CVE-2019-18285
Summary
| CVE | CVE-2019-18285 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2019-12-12 19:15:00 UTC |
| Updated | 2022-03-04 20:50:00 UTC |
| Description | A vulnerability has been identified in SPPA-T3000 Application Server (All versions < Service Pack R8.2 SP2). The RMI communication between the client and the Application Server is unencrypted. An attacker with access to the communication channel can read credentials of a valid user. Please note that an attacker needs to have access to the Application Highway in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. |
Risk And Classification
Problem Types: CWE-319
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Siemens | Sppa-t3000 Application Server | All | All | All | All |
| Application | Siemens | Sppa-t3000 Application Server | r8.2 | - | All | All |
| Application | Siemens | Sppa-t3000 Application Server | r8.2 | sp1 | All | All |
| Application | Siemens | Sppa-t3000 Application Server | r8.2 | sp1 | All | All |
| Application | Siemens | Sppa-t3000 Application Server | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Siemens Security Advisory - SPPA-T3000 Code Execution ≈ Packet Storm | MISC | packetstormsecurity.com | Third Party Advisory, VDB Entry |
| N/A | CONFIRM | cert-portal.siemens.com | Mitigation, Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.