly recommends protecting network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens \u0027 operational guidelines for industrial security and to following the recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "vendor_fix", "details": "Additional information on industrial security by Siemens can be found at:https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "vendor_fix", "details": "For more information on these vulnerabilities and more detailed mitigation instructions, please see Siemens security advisory SSA-761617 and the PKE security advisory.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://sivms.cloud/wp-content/uploads/2021/03/sivms-cve-fixes_1.0_EN.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ] }, { "cve": "CVE-2019-18340", "cwe": { "id": "CWE-261", "name": "Weak Encoding for Password" }, "notes": [ { "category": "summary", "text": "Both the SiNVR 3 Video Server and the CCS store user and device passwords by applying weak cryptography. CVE-2019-18340 has been assigned to this vulnerability. A CVSS v3 base score of 5.5 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).. --------- End Update A Part 4 of 6 ---------CVE-2019-18340 has been assigned to this vulnerability. A CVSS v3 base score of 5.5 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-18340" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "vendor_fix", "details": "Siemens recommends users to update to v5.0.0 or later.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://sivms.cloud/sivms-platform/" }, { "category": "vendor_fix", "details": "Siemens has identified the following specific workarounds and mitigations that users can apply to reduce the risk:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "vendor_fix", "details": "As a general security measure, Siemens strongly recommends protecting network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens \u0027 operational guidelines for industrial security and to following the recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "vendor_fix", "details": "Additional information on industrial security by Siemens can be found at:https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "vendor_fix", "details": "For more information on these vulnerabilities and more detailed mitigation instructions, please see Siemens security advisory SSA-761617 and the PKE security advisory.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://sivms.cloud/wp-content/uploads/2021/03/sivms-cve-fixes_1.0_EN.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ] } ] }
ICSA-20-070-01
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "Siemens ProductCERT", "summary": "reporting these vulnerabilities to CISA." } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "The advisory informs about multiple vulnerabilities in the Central Control Server (CCS) application, as initially\nreported in SSA-761617 (\nhttps://cert-portal.siemens.com/productcert/html/ssa-761617.html) on 2019-12-10\nand SSA-844761 (https://cert-portal.siemens.com/productcert/html/ssa-844761.html) on 2020-03-10.\nThe vulnerabilities involve authentication bypass (CVE-2019-18337, CVE-2019-18341),\npath traversal (CVE-2019-18338, CVE-2019-19290), information disclosure (CVE-2019-13947, CVE-2019-18340, CVE-2019-19291),\nprivilege escalation (CVE-2019-18342), SQL injection (CVE-2019-19292), cross-site scripting (CVE-2019-19293, CVE-2019-19294), and\ninsufficient logging (CVE-2019-19295).\n\nPKE has released an update for CCS that fixes the reported vulnerabilities, except for CVE-2019-18340. For details contact PKE (\nhttps://pke.at/).\nSiemens recommends to update to the latest version and recommends specific countermeasures to mitigate the vulnerabilities.", "title": "Summary" }, { "category": "general", "text": "As a general security measure Siemens strongly recommends to protect network access to affected products with appropriate mechanisms. It is advised to follow recommended security practices in order to run the devices in a protected IT environment.", "title": "General Recommendations" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "legal_disclaimer", "text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.", "title": "Terms of Use" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "other", "text": "This CISA CSAF advisory was converted from Siemens ProductCERT\u0027s CSAF advisory.", "title": "Advisory Conversion Disclaimer" }, { "category": "other", "text": "Multiple", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Germany", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.", "title": "Recommended Practices" }, { "category": "general", "text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.", "title": "Recommended Practices" }, { "category": "general", "text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.", "title": "Recommended Practices" }, { "category": "general", "text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" } ], "publisher": { "category": "other", "contact_details": "central@cisa.dhs.gov", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "SSA-761844: Multiple Vulnerabilities in Control Center Server (CCS) - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-761844.json" }, { "category": "self", "summary": "SSA-761844: Multiple Vulnerabilities in Control Center Server (CCS) - HTML Version", "url": "https://cert-portal.siemens.com/productcert/html/ssa-761844.html" }, { "category": "self", "summary": "SSA-761844: Multiple Vulnerabilities in Control Center Server (CCS) - PDF Version", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-761844.pdf" }, { "category": "self", "summary": "SSA-761844: Multiple Vulnerabilities in Control Center Server (CCS) - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/ssa-761844.txt" }, { "category": "self", "summary": "ICS Advisory ICSA-20-070-01 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2021/icsa-20-070-01.json" }, { "category": "self", "summary": "ICS Advisory ICSA-20-070-01 - Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-20-070-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/topics/industrial-control-systems" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" } ], "title": "ICSA-20-070-01_Siemens and PKE SiNVR/SiVMS Video Server (Update B)", "tracking": { "current_release_date": "2024-01-09T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-20-070-01", "initial_release_date": "2021-04-13T00:00:00.000000Z", "revision_history": [ { "date": "2021-04-13T00:00:00.000000Z", "legacy_version": "1.0", "number": "1", "summary": "Publication Date" }, { "date": "2024-01-09T00:00:00.000000Z", "legacy_version": "1.1", "number": "2", "summary": "Cleanup: removed orphaned links to vendor advisories and software downloads" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003cV1.5.0", "product": { "name": "Control Center Server (CCS)", "product_id": "CSAFPID-0001" } }, { "category": "product_version_range", "name": "\u003e=V1.5.0", "product": { "name": "Control Center Server (CCS)", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "Control Center Server (CCS)" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-13947", "cwe": { "id": "CWE-317", "name": "Cleartext Storage of Sensitive Information in GUI" }, "notes": [ { "category": "summary", "text": "The user configuration menu in the web interface of the\nControl Center Server (CCS) transfers user passwords in clear to the\nclient (browser).\n\nAn attacker with administrative privileges for the web interface could be\nable to read (and not only reset) passwords of other CCS users.\n", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "mitigation", "details": "Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:F/RL:U/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-13947" }, { "cve": "CVE-2019-18337", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "The Control Center Server (CCS) contains an authentication bypass\nvulnerability in its XML-based communication protocol as provided by default\non ports 5444/tcp and 5440/tcp.\n\nA remote attacker with network access to the CCS server could\nexploit this vulnerability to read the CCS users database, including\nthe passwords of all users in obfuscated cleartext.\n", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "mitigation", "details": "Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:U/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-18337" }, { "cve": "CVE-2019-18338", "cwe": { "id": "CWE-23", "name": "Relative Path Traversal" }, "notes": [ { "category": "summary", "text": "The Control Center Server (CCS) contains a directory traversal\nvulnerability in its XML-based communication protocol as provided by default\non ports 5444/tcp and 5440/tcp.\n\nAn authenticated remote attacker with network access to the CCS server\ncould exploit this vulnerability to list arbitrary directories\nor read files outside of the CCS application context.\n", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "mitigation", "details": "Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:F/RL:U/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-18338" }, { "cve": "CVE-2019-18340", "cwe": { "id": "CWE-327", "name": "Use of a Broken or Risky Cryptographic Algorithm" }, "notes": [ { "category": "summary", "text": "Both the SiVMS/SiNVR Video Server and the Control Center Server (CCS) store\nuser and device passwords by applying weak cryptography.\n\nA local attacker could exploit this vulnerability to extract\nthe passwords from the user database and/or the device configuration files\nto conduct further attacks.\n", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "remediations": [ { "category": "mitigation", "details": "Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "CVE-2019-18340: Harden the CCS server to prevent local access by unauthorized users", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "no_fix_planned", "details": "Currently no fix is planned", "product_ids": [ "CSAFPID-0002" ] }, { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:F/RL:U/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ], "title": "CVE-2019-18340" }, { "cve": "CVE-2019-18341", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "The SFTP service (default port 22/tcp) of the Control Center Server\n(CCS) contains an authentication bypass vulnerability.\n\nA remote attacker with network access to the CCS server could\nexploit this vulnerability to read data from the EDIR directory\n(for example, the list of all configured stations).\n", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "mitigation", "details": "Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:F/RL:U/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-18341" }, { "cve": "CVE-2019-18342", "cwe": { "id": "CWE-749", "name": "Exposed Dangerous Method or Function" }, "notes": [ { "category": "summary", "text": "The SFTP service (default port 22/tcp) of the Control Center Server\n(CCS) does not properly limit its capabilities to the specified purpose.\n\nIn conjunction with CVE-2019-18341, an unauthenticated remote attacker with\nnetwork access to the CCS server could exploit this vulnerability\nto read or delete arbitrary files, or access other resources on the same\nserver.\n", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "mitigation", "details": "Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.9, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:F/RL:U/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-18342" }, { "cve": "CVE-2019-19290", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "summary", "text": "The DOWNLOADS section in the web interface of the Control Center\nServer (CCS) contains a path traversal vulnerability\nthat could allow an authenticated remote attacker to access and download\narbitrary files from the server where CCS is installed.\n", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "mitigation", "details": "Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-19290, CVE-2019-19293, CVE-2019-19294: Disable the web interface of CCS if not used. Alternatively, restrict access from localhost only, or only to trusted hosts of CCS administrators. Enable TLS for the web interface of CCS.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:U/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19290" }, { "cve": "CVE-2019-19291", "cwe": { "id": "CWE-313", "name": "Cleartext Storage in a File or on Disk" }, "notes": [ { "category": "summary", "text": "The FTP services of the SiVMS/SiNVR Video Server and the Control Center Server (CCS) maintain\nlog files that store login credentials in cleartext.\nIn configurations where the FTP service is enabled, authenticated remote\nattackers could extract login credentials of other users of the service.\n\n", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "mitigation", "details": "Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-19291: Disable the FTP service of the CCS", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:U/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19291" }, { "cve": "CVE-2019-19292", "cwe": { "id": "CWE-89", "name": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)" }, "notes": [ { "category": "summary", "text": "The Control Center Server (CCS) contains an SQL injection\nvulnerability in its XML-based communication protocol as provided by default\non ports 5444/tcp and 5440/tcp.\nAn authenticated remote attacker could exploit this vulnerability to\nread or modify the CCS database and potentially execute administrative\ndatabase operations or operating system commands.\n", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "mitigation", "details": "Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19292" }, { "cve": "CVE-2019-19293", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "summary", "text": "The web interface of the Control Center Server (CCS) contains a\nreflected Cross-site Scripting (XSS) vulnerability\nthat could allow an unauthenticated remote attacker to steal sensitive data\nor execute administrative actions on behalf of a legitimate administrator\nof the CCS web interface.