CVE-2019-18288
Summary
| CVE | CVE-2019-18288 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2019-12-12 19:15:00 UTC |
| Updated | 2022-03-25 19:00:00 UTC |
| Description | A vulnerability has been identified in SPPA-T3000 Application Server (All versions < Service Pack R8.2 SP2). An attacker with valid authentication at the RMI interface could be able to gain remote code execution through an unsecured file upload. Please note that an attacker needs to have access to the Application Highway in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. |
Risk And Classification
Problem Types: CWE-787 | CWE-434
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Siemens | Sppa-t3000 Application Server | All | All | All | All |
| Application | Siemens | Sppa-t3000 Application Server | r8.2 | - | All | All |
| Application | Siemens | Sppa-t3000 Application Server | r8.2 | sp1 | All | All |
| Application | Siemens | Sppa-t3000 Application Server | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Siemens Security Advisory - SPPA-T3000 Code Execution ≈ Packet Storm | MISC | packetstormsecurity.com | Third Party Advisory, VDB Entry |
| N/A | CONFIRM | cert-portal.siemens.com | Mitigation, Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.