// For flags

CVE-2019-18288

Siemens Security Advisory - SPPA-T3000 Code Execution

Severity Score

8.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability has been identified in SPPA-T3000 Application Server (All versions < Service Pack R8.2 SP2). An attacker with valid authentication at the RMI interface could be able to gain remote code execution through an unsecured file upload. Please note that an attacker needs to have access to the Application Highway in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known.

Se ha identificado una vulnerabilidad en SPPA-T3000 Application Server (Todas las versiones anteriores a la versión Service Pack R8.2 SP2). Un atacante con autenticación válida en la interfaz RMI podría conseguir una ejecución de código remota por medio de una carga de archivo no segura. Tenga en cuenta que un atacante necesita tener acceso a Application Highway a fin de explotar esta vulnerabilidad. Al momento de la publicación del aviso, no era conocida la explotación pública de esta vulnerabilidad de seguridad

SPPA-T3000 Application Server and MS3000 Migration Server are affected by multiple vulnerabilities. Some of the vulnerabilities can allow an attacker to execute arbitrary code on the server. Exploitation of the vulnerabilities described in this advisory requires access to either Application- or Automation Highway. 54 CVEs are covered in this advisory.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2019-10-23 CVE Reserved
  • 2019-12-12 CVE Published
  • 2024-08-05 CVE Updated
  • 2025-04-04 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-434: Unrestricted Upload of File with Dangerous Type
  • CWE-787: Out-of-bounds Write
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Siemens
Search vendor "Siemens"
Sppa-t3000 Application Server
Search vendor "Siemens" for product "Sppa-t3000 Application Server"
< r8.2
Search vendor "Siemens" for product "Sppa-t3000 Application Server" and version " < r8.2"
-
Affected
Siemens
Search vendor "Siemens"
Sppa-t3000 Application Server
Search vendor "Siemens" for product "Sppa-t3000 Application Server"
r8.2
Search vendor "Siemens" for product "Sppa-t3000 Application Server" and version "r8.2"
-
Affected
Siemens
Search vendor "Siemens"
Sppa-t3000 Application Server
Search vendor "Siemens" for product "Sppa-t3000 Application Server"
r8.2
Search vendor "Siemens" for product "Sppa-t3000 Application Server" and version "r8.2"
sp1
Affected