\n", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "mitigation", "details": "Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-19290, CVE-2019-19293, CVE-2019-19294: Disable the web interface of CCS if not used. Alternatively, restrict access from localhost only, or only to trusted hosts of CCS administrators. Enable TLS for the web interface of CCS.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N/E:P/RL:U/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19293" }, { "cve": "CVE-2019-19294", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "summary", "text": "The web interface of the Control Center Server (CCS) contains\nmultiple stored Cross-site Scripting (XSS) vulnerabilities in several input\nfields.\nThis could allow an authenticated remote attacker to inject malicious\nJavaScript code into the CCS web application that is later executed\nin the browser context of any other user who views the relevant CCS\nweb content.\n", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "mitigation", "details": "Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "CVE-2019-19290, CVE-2019-19293, CVE-2019-19294: Disable the web interface of CCS if not used. Alternatively, restrict access from localhost only, or only to trusted hosts of CCS administrators. Enable TLS for the web interface of CCS.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:N/E:P/RL:U/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19294" }, { "cve": "CVE-2019-19295", "cwe": { "id": "CWE-778", "name": "Insufficient Logging" }, "notes": [ { "category": "summary", "text": "The Control Center Server (CCS) does not enforce logging of\nsecurity-relevant activities in its XML-based communication protocol\nas provided by default on ports 5444/tcp and 5440/tcp.\nAn authenticated remote attacker could exploit this vulnerability to\nperform covert actions that are not visible in the application log.\n", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "mitigation", "details": "Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:P/RL:U/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19295" } ] }
SSA-761617
Vulnerability from csaf_siemens
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)", "tlp": { "label": "WHITE" } }, "lang": "en", "notes": [ { "category": "summary", "text": "The Video Server application in SiNVR/SiVMS solutions contains two vulnerabilities\ninvolving authentication bypass (CVE-2019-18339) and information disclosure (CVE-2019-18340).\n\nPKE has released an update of the application that fixes CVE-2019-18339.\nThis update is not available under the former Siemens OEM brand name SiNVR. For details contact PKE (\nhttps://pke.at/).\nSiemens recommends specific countermeasures to mitigate the vulnerabilities.", "title": "Summary" }, { "category": "general", "text": "As a general security measure Siemens strongly recommends to protect network access to affected products with appropriate mechanisms. It is advised to follow recommended security practices in order to run the devices in a protected IT environment.", "title": "General Recommendations" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "legal_disclaimer", "text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "productcert@siemens.com", "name": "Siemens ProductCERT", "namespace": "https://www.siemens.com" }, "references": [ { "category": "self", "summary": "SSA-761617: Authentication Bypass and Information Disclosure Vulnerabilities in SiNVR/SiVMS Video Server - HTML Version", "url": "https://cert-portal.siemens.com/productcert/html/ssa-761617.html" }, { "category": "self", "summary": "SSA-761617: Authentication Bypass and Information Disclosure Vulnerabilities in SiNVR/SiVMS Video Server - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-761617.json" }, { "category": "self", "summary": "SSA-761617: Authentication Bypass and Information Disclosure Vulnerabilities in SiNVR/SiVMS Video Server - PDF Version", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-761617.pdf" }, { "category": "self", "summary": "SSA-761617: Authentication Bypass and Information Disclosure Vulnerabilities in SiNVR/SiVMS Video Server - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/ssa-761617.txt" } ], "title": "SSA-761617: Authentication Bypass and Information Disclosure Vulnerabilities in SiNVR/SiVMS Video Server", "tracking": { "current_release_date": "2024-01-09T00:00:00Z", "generator": { "engine": { "name": "Siemens ProductCERT CSAF Generator", "version": "1" } }, "id": "SSA-761617", "initial_release_date": "2019-12-10T00:00:00Z", "revision_history": [ { "date": "2019-12-10T00:00:00Z", "legacy_version": "1.0", "number": "1", "summary": "Publication Date" }, { "date": "2021-04-13T00:00:00Z", "legacy_version": "1.1", "number": "2", "summary": "Added partial solution for SiNVR/SiVMS Video Server; removed information for Control Center Server (CCS), which is now addressed in SSA-761844" }, { "date": "2024-01-09T00:00:00Z", "legacy_version": "1.2", "number": "3", "summary": "Cleanup: removed orphaned links to vendor advisories and software downloads" } ], "status": "interim", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003cV5.0.0", "product": { "name": "SiNVR/SiVMS Video Server", "product_id": "1" } }, { "category": "product_version_range", "name": "\u003e=V5.0.0", "product": { "name": "SiNVR/SiVMS Video Server", "product_id": "2" } } ], "category": "product_name", "name": "SiNVR/SiVMS Video Server" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-18339", "cwe": { "id": "CWE-306", "name": "Missing Authentication for Critical Function" }, "notes": [ { "category": "summary", "text": "The HTTP service (default port 5401/tcp) of the SiVMS/SiNVR Video Server\ncontains an authentication bypass vulnerability, even when properly\nconfigured with enforced authentication.\n\nA remote attacker with network access to the Video Server could \nexploit this vulnerability to read the SiVMS/SiNVR users database, including\nthe passwords of all users in obfuscated cleartext.\n", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "mitigation", "details": "Apply ACL/firewall configuration on the Video Servers to ensure that only legitimate systems are able to access the configured server ports. Harden all systems accordingly to prevent unauthorized access", "product_ids": [ "1" ] }, { "category": "mitigation", "details": "CVE-2019-18339: SiNVR/SiVMS deployments with active Control Center Server (CCS) should ensure that every video server and client has the Authorization Server set to \"Control Center Server\" (Configuration -\u003e Appearance -\u003e Desktop -\u003e Authorization Server)", "product_ids": [ "1" ] }, { "category": "vendor_fix", "details": "Update to V5.0.0 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:U/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2019-18339" }, { "cve": "CVE-2019-18340", "cwe": { "id": "CWE-327", "name": "Use of a Broken or Risky Cryptographic Algorithm" }, "notes": [ { "category": "summary", "text": "Both the SiVMS/SiNVR Video Server and the Control Center Server (CCS) store\nuser and device passwords by applying weak cryptography.\n\nA local attacker could exploit this vulnerability to extract\nthe passwords from the user database and/or the device configuration files\nto conduct further attacks.\n", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2" ] }, "remediations": [ { "category": "mitigation", "details": "Apply ACL/firewall configuration on the Video Servers to ensure that only legitimate systems are able to access the configured server ports. Harden all systems accordingly to prevent unauthorized access", "product_ids": [ "1", "2" ] }, { "category": "mitigation", "details": "CVE-2019-18340: Harden the Video Servers to prevent local access by unauthorized users", "product_ids": [ "1", "2" ] }, { "category": "no_fix_planned", "details": "Currently no fix is planned", "product_ids": [ "2" ] }, { "category": "vendor_fix", "details": "Update to V5.0.0 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:F/RL:U/RC:C", "version": "3.1" }, "products": [ "1", "2" ] } ], "title": "CVE-2019-18340" } ] }
ssa-761844
Vulnerability from csaf_siemens
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)", "tlp": { "label": "WHITE" } }, "lang": "en", "notes": [ { "category": "summary", "text": "The advisory informs about multiple vulnerabilities in the Central Control Server (CCS) application, as initially\nreported in SSA-761617 (\nhttps://cert-portal.siemens.com/productcert/html/ssa-761617.html) on 2019-12-10\nand SSA-844761 (https://cert-portal.siemens.com/productcert/html/ssa-844761.html) on 2020-03-10.\nThe vulnerabilities involve authentication bypass (CVE-2019-18337, CVE-2019-18341),\npath traversal (CVE-2019-18338, CVE-2019-19290), information disclosure (CVE-2019-13947, CVE-2019-18340, CVE-2019-19291),\nprivilege escalation (CVE-2019-18342), SQL injection (CVE-2019-19292), cross-site scripting (CVE-2019-19293, CVE-2019-19294), and\ninsufficient logging (CVE-2019-19295).\n\nPKE has released an update for CCS that fixes the reported vulnerabilities, except for CVE-2019-18340. For details contact PKE (\nhttps://pke.at/).\nSiemens recommends to update to the latest version and recommends specific countermeasures to mitigate the vulnerabilities.", "title": "Summary" }, { "category": "general", "text": "As a general security measure Siemens strongly recommends to protect network access to affected products with appropriate mechanisms. It is advised to follow recommended security practices in order to run the devices in a protected IT environment.", "title": "General Recommendations" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "legal_disclaimer", "text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "productcert@siemens.com", "name": "Siemens ProductCERT", "namespace": "https://www.siemens.com" }, "references": [ { "category": "self", "summary": "SSA-761844: Multiple Vulnerabilities in Control Center Server (CCS) - HTML Version", "url": "https://cert-portal.siemens.com/productcert/html/ssa-761844.html" }, { "category": "self", "summary": "SSA-761844: Multiple Vulnerabilities in Control Center Server (CCS) - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-761844.json" }, { "category": "self", "summary": "SSA-761844: Multiple Vulnerabilities in Control Center Server (CCS) - PDF Version", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-761844.pdf" }, { "category": "self", "summary": "SSA-761844: Multiple Vulnerabilities in Control Center Server (CCS) - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/ssa-761844.txt" } ], "title": "SSA-761844: Multiple Vulnerabilities in Control Center Server (CCS)", "tracking": { "current_release_date": "2024-01-09T00:00:00Z", "generator": { "engine": { "name": "Siemens ProductCERT CSAF Generator", "version": "1" } }, "id": "SSA-761844", "initial_release_date": "2021-04-13T00:00:00Z", "revision_history": [ { "date": "2021-04-13T00:00:00Z", "legacy_version": "1.0", "number": "1", "summary": "Publication Date" }, { "date": "2024-01-09T00:00:00Z", "legacy_version": "1.1", "number": "2", "summary": "Cleanup: removed orphaned links to vendor advisories and software downloads" } ], "status": "interim", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003cV1.5.0", "product": { "name": "Control Center Server (CCS)", "product_id": "1" } }, { "category": "product_version_range", "name": "\u003e=V1.5.0", "product": { "name": "Control Center Server (CCS)", "product_id": "2" } } ], "category": "product_name", "name": "Control Center Server (CCS)" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-13947", "cwe": { "id": "CWE-317", "name": "Cleartext Storage of Sensitive Information in GUI" }, "notes": [ { "category": "summary", "text": "The user configuration menu in the web interface of the\nControl Center Server (CCS) transfers user passwords in clear to the\nclient (browser).\n\nAn attacker with administrative privileges for the web interface could be\nable to read (and not only reset) passwords of other CCS users.\n", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "mitigation", "details": "Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "1" ] }, { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:F/RL:U/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2019-13947" }, { "cve": "CVE-2019-18337", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "The Control Center Server (CCS) contains an authentication bypass\nvulnerability in its XML-based communication protocol as provided by default\non ports 5444/tcp and 5440/tcp.\n\nA remote attacker with network access to the CCS server could\nexploit this vulnerability to read the CCS users database, including\nthe passwords of all users in obfuscated cleartext.\n", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "mitigation", "details": "Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "1" ] }, { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:U/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2019-18337" }, { "cve": "CVE-2019-18338", "cwe": { "id": "CWE-23", "name": "Relative Path Traversal" }, "notes": [ { "category": "summary", "text": "The Control Center Server (CCS) contains a directory traversal\nvulnerability in its XML-based communication protocol as provided by default\non ports 5444/tcp and 5440/tcp.\n\nAn authenticated remote attacker with network access to the CCS server\ncould exploit this vulnerability to list arbitrary directories\nor read files outside of the CCS application context.\n", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "mitigation", "details": "Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "1" ] }, { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:F/RL:U/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2019-18338" }, { "cve": "CVE-2019-18340", "cwe": { "id": "CWE-327", "name": "Use of a Broken or Risky Cryptographic Algorithm" }, "notes": [ { "category": "summary", "text": "Both the SiVMS/SiNVR Video Server and the Control Center Server (CCS) store\nuser and device passwords by applying weak cryptography.