CVE-2019-18283
Siemens Security Advisory - SPPA-T3000 Code Execution
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A vulnerability has been identified in SPPA-T3000 Application Server (All versions < Service Pack R8.2 SP2). The AdminService is available without authentication on the Application Server. An attacker can gain remote code execution by sending specifically crafted objects to one of its functions. Please note that an attacker needs to have access to the Application Highway in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known.
Se ha identificado una vulnerabilidad en SPPA-T3000 Application Server (Todas las versiones anteriores a la versión Service Pack R8.2 SP2). El AdminService está disponible sin autenticación en Application Server. Un atacante puede obtener la ejecución remota de código enviando objetos específicamente diseñados a una de sus funciones. Tenga en cuenta que un atacante necesita tener acceso a Application Highway para poder explotar esta vulnerabilidad. En el momento de la publicación del aviso no se conocía ninguna explotación pública de esta vulnerabilidad de seguridad.
SPPA-T3000 Application Server and MS3000 Migration Server are affected by multiple vulnerabilities. Some of the vulnerabilities can allow an attacker to execute arbitrary code on the server. Exploitation of the vulnerabilities described in this advisory requires access to either Application- or Automation Highway. 54 CVEs are covered in this advisory.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2019-10-23 CVE Reserved
- 2019-12-12 CVE Published
- 2024-08-05 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-502: Deserialization of Untrusted Data
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html | Third Party Advisory |
|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf | 2022-03-04 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Siemens Search vendor "Siemens" | Sppa-t3000 Application Server Search vendor "Siemens" for product "Sppa-t3000 Application Server" | < r8.2 Search vendor "Siemens" for product "Sppa-t3000 Application Server" and version " < r8.2" | - |
Affected
| ||||||
Siemens Search vendor "Siemens" | Sppa-t3000 Application Server Search vendor "Siemens" for product "Sppa-t3000 Application Server" | r8.2 Search vendor "Siemens" for product "Sppa-t3000 Application Server" and version "r8.2" | - |
Affected
| ||||||
Siemens Search vendor "Siemens" | Sppa-t3000 Application Server Search vendor "Siemens" for product "Sppa-t3000 Application Server" | r8.2 Search vendor "Siemens" for product "Sppa-t3000 Application Server" and version "r8.2" | sp1 |
Affected
|