CVE-2019-18284
Siemens Security Advisory - SPPA-T3000 Code Execution
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A vulnerability has been identified in SPPA-T3000 Application Server (All versions < Service Pack R8.2 SP2). The AdminService is available without authentication on the Application Server. An attacker can use methods exposed via this interface to receive password hashes of other users and to change user passwords. Please note that an attacker needs to have access to the Application Highway in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known.
Se ha identificado una vulnerabilidad en SPPA-T3000 Application Server (Todas las versiones anteriores a la versión Service Pack R8.2 SP2). AdminService está disponible sin autenticación en el Application Server. Un atacante puede usar los métodos expuestos por medio de esta interfaz para recibir hashes de contraseña de otros usuarios y cambiar las contraseñas de los usuarios. Tenga en cuenta que un atacante necesita tener acceso a Application Highway a fin de explotar esta vulnerabilidad. Al momento de la publicación del aviso, no era conocida la explotación pública de esta vulnerabilidad de seguridad
SPPA-T3000 Application Server and MS3000 Migration Server are affected by multiple vulnerabilities. Some of the vulnerabilities can allow an attacker to execute arbitrary code on the server. Exploitation of the vulnerabilities described in this advisory requires access to either Application- or Automation Highway. 54 CVEs are covered in this advisory.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2019-10-23 CVE Reserved
- 2019-12-12 CVE Published
- 2024-08-05 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-287: Improper Authentication
- CWE-306: Missing Authentication for Critical Function
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html | Third Party Advisory |
|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf | 2022-03-04 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Siemens Search vendor "Siemens" | Sppa-t3000 Application Server Search vendor "Siemens" for product "Sppa-t3000 Application Server" | < r8.2 Search vendor "Siemens" for product "Sppa-t3000 Application Server" and version " < r8.2" | - |
Affected
| ||||||
Siemens Search vendor "Siemens" | Sppa-t3000 Application Server Search vendor "Siemens" for product "Sppa-t3000 Application Server" | r8.2 Search vendor "Siemens" for product "Sppa-t3000 Application Server" and version "r8.2" | - |
Affected
| ||||||
Siemens Search vendor "Siemens" | Sppa-t3000 Application Server Search vendor "Siemens" for product "Sppa-t3000 Application Server" | r8.2 Search vendor "Siemens" for product "Sppa-t3000 Application Server" and version "r8.2" | sp1 |
Affected
|