\n\nA local attacker could exploit this vulnerability to extract\nthe passwords from the user database and/or the device configuration files\nto conduct further attacks.\n", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2" ] }, "remediations": [ { "category": "mitigation", "details": "Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "1", "2" ] }, { "category": "mitigation", "details": "CVE-2019-18340: Harden the CCS server to prevent local access by unauthorized users", "product_ids": [ "1", "2" ] }, { "category": "no_fix_planned", "details": "Currently no fix is planned", "product_ids": [ "2" ] }, { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:F/RL:U/RC:C", "version": "3.1" }, "products": [ "1", "2" ] } ], "title": "CVE-2019-18340" }, { "cve": "CVE-2019-18341", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "The SFTP service (default port 22/tcp) of the Control Center Server\n(CCS) contains an authentication bypass vulnerability.\n\nA remote attacker with network access to the CCS server could\nexploit this vulnerability to read data from the EDIR directory\n(for example, the list of all configured stations).\n", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "mitigation", "details": "Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "1" ] }, { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:F/RL:U/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2019-18341" }, { "cve": "CVE-2019-18342", "cwe": { "id": "CWE-749", "name": "Exposed Dangerous Method or Function" }, "notes": [ { "category": "summary", "text": "The SFTP service (default port 22/tcp) of the Control Center Server\n(CCS) does not properly limit its capabilities to the specified purpose.\n\nIn conjunction with CVE-2019-18341, an unauthenticated remote attacker with\nnetwork access to the CCS server could exploit this vulnerability\nto read or delete arbitrary files, or access other resources on the same\nserver.\n", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "mitigation", "details": "Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "1" ] }, { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.9, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:F/RL:U/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2019-18342" }, { "cve": "CVE-2019-19290", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "summary", "text": "The DOWNLOADS section in the web interface of the Control Center\nServer (CCS) contains a path traversal vulnerability\nthat could allow an authenticated remote attacker to access and download\narbitrary files from the server where CCS is installed.\n", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "mitigation", "details": "Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "1" ] }, { "category": "mitigation", "details": "CVE-2019-19290, CVE-2019-19293, CVE-2019-19294: Disable the web interface of CCS if not used. Alternatively, restrict access from localhost only, or only to trusted hosts of CCS administrators. Enable TLS for the web interface of CCS.", "product_ids": [ "1" ] }, { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:U/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2019-19290" }, { "cve": "CVE-2019-19291", "cwe": { "id": "CWE-313", "name": "Cleartext Storage in a File or on Disk" }, "notes": [ { "category": "summary", "text": "The FTP services of the SiVMS/SiNVR Video Server and the Control Center Server (CCS) maintain\nlog files that store login credentials in cleartext.\nIn configurations where the FTP service is enabled, authenticated remote\nattackers could extract login credentials of other users of the service.\n\n", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "mitigation", "details": "Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "1" ] }, { "category": "mitigation", "details": "CVE-2019-19291: Disable the FTP service of the CCS", "product_ids": [ "1" ] }, { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:U/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2019-19291" }, { "cve": "CVE-2019-19292", "cwe": { "id": "CWE-89", "name": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)" }, "notes": [ { "category": "summary", "text": "The Control Center Server (CCS) contains an SQL injection\nvulnerability in its XML-based communication protocol as provided by default\non ports 5444/tcp and 5440/tcp.\nAn authenticated remote attacker could exploit this vulnerability to\nread or modify the CCS database and potentially execute administrative\ndatabase operations or operating system commands.\n", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "mitigation", "details": "Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "1" ] }, { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2019-19292" }, { "cve": "CVE-2019-19293", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "summary", "text": "The web interface of the Control Center Server (CCS) contains a\nreflected Cross-site Scripting (XSS) vulnerability\nthat could allow an unauthenticated remote attacker to steal sensitive data\nor execute administrative actions on behalf of a legitimate administrator\nof the CCS web interface.\n", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "mitigation", "details": "Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "1" ] }, { "category": "mitigation", "details": "CVE-2019-19290, CVE-2019-19293, CVE-2019-19294: Disable the web interface of CCS if not used. Alternatively, restrict access from localhost only, or only to trusted hosts of CCS administrators. Enable TLS for the web interface of CCS.", "product_ids": [ "1" ] }, { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N/E:P/RL:U/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2019-19293" }, { "cve": "CVE-2019-19294", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "summary", "text": "The web interface of the Control Center Server (CCS) contains\nmultiple stored Cross-site Scripting (XSS) vulnerabilities in several input\nfields.\nThis could allow an authenticated remote attacker to inject malicious\nJavaScript code into the CCS web application that is later executed\nin the browser context of any other user who views the relevant CCS\nweb content.\n", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "mitigation", "details": "Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "1" ] }, { "category": "mitigation", "details": "CVE-2019-19290, CVE-2019-19293, CVE-2019-19294: Disable the web interface of CCS if not used. Alternatively, restrict access from localhost only, or only to trusted hosts of CCS administrators. Enable TLS for the web interface of CCS.", "product_ids": [ "1" ] }, { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:N/E:P/RL:U/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2019-19294" }, { "cve": "CVE-2019-19295", "cwe": { "id": "CWE-778", "name": "Insufficient Logging" }, "notes": [ { "category": "summary", "text": "The Control Center Server (CCS) does not enforce logging of\nsecurity-relevant activities in its XML-based communication protocol\nas provided by default on ports 5444/tcp and 5440/tcp.\nAn authenticated remote attacker could exploit this vulnerability to\nperform covert actions that are not visible in the application log.\n", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "mitigation", "details": "Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "1" ] }, { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:P/RL:U/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2019-19295" } ] }
SSA-761844
Vulnerability from csaf_siemens
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)", "tlp": { "label": "WHITE" } }, "lang": "en", "notes": [ { "category": "summary", "text": "The advisory informs about multiple vulnerabilities in the Central Control Server (CCS) application, as initially\nreported in SSA-761617 (\nhttps://cert-portal.siemens.com/productcert/html/ssa-761617.html) on 2019-12-10\nand SSA-844761 (https://cert-portal.siemens.com/productcert/html/ssa-844761.html) on 2020-03-10.\nThe vulnerabilities involve authentication bypass (CVE-2019-18337, CVE-2019-18341),\npath traversal (CVE-2019-18338, CVE-2019-19290), information disclosure (CVE-2019-13947, CVE-2019-18340, CVE-2019-19291),\nprivilege escalation (CVE-2019-18342), SQL injection (CVE-2019-19292), cross-site scripting (CVE-2019-19293, CVE-2019-19294), and\ninsufficient logging (CVE-2019-19295).\n\nPKE has released an update for CCS that fixes the reported vulnerabilities, except for CVE-2019-18340. For details contact PKE (\nhttps://pke.at/).\nSiemens recommends to update to the latest version and recommends specific countermeasures to mitigate the vulnerabilities.", "title": "Summary" }, { "category": "general", "text": "As a general security measure Siemens strongly recommends to protect network access to affected products with appropriate mechanisms. It is advised to follow recommended security practices in order to run the devices in a protected IT environment.", "title": "General Recommendations" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "legal_disclaimer", "text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "productcert@siemens.com", "name": "Siemens ProductCERT", "namespace": "https://www.siemens.com" }, "references": [ { "category": "self", "summary": "SSA-761844: Multiple Vulnerabilities in Control Center Server (CCS) - HTML Version", "url": "https://cert-portal.siemens.com/productcert/html/ssa-761844.html" }, { "category": "self", "summary": "SSA-761844: Multiple Vulnerabilities in Control Center Server (CCS) - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-761844.json" }, { "category": "self", "summary": "SSA-761844: Multiple Vulnerabilities in Control Center Server (CCS) - PDF Version", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-761844.pdf" }, { "category": "self", "summary": "SSA-761844: Multiple Vulnerabilities in Control Center Server (CCS) - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/ssa-761844.txt" } ], "title": "SSA-761844: Multiple Vulnerabilities in Control Center Server (CCS)", "tracking": { "current_release_date": "2024-01-09T00:00:00Z", "generator": { "engine": { "name": "Siemens ProductCERT CSAF Generator", "version": "1" } }, "id": "SSA-761844", "initial_release_date": "2021-04-13T00:00:00Z", "revision_history": [ { "date": "2021-04-13T00:00:00Z", "legacy_version": "1.0", "number": "1", "summary": "Publication Date" }, { "date": "2024-01-09T00:00:00Z", "legacy_version": "1.1", "number": "2", "summary": "Cleanup: removed orphaned links to vendor advisories and software downloads" } ], "status": "interim", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003cV1.5.0", "product": { "name": "Control Center Server (CCS)", "product_id": "1" } }, { "category": "product_version_range", "name": "\u003e=V1.5.0", "product": { "name": "Control Center Server (CCS)", "product_id": "2" } } ], "category": "product_name", "name": "Control Center Server (CCS)" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-13947", "cwe": { "id": "CWE-317", "name": "Cleartext Storage of Sensitive Information in GUI" }, "notes": [ { "category": "summary", "text": "The user configuration menu in the web interface of the\nControl Center Server (CCS) transfers user passwords in clear to the\nclient (browser).\n\nAn attacker with administrative privileges for the web interface could be\nable to read (and not only reset) passwords of other CCS users.\n", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "mitigation", "details": "Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "1" ] }, { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:F/RL:U/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2019-13947" }, { "cve": "CVE-2019-18337", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "The Control Center Server (CCS) contains an authentication bypass\nvulnerability in its XML-based communication protocol as provided by default\non ports 5444/tcp and 5440/tcp.\n\nA remote attacker with network access to the CCS server could\nexploit this vulnerability to read the CCS users database, including\nthe passwords of all users in obfuscated cleartext.\n", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "mitigation", "details": "Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "1" ] }, { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:U/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2019-18337" }, { "cve": "CVE-2019-18338", "cwe": { "id": "CWE-23", "name": "Relative Path Traversal" }, "notes": [ { "category": "summary", "text": "The Control Center Server (CCS) contains a directory traversal\nvulnerability in its XML-based communication protocol as provided by default\non ports 5444/tcp and 5440/tcp.\n\nAn authenticated remote attacker with network access to the CCS server\ncould exploit this vulnerability to list arbitrary directories\nor read files outside of the CCS application context.\n", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "mitigation", "details": "Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "1" ] }, { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:F/RL:U/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2019-18338" }, { "cve": "CVE-2019-18340", "cwe": { "id": "CWE-327", "name": "Use of a Broken or Risky Cryptographic Algorithm" }, "notes": [ { "category": "summary", "text": "Both the SiVMS/SiNVR Video Server and the Control Center Server (CCS) store\nuser and device passwords by applying weak cryptography.\n\nA local attacker could exploit this vulnerability to extract\nthe passwords from the user database and/or the device configuration files\nto conduct further attacks.