CVE-2019-13918
13.09.2019, 17:15
A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V2.0 SP1). The web interface has no means to prevent password guessing attacks. The vulnerability could be exploited by an attacker with network access to the vulnerable software, requiring no privileges and no user interaction. The vulnerability could allow full access to the web interface. At the time of advisory publication no public exploitation of this security vulnerability was known.Enginsight
Vendor | Product | Version |
---|---|---|
siemens | sinema_remote_connect_server | 𝑥 < 2.0 |
siemens | sinema_remote_connect_server | 2.0 |
siemens | sinema_remote_connect_server | 2.0:hf1 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-307 - Improper Restriction of Excessive Authentication AttemptsThe product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it more susceptible to brute force attacks.
- CWE-521 - Weak Password RequirementsThe product does not require that users should have strong passwords, which makes it easier for attackers to compromise user accounts.