\n", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2" ] }, "remediations": [ { "category": "mitigation", "details": "Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "1", "2" ] }, { "category": "mitigation", "details": "CVE-2019-18340: Harden the CCS server to prevent local access by unauthorized users", "product_ids": [ "1", "2" ] }, { "category": "no_fix_planned", "details": "Currently no fix is planned", "product_ids": [ "2" ] }, { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:F/RL:U/RC:C", "version": "3.1" }, "products": [ "1", "2" ] } ], "title": "CVE-2019-18340" }, { "cve": "CVE-2019-18341", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "The SFTP service (default port 22/tcp) of the Control Center Server\n(CCS) contains an authentication bypass vulnerability.\n\nA remote attacker with network access to the CCS server could\nexploit this vulnerability to read data from the EDIR directory\n(for example, the list of all configured stations).\n", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "mitigation", "details": "Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "1" ] }, { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:F/RL:U/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2019-18341" }, { "cve": "CVE-2019-18342", "cwe": { "id": "CWE-749", "name": "Exposed Dangerous Method or Function" }, "notes": [ { "category": "summary", "text": "The SFTP service (default port 22/tcp) of the Control Center Server\n(CCS) does not properly limit its capabilities to the specified purpose.\n\nIn conjunction with CVE-2019-18341, an unauthenticated remote attacker with\nnetwork access to the CCS server could exploit this vulnerability\nto read or delete arbitrary files, or access other resources on the same\nserver.\n", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "mitigation", "details": "Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "1" ] }, { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.9, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:F/RL:U/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2019-18342" }, { "cve": "CVE-2019-19290", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "summary", "text": "The DOWNLOADS section in the web interface of the Control Center\nServer (CCS) contains a path traversal vulnerability\nthat could allow an authenticated remote attacker to access and download\narbitrary files from the server where CCS is installed.\n", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "mitigation", "details": "Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "1" ] }, { "category": "mitigation", "details": "CVE-2019-19290, CVE-2019-19293, CVE-2019-19294: Disable the web interface of CCS if not used. Alternatively, restrict access from localhost only, or only to trusted hosts of CCS administrators. Enable TLS for the web interface of CCS.", "product_ids": [ "1" ] }, { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:U/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2019-19290" }, { "cve": "CVE-2019-19291", "cwe": { "id": "CWE-313", "name": "Cleartext Storage in a File or on Disk" }, "notes": [ { "category": "summary", "text": "The FTP services of the SiVMS/SiNVR Video Server and the Control Center Server (CCS) maintain\nlog files that store login credentials in cleartext.\nIn configurations where the FTP service is enabled, authenticated remote\nattackers could extract login credentials of other users of the service.\n\n", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "mitigation", "details": "Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "1" ] }, { "category": "mitigation", "details": "CVE-2019-19291: Disable the FTP service of the CCS", "product_ids": [ "1" ] }, { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:U/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2019-19291" }, { "cve": "CVE-2019-19292", "cwe": { "id": "CWE-89", "name": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)" }, "notes": [ { "category": "summary", "text": "The Control Center Server (CCS) contains an SQL injection\nvulnerability in its XML-based communication protocol as provided by default\non ports 5444/tcp and 5440/tcp.\nAn authenticated remote attacker could exploit this vulnerability to\nread or modify the CCS database and potentially execute administrative\ndatabase operations or operating system commands.\n", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "mitigation", "details": "Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "1" ] }, { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2019-19292" }, { "cve": "CVE-2019-19293", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "summary", "text": "The web interface of the Control Center Server (CCS) contains a\nreflected Cross-site Scripting (XSS) vulnerability\nthat could allow an unauthenticated remote attacker to steal sensitive data\nor execute administrative actions on behalf of a legitimate administrator\nof the CCS web interface.\n", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "mitigation", "details": "Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "1" ] }, { "category": "mitigation", "details": "CVE-2019-19290, CVE-2019-19293, CVE-2019-19294: Disable the web interface of CCS if not used. Alternatively, restrict access from localhost only, or only to trusted hosts of CCS administrators. Enable TLS for the web interface of CCS.", "product_ids": [ "1" ] }, { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N/E:P/RL:U/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2019-19293" }, { "cve": "CVE-2019-19294", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "summary", "text": "The web interface of the Control Center Server (CCS) contains\nmultiple stored Cross-site Scripting (XSS) vulnerabilities in several input\nfields.\nThis could allow an authenticated remote attacker to inject malicious\nJavaScript code into the CCS web application that is later executed\nin the browser context of any other user who views the relevant CCS\nweb content.\n", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "mitigation", "details": "Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "1" ] }, { "category": "mitigation", "details": "CVE-2019-19290, CVE-2019-19293, CVE-2019-19294: Disable the web interface of CCS if not used. Alternatively, restrict access from localhost only, or only to trusted hosts of CCS administrators. Enable TLS for the web interface of CCS.", "product_ids": [ "1" ] }, { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:N/E:P/RL:U/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2019-19294" }, { "cve": "CVE-2019-19295", "cwe": { "id": "CWE-778", "name": "Insufficient Logging" }, "notes": [ { "category": "summary", "text": "The Control Center Server (CCS) does not enforce logging of\nsecurity-relevant activities in its XML-based communication protocol\nas provided by default on ports 5444/tcp and 5440/tcp.\nAn authenticated remote attacker could exploit this vulnerability to\nperform covert actions that are not visible in the application log.\n", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "mitigation", "details": "Apply ACL/firewall configuration on the CCS server to ensure that only legitimate systems are able to access the configured CCS server ports. Harden the CCS server accordingly to prevent unauthorized access. Consider to apply encryption and authentication on the network (e.g., via TLS on application level or via IPSec on host level).", "product_ids": [ "1" ] }, { "category": "vendor_fix", "details": "Update to V1.5.0 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:P/RL:U/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2019-19295" } ] }
ssa-761617
Vulnerability from csaf_siemens
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)", "tlp": { "label": "WHITE" } }, "lang": "en", "notes": [ { "category": "summary", "text": "The Video Server application in SiNVR/SiVMS solutions contains two vulnerabilities\ninvolving authentication bypass (CVE-2019-18339) and information disclosure (CVE-2019-18340).\n\nPKE has released an update of the application that fixes CVE-2019-18339.\nThis update is not available under the former Siemens OEM brand name SiNVR. For details contact PKE (\nhttps://pke.at/).\nSiemens recommends specific countermeasures to mitigate the vulnerabilities.", "title": "Summary" }, { "category": "general", "text": "As a general security measure Siemens strongly recommends to protect network access to affected products with appropriate mechanisms. It is advised to follow recommended security practices in order to run the devices in a protected IT environment.", "title": "General Recommendations" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "legal_disclaimer", "text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "productcert@siemens.com", "name": "Siemens ProductCERT", "namespace": "https://www.siemens.com" }, "references": [ { "category": "self", "summary": "SSA-761617: Authentication Bypass and Information Disclosure Vulnerabilities in SiNVR/SiVMS Video Server - HTML Version", "url": "https://cert-portal.siemens.com/productcert/html/ssa-761617.html" }, { "category": "self", "summary": "SSA-761617: Authentication Bypass and Information Disclosure Vulnerabilities in SiNVR/SiVMS Video Server - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-761617.json" }, { "category": "self", "summary": "SSA-761617: Authentication Bypass and Information Disclosure Vulnerabilities in SiNVR/SiVMS Video Server - PDF Version", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-761617.pdf" }, { "category": "self", "summary": "SSA-761617: Authentication Bypass and Information Disclosure Vulnerabilities in SiNVR/SiVMS Video Server - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/ssa-761617.txt" } ], "title": "SSA-761617: Authentication Bypass and Information Disclosure Vulnerabilities in SiNVR/SiVMS Video Server", "tracking": { "current_release_date": "2024-01-09T00:00:00Z", "generator": { "engine": { "name": "Siemens ProductCERT CSAF Generator", "version": "1" } }, "id": "SSA-761617", "initial_release_date": "2019-12-10T00:00:00Z", "revision_history": [ { "date": "2019-12-10T00:00:00Z", "legacy_version": "1.0", "number": "1", "summary": "Publication Date" }, { "date": "2021-04-13T00:00:00Z", "legacy_version": "1.1", "number": "2", "summary": "Added partial solution for SiNVR/SiVMS Video Server; removed information for Control Center Server (CCS), which is now addressed in SSA-761844" }, { "date": "2024-01-09T00:00:00Z", "legacy_version": "1.2", "number": "3", "summary": "Cleanup: removed orphaned links to vendor advisories and software downloads" } ], "status": "interim", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003cV5.0.0", "product": { "name": "SiNVR/SiVMS Video Server", "product_id": "1" } }, { "category": "product_version_range", "name": "\u003e=V5.0.0", "product": { "name": "SiNVR/SiVMS Video Server", "product_id": "2" } } ], "category": "product_name", "name": "SiNVR/SiVMS Video Server" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-18339", "cwe": { "id": "CWE-306", "name": "Missing Authentication for Critical Function" }, "notes": [ { "category": "summary", "text": "The HTTP service (default port 5401/tcp) of the SiVMS/SiNVR Video Server\ncontains an authentication bypass vulnerability, even when properly\nconfigured with enforced authentication.\n\nA remote attacker with network access to the Video Server could \nexploit this vulnerability to read the SiVMS/SiNVR users database, including\nthe passwords of all users in obfuscated cleartext.\n", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "mitigation", "details": "Apply ACL/firewall configuration on the Video Servers to ensure that only legitimate systems are able to access the configured server ports. Harden all systems accordingly to prevent unauthorized access", "product_ids": [ "1" ] }, { "category": "mitigation", "details": "CVE-2019-18339: SiNVR/SiVMS deployments with active Control Center Server (CCS) should ensure that every video server and client has the Authorization Server set to \"Control Center Server\" (Configuration -\u003e Appearance -\u003e Desktop -\u003e Authorization Server)", "product_ids": [ "1" ] }, { "category": "vendor_fix", "details": "Update to V5.0.0 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:U/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2019-18339" }, { "cve": "CVE-2019-18340", "cwe": { "id": "CWE-327", "name": "Use of a Broken or Risky Cryptographic Algorithm" }, "notes": [ { "category": "summary", "text": "Both the SiVMS/SiNVR Video Server and the Control Center Server (CCS) store\nuser and device passwords by applying weak cryptography.\n\nA local attacker could exploit this vulnerability to extract\nthe passwords from the user database and/or the device configuration files\nto conduct further attacks.\n", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2" ] }, "remediations": [ { "category": "mitigation", "details": "Apply ACL/firewall configuration on the Video Servers to ensure that only legitimate systems are able to access the configured server ports. Harden all systems accordingly to prevent unauthorized access", "product_ids": [ "1", "2" ] }, { "category": "mitigation", "details": "CVE-2019-18340: Harden the Video Servers to prevent local access by unauthorized users", "product_ids": [ "1", "2" ] }, { "category": "no_fix_planned", "details": "Currently no fix is planned", "product_ids": [ "2" ] }, { "category": "vendor_fix", "details": "Update to V5.0.0 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:F/RL:U/RC:C", "version": "3.1" }, "products": [ "1", "2" ] } ], "title": "CVE-2019-18340" } ] }
ghsa-9mrf-w63c-fxfh
Vulnerability from github
A vulnerability has been identified in SiNVR 3 Central Control Server (CCS) (all versions), SiNVR 3 Video Server (all versions). Both the SiNVR 3 Video Server and the Central Control Server (CCS) store user and device passwords by applying weak cryptography. A local attacker could exploit this vulnerability to extract the passwords from the user database and/or the device configuration files to conduct further attacks.
{ "affected": [], "aliases": [ "CVE-2019-18340" ], "database_specific": { "cwe_ids": [ "CWE-261", "CWE-327" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2019-12-12T19:15:00Z", "severity": "LOW" }, "details": "A vulnerability has been identified in SiNVR 3 Central Control Server (CCS) (all versions), SiNVR 3 Video Server (all versions). Both the SiNVR 3 Video Server and the Central Control Server (CCS) store user and device passwords by applying weak cryptography. A local attacker could exploit this vulnerability to extract the passwords from the user database and/or the device configuration files to conduct further attacks.", "id": "GHSA-9mrf-w63c-fxfh", "modified": "2024-01-09T12:30:34Z", "published": "2022-05-24T17:03:29Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-18340" }, { "type": "WEB", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-761617.pdf" }, { "type": "WEB", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-761844.pdf" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ] }
var-201912-1244
Vulnerability from variot
A vulnerability has been identified in Control Center Server (CCS) (All versions < V1.5.0), Control Center Server (CCS) (All versions >= V1.5.0), SiNVR/SiVMS Video Server (All versions < V5.0.0), SiNVR/SiVMS Video Server (All versions >= V5.0.0). Both the SiVMS/SiNVR Video Server and the Control Center Server (CCS) store user and device passwords by applying weak cryptography.
A local attacker could exploit this vulnerability to extract the passwords from the user database and/or the device configuration files to conduct further attacks. SiNVR is the Siemens OEM version of SiVMS, a video management solution acquired by PKE Deutsch land gmmbH and previously distributed by Schille Informationssysteme gmmbH. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201912-1244", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sinvr 3 video server", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "sinvr 3 central control server", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "sinvr 3 central control server", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "sinvr 3 video server", "scope": "eq", "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "sinvr central control server", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "3" }, { "model": "sinvr video server", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "3" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sinvr 3 central control server", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sinvr 3 video server", "version": "*" } ], "sources": [ { "db": "IVD", "id": "263cae96-e971-4fbb-b54a-38953fb22b00" }, { "db": "CNVD", "id": "CNVD-2019-44757" }, { "db": "JVNDB", "id": "JVNDB-2019-013200" }, { "db": "NVD", "id": "CVE-2019-18340" } ] }, "cve": "CVE-2019-18340", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2019-18340", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.9, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 4.9, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CNVD-2019-44757", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "IVD", "availabilityImpact": "NONE", "baseScore": 4.9, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "263cae96-e971-4fbb-b54a-38953fb22b00", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:N/A:N", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2019-18340", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 2.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-18340", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-18340", "trust": 1.0, "value": "MEDIUM" }, { "author": "productcert@siemens.com", "id": "CVE-2019-18340", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2019-18340", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2019-44757", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202104-975", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201912-424", "trust": 0.6, "value": "MEDIUM" }, { "author": "IVD", "id": "263cae96-e971-4fbb-b54a-38953fb22b00", "trust": 0.2, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2019-18340", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "IVD", "id": "263cae96-e971-4fbb-b54a-38953fb22b00" }, { "db": "CNVD", "id": "CNVD-2019-44757" }, { "db": "VULMON", "id": "CVE-2019-18340" }, { "db": "JVNDB", "id": "JVNDB-2019-013200" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-201912-424" }, { "db": "NVD", "id": "CVE-2019-18340" }, { "db": "NVD", "id": "CVE-2019-18340" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in Control Center Server (CCS) (All versions \u003c V1.5.0), Control Center Server (CCS) (All versions \u003e= V1.5.0), SiNVR/SiVMS Video Server (All versions \u003c V5.0.0), SiNVR/SiVMS Video Server (All versions \u003e= V5.0.0). Both the SiVMS/SiNVR Video Server and the Control Center Server (CCS) store\nuser and device passwords by applying weak cryptography. \n\nA local attacker could exploit this vulnerability to extract\nthe passwords from the user database and/or the device configuration files\nto conduct further attacks. SiNVR is the Siemens OEM version of SiVMS, a video management solution acquired by PKE Deutsch land gmmbH and previously distributed by Schille Informationssysteme gmmbH. Pillow is a Python-based image processing library. \nThere is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements", "sources": [ { "db": "NVD", "id": "CVE-2019-18340" }, { "db": "JVNDB", "id": "JVNDB-2019-013200" }, { "db": "CNVD", "id": "CNVD-2019-44757" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "IVD", "id": "263cae96-e971-4fbb-b54a-38953fb22b00" }, { "db": "VULMON", "id": "CVE-2019-18340" } ], "trust": 2.97 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-18340", "trust": 3.3 }, { "db": "SIEMENS", "id": "SSA-761617", "trust": 2.3 }, { "db": "SIEMENS", "id": "SSA-761844", "trust": 1.7 }, { "db": "ICS CERT", "id": "ICSA-19-344-02", "trust": 1.4 }, { "db": "CNVD", "id": "CNVD-2019-44757", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201912-424", "trust": 0.8 }, { "db": "JVN", "id": "JVNVU96269392", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-013200", "trust": 0.8 }, { "db": "CS-HELP", "id": "SB2021041363", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202104-975", "trust": 0.6 }, { "db": "ICS CERT", "id": "ICSA-21-103-10", "trust": 0.6 }, { "db": "ICS CERT", "id": "ICSA-19-344-01", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.4625", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.1240", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021041518", "trust": 0.6 }, { "db": "IVD", "id": "263CAE96-E971-4FBB-B54A-38953FB22B00", "trust": 0.2 }, { "db": "VULMON", "id": "CVE-2019-18340", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "263cae96-e971-4fbb-b54a-38953fb22b00" }, { "db": "CNVD", "id": "CNVD-2019-44757" }, { "db": "VULMON", "id": "CVE-2019-18340" }, { "db": "JVNDB", "id": "JVNDB-2019-013200" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-201912-424" }, { "db": "NVD", "id": "CVE-2019-18340" } ] }, "id": "VAR-201912-1244", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "263cae96-e971-4fbb-b54a-38953fb22b00" }, { "db": "CNVD", "id": "CNVD-2019-44757" } ], "trust": 1.454873825 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "263cae96-e971-4fbb-b54a-38953fb22b00" }, { "db": "CNVD", "id": "CNVD-2019-44757" } ] }, "last_update_date": "2024-11-23T20:08:24.029000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-761617", "trust": 0.8, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-761617.pdf" }, { "title": "Patch for Siemens SiNVR 3 Video Server and SiNVR 3 Central Control Server (CCS) Information Disclosure Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/193675" }, { "title": "Siemens Security Advisories: Siemens Security Advisory", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=03dd7efb196bdf8da925c4ca8f3d02f6" }, { "title": "Siemens Security Advisories: Siemens Security Advisory", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=98fa33ab2106a639337b5db77c71e637" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-44757" }, { "db": "VULMON", "id": "CVE-2019-18340" }, { "db": "JVNDB", "id": "JVNDB-2019-013200" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-327", "trust": 1.0 }, { "problemtype": "information leak (CWE-200) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013200" }, { "db": "NVD", "id": "CVE-2019-18340" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-761617.pdf" }, { "trust": 1.7, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-761844.pdf" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18340" }, { "trust": 1.4, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-344-02" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu96269392/index.html" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021041363" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-103-10" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.1240" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4625/" }, { "trust": 0.6, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-344-01" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021041518" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/327.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://cert-portal.siemens.com/productcert/txt/ssa-761844.txt" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-44757" }, { "db": "VULMON", "id": "CVE-2019-18340" }, { "db": "JVNDB", "id": "JVNDB-2019-013200" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-201912-424" }, { "db": "NVD", "id": "CVE-2019-18340" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "263cae96-e971-4fbb-b54a-38953fb22b00" }, { "db": "CNVD", "id": "CNVD-2019-44757" }, { "db": "VULMON", "id": "CVE-2019-18340" }, { "db": "JVNDB", "id": "JVNDB-2019-013200" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-201912-424" }, { "db": "NVD", "id": "CVE-2019-18340" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-11T00:00:00", "db": "IVD", "id": "263cae96-e971-4fbb-b54a-38953fb22b00" }, { "date": "2019-12-11T00:00:00", "db": "CNVD", "id": "CNVD-2019-44757" }, { "date": "2019-12-12T00:00:00", "db": "VULMON", "id": "CVE-2019-18340" }, { "date": "2019-12-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013200" }, { "date": "2021-04-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202104-975" }, { "date": "2019-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-424" }, { "date": "2019-12-12T19:15:20.560000", "db": "NVD", "id": "CVE-2019-18340" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-11T00:00:00", "db": "CNVD", "id": "CNVD-2019-44757" }, { "date": "2021-04-22T00:00:00", "db": "VULMON", "id": "CVE-2019-18340" }, { "date": "2021-04-16T09:16:00", "db": "JVNDB", "id": "JVNDB-2019-013200" }, { "date": "2021-04-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202104-975" }, { "date": "2021-04-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-424" }, { "date": "2024-11-21T04:33:04.860000", "db": "NVD", "id": "CVE-2019-18340" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-424" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SiNVR\u00a03\u00a0Central\u00a0Control\u00a0Server\u00a0 and \u00a0Video\u00a0Server\u00a0 Information Disclosure Vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013200" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202104-975" } ], "trust": 0.6 } }
CERTFR-2019-AVI-615
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Siemens | N/A | SPPA-T3000 MS3000 Migration Server | ||
Siemens | N/A | SiNVR 3 Central Control Server (CCS) | ||
Siemens | N/A | SIMATIC S7-1200 CPU | ||
Siemens | N/A | RUGGEDCOM ROS RSG9xx R/C | ||
Siemens | N/A | RUGGEDCOM ROS RMC8388 | ||
Siemens | N/A | EN100 Ethernet module Modbus TCP | ||
Siemens | N/A | SIMATIC WinCC OA | ||
Siemens | N/A | SIMATIC CP 1626 | ||
Siemens | N/A | SCALANCE W700 versions antérieures à V6.4 | ||
Siemens | N/A | SIMATIC NET PC | ||
Siemens | N/A | SIMATIC WinCC Runtime Professional | ||
Siemens | N/A | EN100 Ethernet module IEC 61850 versions antérieures à V4.37 | ||
Siemens | N/A | SPPA-T3000 Application Server versions antérieures à Service Pack R8.2 SP1 | ||
Siemens | N/A | SIMATIC WinCC Runtime Advanced | ||
Siemens | N/A | RUGGEDCOM ROS RSL910 | ||
Siemens | N/A | SIMATIC WinCC (TIA Portal) versions antérieures à V16 | ||
Siemens | N/A | Famille de commutateurs SCALANCE X-200IRT et les variantes SIPLUSNET versions antérieures à V5.4.2 | ||
Siemens | N/A | SIMATIC S7-200 SMART CPU | ||
Siemens | N/A | SIMATIC WinCC OA versions antérieures à 3.16 patch version 13 | ||
Siemens | N/A | SiNVR 3 Video Server | ||
Siemens | N/A | EN100 Ethernet module DNP3 | ||
Siemens | N/A | SCALANCE W1700 versions antérieures à V1.1 | ||
Siemens | N/A | RUGGEDCOM ROS RSG2488 | ||
Siemens | N/A | EN100 Ethernet module PROFINET IO | ||
Siemens | N/A | EN100 Ethernet module IEC104 | ||
Siemens | N/A | RUGGEDCOM ROS RSG920P | ||
Siemens | N/A | TIM 1531 IRC | ||
Siemens | N/A | XHQ versions antérieures à V6.0.0.2 | ||
Siemens | N/A | SIMATIC STEP 7 (TIA Portal) versions antérieures à V16 | ||
Siemens | N/A | RUGGEDCOM ROS RST2228 | ||
Siemens | N/A | SIMATIC HMI Panel | ||
Siemens | N/A | Famille de commutateurs SCALANCE X-200 et les variantes SIPLUSNET versions antérieures à V5.2.4 |
Title | Publication Time | Tags | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "SPPA-T3000 MS3000 Migration Server", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SiNVR 3 Central Control Server (CCS)", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIMATIC S7-1200 CPU", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM ROS RSG9xx R/C", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM ROS RMC8388", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "EN100 Ethernet module Modbus TCP", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIMATIC WinCC OA", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIMATIC CP 1626", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W700 versions ant\u00e9rieures \u00e0 V6.4", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIMATIC NET PC", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIMATIC WinCC Runtime Professional", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "EN100 Ethernet module IEC 61850 versions ant\u00e9rieures \u00e0 V4.37", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SPPA-T3000 Application Server versions ant\u00e9rieures \u00e0 Service Pack R8.2 SP1", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIMATIC WinCC Runtime Advanced", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM ROS RSL910", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIMATIC WinCC (TIA Portal) versions ant\u00e9rieures \u00e0 V16", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Famille de commutateurs SCALANCE X-200IRT et les variantes SIPLUSNET versions ant\u00e9rieures \u00e0 V5.4.2", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIMATIC S7-200 SMART CPU", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIMATIC WinCC OA versions ant\u00e9rieures \u00e0 3.16 patch version 13", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SiNVR 3 Video Server", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "EN100 Ethernet module DNP3", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W1700 versions ant\u00e9rieures \u00e0 V1.1", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM ROS RSG2488", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "EN100 Ethernet module PROFINET IO", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "EN100 Ethernet module IEC104", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM ROS RSG920P", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "TIM 1531 IRC", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "XHQ versions ant\u00e9rieures \u00e0 V6.0.0.2", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIMATIC STEP 7 (TIA Portal) versions ant\u00e9rieures \u00e0 V16", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM ROS RST2228", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIMATIC HMI Panel", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Famille de commutateurs SCALANCE X-200 et les variantes SIPLUSNET versions ant\u00e9rieures \u00e0 V5.2.4", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2019-13944", "url": "https://www.cve.org/CVERecord?id=CVE-2019-13944" }, { "name": "CVE-2019-18339", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18339" }, { "name": "CVE-2019-18341", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18341" }, { "name": "CVE-2019-18332", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18332" }, { "name": "CVE-2019-18335", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18335" }, { "name": "CVE-2019-18338", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18338" }, { "name": "CVE-2018-14526", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14526" }, { "name": "CVE-2019-18319", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18319" }, { "name": "CVE-2019-18331", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18331" }, { "name": "CVE-2019-18312", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18312" }, { "name": "CVE-2019-18320", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18320" }, { "name": "CVE-2019-18322", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18322" }, { "name": "CVE-2019-18283", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18283" }, { "name": "CVE-2019-18303", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18303" }, { "name": "CVE-2019-18302", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18302" }, { "name": "CVE-2019-18311", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18311" }, { "name": "CVE-2019-18290", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18290" }, { "name": "CVE-2019-18292", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18292" }, { "name": "CVE-2019-18309", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18309" }, { "name": "CVE-2019-18291", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18291" }, { "name": "CVE-2019-18304", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18304" }, { "name": "CVE-2019-18326", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18326" }, { "name": "CVE-2019-18305", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18305" }, { "name": "CVE-2019-18318", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18318" }, { "name": "CVE-2013-3634", "url": "https://www.cve.org/CVERecord?id=CVE-2013-3634" }, { "name": "CVE-2019-18334", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18334" }, { "name": "CVE-2019-18299", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18299" }, { "name": "CVE-2019-13932", "url": "https://www.cve.org/CVERecord?id=CVE-2019-13932" }, { "name": "CVE-2019-18316", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18316" }, { "name": "CVE-2019-18329", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18329" }, { "name": "CVE-2019-10929", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10929" }, { "name": "CVE-2019-13931", "url": "https://www.cve.org/CVERecord?id=CVE-2019-13931" }, { "name": "CVE-2019-18333", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18333" }, { "name": "CVE-2019-18300", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18300" }, { "name": "CVE-2019-18301", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18301" }, { "name": "CVE-2019-18328", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18328" }, { "name": "CVE-2019-18321", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18321" }, { "name": "CVE-2019-13947", "url": "https://www.cve.org/CVERecord?id=CVE-2019-13947" }, { "name": "CVE-2019-18317", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18317" }, { "name": "CVE-2019-18294", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18294" }, { "name": "CVE-2019-13943", "url": "https://www.cve.org/CVERecord?id=CVE-2019-13943" }, { "name": "CVE-2019-18330", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18330" }, { "name": "CVE-2019-18314", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18314" }, { "name": "CVE-2019-18307", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18307" }, { "name": "CVE-2019-13945", "url": "https://www.cve.org/CVERecord?id=CVE-2019-13945" }, { "name": "CVE-2019-18308", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18308" }, { "name": "CVE-2013-3633", "url": "https://www.cve.org/CVERecord?id=CVE-2013-3633" }, { "name": "CVE-2019-18306", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18306" }, { "name": "CVE-2019-18340", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18340" }, { "name": "CVE-2019-18342", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18342" }, { "name": "CVE-2019-18325", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18325" }, { "name": "CVE-2018-4832", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4832" }, { "name": "CVE-2019-18310", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18310" }, { "name": "CVE-2019-13103", "url": "https://www.cve.org/CVERecord?id=CVE-2019-13103" }, { "name": "CVE-2019-13930", "url": "https://www.cve.org/CVERecord?id=CVE-2019-13930" }, { "name": "CVE-2019-18337", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18337" }, { "name": "CVE-2019-18323", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18323" }, { "name": "CVE-2019-18327", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18327" }, { "name": "CVE-2018-18440", "url": "https://www.cve.org/CVERecord?id=CVE-2018-18440" }, { "name": "CVE-2019-18315", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18315" }, { "name": "CVE-2019-18298", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18298" }, { "name": "CVE-2019-13942", "url": "https://www.cve.org/CVERecord?id=CVE-2019-13942" }, { "name": "CVE-2019-18313", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18313" }, { "name": "CVE-2019-18324", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18324" } ], "initial_release_date": "2019-12-10T00:00:00", "last_revision_date": "2019-12-10T00:00:00", "links": [], "reference": "CERTFR-2019-AVI-615", "revisions": [ { "description": "Version initiale", "revision_date": "2019-12-10T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Injection de code indirecte \u00e0 distance (XSS)" }, { "description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSiemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-451445 du 10 d\u00e9cembre 2019", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-418979 du 10 d\u00e9cembre 2019", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-418979.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-170686 du 10 d\u00e9cembre 2019", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-170686.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-344983 du 10 d\u00e9cembre 2019", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-344983.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-761617 du 10 d\u00e9cembre 2019", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-761617.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-618620 du 10 d\u00e9cembre 2019", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-618620.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-525454 du 10 d\u00e9cembre 2019", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-525454.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-686531 du 10 d\u00e9cembre 2019", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-686531.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-273799 du 10 d\u00e9cembre 2019", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-273799.pdf" } ] }
CERTFR-2021-AVI-255
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Siemens | N/A | LOGO! Soft Comfort toutes versions | ||
Siemens | N/A | Siveillance Video Open Network Bridge:2019 R2 | ||
Siemens | N/A | Solid Edge SE2021 versions antérieures à SE2021MP4 | ||
Siemens | N/A | SIMATIC NET CP 443-1 Advanced (incl. SIPLUSvariants) versions antérieures à V3.2.9 | ||
Siemens | N/A | Siveillance Video Open Network Bridge:2019 R3 | ||
Siemens | N/A | Nucleus NET versions antérieures à 5.2 | ||
Siemens | N/A | TIM 3V-IE / TIM 3V-IE Advanced (incl. SIPLUSNET variants) versions antérieures à V2.6.0 | ||
Siemens | N/A | SiNVR/SiVMS Video Server toutes versions | ||
Siemens | N/A | Nucleus RTOS versions contenant le module DNS affecté | ||
Siemens | N/A | SIMATIC NET CP 343-1 Advanced (incl. SIPLUSvariants) versions antérieures à V3.0.44 | ||
Siemens | N/A | Solid Edge SE2020 toutes versions | ||
Siemens | N/A | SIMATIC NET CP 343-1 Lean (incl. SIPLUS vari-ants) versions antérieures à V3.1.1 | ||
Siemens | N/A | SIMATIC NET CP 443-5 Basic (incl. SIPLUS vari-ants) toutes versions | ||
Siemens | N/A | Opcenter Quality versions antérieures à 12.2 | ||
Siemens | N/A | Siveillance Video Open Network Bridge:2019 R1 | ||
Siemens | N/A | SIMATIC NET CP 443-5 Extended toutes versions | ||
Siemens | N/A | VSTAR versions contenant le module DNS affecté | ||
Siemens | N/A | Control Center Server (CCS) toutes versions | ||
Siemens | N/A | TIM 4R-IE (incl. SIPLUS NET variants) toutes versions | ||
Siemens | N/A | Siveillance Video Open Network Bridge:2020 R1 | ||
Siemens | N/A | SINEMA Remote Connect Server versions antérieures à 3.0 | ||
Siemens | N/A | Siveillance Video Open Network Bridge:2020 R2 | ||
Siemens | N/A | SIMATIC NET CP 343-1 Standard (incl. SIPLUSvariants) versions antérieures à V3.1.1 | ||
Siemens | N/A | SIMATIC NET CP 443-1 Standard (incl. SIPLUSvariants) versions antérieures à V3.2.9 | ||
Siemens | N/A | SIMATIC NET CP 342-5 (incl. SIPLUS variants) toutes versions | ||
Siemens | N/A | Siveillance Video Open Network Bridge:2018 R2 | ||
Siemens | N/A | Nucleus ReadyStart toutes versions | ||
Siemens | N/A | Nucleus 4 versions antérieures à 4.1.0 | ||
Siemens | N/A | Siveillance Video Open Network Bridge:2018 R3 | ||
Siemens | N/A | QMS Automotive versions antérieures à 12.30 | ||
Siemens | N/A | Tecnomatix RobotExpert versions antérieures à 16.1 | ||
Siemens | N/A | TIM 3V-IE DNP3 (incl. SIPLUS NET variants) versions antérieures à V3.1.0 | ||
Siemens | N/A | Siveillance Video Open Network Bridge:2020 R3 | ||
Siemens | N/A | Nucleus Source Code versions contenant le module DNS affecté | ||
Siemens | N/A | TIM 4R-IE DNP3 (incl. SIPLUS NET variants) toutes versions | ||
Siemens | N/A | SIMOTICS CONNECT 400 toutes verions |
Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "LOGO! Soft Comfort toutes versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Siveillance Video Open Network Bridge:2019 R2", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Solid Edge SE2021 versions ant\u00e9rieures \u00e0 SE2021MP4", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIMATIC NET CP 443-1 Advanced (incl. SIPLUSvariants) versions ant\u00e9rieures \u00e0 V3.2.9", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Siveillance Video Open Network Bridge:2019 R3", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Nucleus NET versions ant\u00e9rieures \u00e0 5.2", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "TIM 3V-IE / TIM 3V-IE Advanced (incl. SIPLUSNET variants) versions ant\u00e9rieures \u00e0 V2.6.0", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SiNVR/SiVMS Video Server toutes versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Nucleus RTOS versions contenant le module DNS affect\u00e9", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIMATIC NET CP 343-1 Advanced (incl. SIPLUSvariants) versions ant\u00e9rieures \u00e0 V3.0.44", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Solid Edge SE2020 toutes versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIMATIC NET CP 343-1 Lean (incl. SIPLUS vari-ants) versions ant\u00e9rieures \u00e0 V3.1.1", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIMATIC NET CP 443-5 Basic (incl. SIPLUS vari-ants) toutes versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Opcenter Quality versions ant\u00e9rieures \u00e0 12.2", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Siveillance Video Open Network Bridge:2019 R1", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIMATIC NET CP 443-5 Extended toutes versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "VSTAR versions contenant le module DNS affect\u00e9", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Control Center Server (CCS) toutes versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "TIM 4R-IE (incl. SIPLUS NET variants) toutes versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Siveillance Video Open Network Bridge:2020 R1", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SINEMA Remote Connect Server versions ant\u00e9rieures \u00e0 3.0", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Siveillance Video Open Network Bridge:2020 R2", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIMATIC NET CP 343-1 Standard (incl. SIPLUSvariants) versions ant\u00e9rieures \u00e0 V3.1.1", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIMATIC NET CP 443-1 Standard (incl. SIPLUSvariants) versions ant\u00e9rieures \u00e0 V3.2.9", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIMATIC NET CP 342-5 (incl. SIPLUS variants) toutes versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Siveillance Video Open Network Bridge:2018 R2", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Nucleus ReadyStart toutes versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Nucleus 4 versions ant\u00e9rieures \u00e0 4.1.0", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Siveillance Video Open Network Bridge:2018 R3", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "QMS Automotive versions ant\u00e9rieures \u00e0 12.30", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Tecnomatix RobotExpert versions ant\u00e9rieures \u00e0 16.1", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "TIM 3V-IE DNP3 (incl. SIPLUS NET variants) versions ant\u00e9rieures \u00e0 V3.1.0", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Siveillance Video Open Network Bridge:2020 R3", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Nucleus Source Code versions contenant le module DNS affect\u00e9", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "TIM 4R-IE DNP3 (incl. SIPLUS NET variants) toutes versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIMOTICS CONNECT 400 toutes verions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2020-27009", "url": "https://www.cve.org/CVERecord?id=CVE-2020-27009" }, { "name": "CVE-2015-7855", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7855" }, { "name": "CVE-2019-18339", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18339" }, { "name": "CVE-2016-1547", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1547" }, { "name": "CVE-2015-7973", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7973" }, { "name": "CVE-2016-4953", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4953" }, { "name": "CVE-2021-27389", "url": "https://www.cve.org/CVERecord?id=CVE-2021-27389" }, { "name": "CVE-2021-27382", "url": "https://www.cve.org/CVERecord?id=CVE-2021-27382" }, { "name": "CVE-2020-27736", "url": "https://www.cve.org/CVERecord?id=CVE-2020-27736" }, { "name": "CVE-2021-27380", "url": "https://www.cve.org/CVERecord?id=CVE-2021-27380" }, { "name": "CVE-2015-5219", "url": "https://www.cve.org/CVERecord?id=CVE-2015-5219" }, { "name": "CVE-2016-1550", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1550" }, { "name": "CVE-2015-7977", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7977" }, { "name": "CVE-2015-7705", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7705" }, { "name": "CVE-2021-27392", "url": "https://www.cve.org/CVERecord?id=CVE-2021-27392" }, { "name": "CVE-2019-19956", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19956" }, { "name": "CVE-2021-25663", "url": "https://www.cve.org/CVERecord?id=CVE-2021-25663" }, { "name": "CVE-2020-15795", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15795" }, { "name": "CVE-2015-8138", "url": "https://www.cve.org/CVERecord?id=CVE-2015-8138" }, { "name": "CVE-2016-4954", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4954" }, { "name": "CVE-2021-25664", "url": "https://www.cve.org/CVERecord?id=CVE-2021-25664" }, { "name": "CVE-2020-25243", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25243" }, { "name": "CVE-2015-7974", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7974" }, { "name": "CVE-2015-8214", "url": "https://www.cve.org/CVERecord?id=CVE-2015-8214" }, { "name": "CVE-2019-19299", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19299" }, { "name": "CVE-2020-28385", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28385" }, { "name": "CVE-2021-25678", "url": "https://www.cve.org/CVERecord?id=CVE-2021-25678" }, { "name": "CVE-2020-7595", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7595" }, { "name": "CVE-2021-27393", "url": "https://www.cve.org/CVERecord?id=CVE-2021-27393" }, { "name": "CVE-2020-25244", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25244" }, { "name": "CVE-2019-18340", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18340" }, { "name": "CVE-2021-25670", "url": "https://www.cve.org/CVERecord?id=CVE-2021-25670" }, { "name": "CVE-2015-7979", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7979" }, { "name": "CVE-2015-7871", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7871" }, { "name": "CVE-2020-27738", "url": "https://www.cve.org/CVERecord?id=CVE-2020-27738" }, { "name": "CVE-2019-19298", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19298" }, { "name": "CVE-2020-26997", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26997" }, { "name": "CVE-2019-19291", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19291" }, { "name": "CVE-2020-27737", "url": "https://www.cve.org/CVERecord?id=CVE-2020-27737" }, { "name": "CVE-2019-19297", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19297" }, { "name": "CVE-2016-1548", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1548" }, { "name": "CVE-2021-25677", "url": "https://www.cve.org/CVERecord?id=CVE-2021-25677" }, { "name": "CVE-2019-19296", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19296" } ], "initial_release_date": "2021-04-14T00:00:00", "last_revision_date": "2021-04-14T00:00:00", "links": [], "reference": "CERTFR-2021-AVI-255", "revisions": [ { "description": "Version initiale", "revision_date": "2021-04-14T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "D\u00e9ni de service" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Injection de code indirecte \u00e0 distance (XSS)" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSiemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service et un\ncontournement de la politique de s\u00e9curit\u00e9.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-788287 du 13 avril 2021", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-788287.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-248289 du 13 avril 2021", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-248289.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-853866 du 13 avril 2021", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-853866.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-185699 du 13 avril 2021", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-185699.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-983300 du 13 avril 2021", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-983300.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-844761 du 13 avril 2021", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-844761.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-163226 du 13 avril 2021", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-163226.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-763427 du 13 avril 2021", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-763427.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-497656 du 13 avril 2021", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-761617 du 13 avril 2021", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-761617.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-669158 du 13 avril 2021", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-669158.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-574442 du 13 avril 2021", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-574442.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-705111 du 13 avril 2021", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-705111.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-292794 du 13 avril 2021", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-292794.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-761844 du 13 avril 2021", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-761844.pdf" } ] }
cnvd-2019-44757
Vulnerability from cnvd
用户可参考如下供应商提供的安全公告获得补丁信息: https://cert-portal.siemens.com/productcert/pdf/ssa-761617.pdf
Name | ['Siemens SiNVR 3 Central Control Server (CCS)', 'Siemens SiNVR 3 Video Server'] |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2019-18340" } }, "description": "SiNVR\u662fSiVMS\u7684\u897f\u95e8\u5b50OEM\u7248\u672c\uff0cSiVMS\u662f\u4e00\u4e2a\u89c6\u9891\u7ba1\u7406\u89e3\u51b3\u65b9\u6848\uff0c\u7531PKE Deutsch land gmmbH\u6536\u8d2d\uff0c\u4ee5\u524d\u7531Schille Informationssysteme gmmbH\u5206\u9500\u3002\n\nSiemens SiNVR 3 Video Server\u548cSiNVR 3 Central Control Server (CCS)\u5b58\u5728\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\u3002\u672c\u5730\u653b\u51fb\u8005\u53ef\u5229\u7528\u6b64\u6f0f\u6d1e\u4ece\u7528\u6237\u6570\u636e\u5e93\u548c/\u6216\u8bbe\u5907\u914d\u7f6e\u6587\u4ef6\u4e2d\u63d0\u53d6\u5bc6\u7801\u4ee5\u8fdb\u884c\u8fdb\u4e00\u6b65\u653b\u51fb\u3002", "formalWay": "\u7528\u6237\u53ef\u53c2\u8003\u5982\u4e0b\u4f9b\u5e94\u5546\u63d0\u4f9b\u7684\u5b89\u5168\u516c\u544a\u83b7\u5f97\u8865\u4e01\u4fe1\u606f\uff1a\r\nhttps://cert-portal.siemens.com/productcert/pdf/ssa-761617.pdf", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2019-44757", "openTime": "2019-12-11", "patchDescription": "SiNVR\u662fSiVMS\u7684\u897f\u95e8\u5b50OEM\u7248\u672c\uff0cSiVMS\u662f\u4e00\u4e2a\u89c6\u9891\u7ba1\u7406\u89e3\u51b3\u65b9\u6848\uff0c\u7531PKE Deutsch land gmmbH\u6536\u8d2d\uff0c\u4ee5\u524d\u7531Schille Informationssysteme gmmbH\u5206\u9500\u3002\r\n\r\nSiemens SiNVR 3 Video Server\u548cSiNVR 3 Central Control Server (CCS)\u5b58\u5728\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\u3002\u672c\u5730\u653b\u51fb\u8005\u53ef\u5229\u7528\u6b64\u6f0f\u6d1e\u4ece\u7528\u6237\u6570\u636e\u5e93\u548c/\u6216\u8bbe\u5907\u914d\u7f6e\u6587\u4ef6\u4e2d\u63d0\u53d6\u5bc6\u7801\u4ee5\u8fdb\u884c\u8fdb\u4e00\u6b65\u653b\u51fb\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "Siemens SiNVR 3 Video Server\u548cSiNVR 3 Central Control Server (CCS)\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\u7684\u8865\u4e01", "products": { "product": [ "Siemens SiNVR 3 Central Control Server (CCS)", "Siemens SiNVR 3 Video Server" ] }, "referenceLink": "https://cert-portal.siemens.com/productcert/pdf/ssa-761617.pdf", "serverity": "\u4e2d", "submitTime": "2019-12-11", "title": "Siemens SiNVR 3 Video Server\u548cSiNVR 3 Central Control Server (CCS)\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e" }
fkie_cve-2019-18340
Vulnerability from fkie_nvd
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
URL | Tags | ||
---|---|---|---|
productcert@siemens.com | https://cert-portal.siemens.com/productcert/pdf/ssa-761617.pdf | Vendor Advisory | |
productcert@siemens.com | https://cert-portal.siemens.com/productcert/pdf/ssa-761844.pdf | ||
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-761617.pdf | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-761844.pdf |
Vendor | Product | Version | |
---|---|---|---|
siemens | sinvr_3_central_control_server | * | |
siemens | sinvr_3_video_server | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:sinvr_3_central_control_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "16668E9A-2D0A-425E-87F4-18CFC50551D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:sinvr_3_video_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F21BB6D-BFE0-4B69-97F2-1A871A390B1E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in Control Center Server (CCS) (All versions \u003c V1.5.0), Control Center Server (CCS) (All versions \u003e= V1.5.0), SiNVR/SiVMS Video Server (All versions \u003c V5.0.0), SiNVR/SiVMS Video Server (All versions \u003e= V5.0.0). Both the SiVMS/SiNVR Video Server and the Control Center Server (CCS) store\nuser and device passwords by applying weak cryptography.\n\nA local attacker could exploit this vulnerability to extract\nthe passwords from the user database and/or the device configuration files\nto conduct further attacks." }, { "lang": "es", "value": "Se ha identificado una vulnerabilidad en Central Control Server (CCS) (Todas las versiones anteriores a V1.5.0), Control Center Server (CCS) (Todas las versiones anteriores o iguales a V1.5.0), SiNVR/SiVMS Video Server (Todas las versiones anteriores a V5.0.0). Tanto el servidor de video SiVMS/SiNVR 3 como el Central Control Server (CCS) almacenan las contrase\u00f1as de usuarios y dispositivos mediante una aplicaci\u00f3n de criptograf\u00eda d\u00e9bil. Un atacante local podr\u00eda explotar esta vulnerabilidad para extraer las contrase\u00f1as de la base de datos del usuario y/o los archivos de configuraci\u00f3n del dispositivo para conducir nuevos ataques adicionales." } ], "id": "CVE-2019-18340", "lastModified": "2024-11-21T04:33:04.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "productcert@siemens.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Secondary" } ] }, "published": "2019-12-12T19:15:20.560", "references": [ { "source": "productcert@siemens.com", "tags": [ "Vendor Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-761617.pdf" }, { "source": "productcert@siemens.com", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-761844.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-761617.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-761844.pdf" } ], "sourceIdentifier": "productcert@siemens.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-327" } ], "source": "productcert@siemens.com", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-327" } ], "source": "nvd@nist.gov", "type": "Secondary" } ] }
gsd-2019-18340
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2019-18340", "description": "A vulnerability has been identified in Control Center Server (CCS) (All versions \u003c V1.5.0), Control Center Server (CCS) (All versions \u003e= V1.5.0), SiNVR/SiVMS Video Server (All versions \u003c V5.0.0). Both the SiVMS/SiNVR Video Server and the Control Center Server (CCS) store user and device passwords by applying weak cryptography. A local attacker could exploit this vulnerability to extract the passwords from the user database and/or the device configuration files to conduct further attacks.", "id": "GSD-2019-18340" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2019-18340" ], "details": "A vulnerability has been identified in Control Center Server (CCS) (All versions \u003c V1.5.0), Control Center Server (CCS) (All versions \u003e= V1.5.0), SiNVR/SiVMS Video Server (All versions \u003c V5.0.0). Both the SiVMS/SiNVR Video Server and the Control Center Server (CCS) store user and device passwords by applying weak cryptography. A local attacker could exploit this vulnerability to extract the passwords from the user database and/or the device configuration files to conduct further attacks.", "id": "GSD-2019-18340", "modified": "2023-12-13T01:23:50.632396Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2019-18340", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Control Center Server (CCS)", "version": { "version_data": [ { "version_affected": "=", "version_value": "All versions \u003c V1.5.0" }, { "version_affected": "=", "version_value": "All versions \u003e= V1.5.0" } ] } }, { "product_name": "SiNVR/SiVMS Video Server", "version": { "version_data": [ { "version_affected": "=", "version_value": "All versions \u003c V5.0.0" }, { "version_affected": "=", "version_value": "All versions \u003e= V5.0.0" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in Control Center Server (CCS) (All versions \u003c V1.5.0), Control Center Server (CCS) (All versions \u003e= V1.5.0), SiNVR/SiVMS Video Server (All versions \u003c V5.0.0), SiNVR/SiVMS Video Server (All versions \u003e= V5.0.0). Both the SiVMS/SiNVR Video Server and the Control Center Server (CCS) store\nuser and device passwords by applying weak cryptography.\n\nA local attacker could exploit this vulnerability to extract\nthe passwords from the user database and/or the device configuration files\nto conduct further attacks." } ] }, "impact": { "cvss": [ { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:F/RL:U/RC:C", "version": "3.1" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "cweId": "CWE-327", "lang": "eng", "value": "CWE-327: Use of a Broken or Risky Cryptographic Algorithm" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-761617.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-761617.pdf" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-761844.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-761844.pdf" } ] } }, "nvd.nist.gov": { "cve": { "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:sinvr_3_central_control_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "16668E9A-2D0A-425E-87F4-18CFC50551D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:sinvr_3_video_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F21BB6D-BFE0-4B69-97F2-1A871A390B1E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in Control Center Server (CCS) (All versions \u003c V1.5.0), Control Center Server (CCS) (All versions \u003e= V1.5.0), SiNVR/SiVMS Video Server (All versions \u003c V5.0.0), SiNVR/SiVMS Video Server (All versions \u003e= V5.0.0). Both the SiVMS/SiNVR Video Server and the Control Center Server (CCS) store\nuser and device passwords by applying weak cryptography.\n\nA local attacker could exploit this vulnerability to extract\nthe passwords from the user database and/or the device configuration files\nto conduct further attacks." }, { "lang": "es", "value": "Se ha identificado una vulnerabilidad en Central Control Server (CCS) (Todas las versiones anteriores a V1.5.0), Control Center Server (CCS) (Todas las versiones anteriores o iguales a V1.5.0), SiNVR/SiVMS Video Server (Todas las versiones anteriores a V5.0.0). Tanto el servidor de video SiVMS/SiNVR 3 como el Central Control Server (CCS) almacenan las contrase\u00f1as de usuarios y dispositivos mediante una aplicaci\u00f3n de criptograf\u00eda d\u00e9bil. Un atacante local podr\u00eda explotar esta vulnerabilidad para extraer las contrase\u00f1as de la base de datos del usuario y/o los archivos de configuraci\u00f3n del dispositivo para conducir nuevos ataques adicionales." } ], "id": "CVE-2019-18340", "lastModified": "2024-01-09T10:15:10.123", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "productcert@siemens.com", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Secondary" } ] }, "published": "2019-12-12T19:15:20.560", "references": [ { "source": "productcert@siemens.com", "tags": [ "Vendor Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-761617.pdf" }, { "source": "productcert@siemens.com", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-761844.pdf" } ], "sourceIdentifier": "productcert@siemens.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-327" } ], "source": "productcert@siemens.com", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-327" } ], "source": "nvd@nist.gov", "type": "Secondary" } ] } } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.