A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.0 SP2). Affected application is missing general HTTP security headers in the web server configured on port 6220. This could aid attackers by making the servers more prone to clickjacking, channel downgrade attacks and other similar client-based attack vectors.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-911567.pdf | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
24 Jun 2022, 01:49
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-1021 | |
CVSS |
v2 : v3 : |
v2 : 4.3
v3 : 4.3 |
References | (MISC) https://cert-portal.siemens.com/productcert/pdf/ssa-911567.pdf - Patch, Vendor Advisory | |
CPE | cpe:2.3:a:siemens:sinema_remote_connect_server:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:sinema_remote_connect_server:3.0:-:*:*:*:*:*:* cpe:2.3:a:siemens:sinema_remote_connect_server:3.0:sp1:*:*:*:*:*:* |
14 Jun 2022, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-06-14 10:15
Updated : 2024-02-04 22:29
NVD link : CVE-2022-27220
Mitre link : CVE-2022-27220
CVE.ORG link : CVE-2022-27220
JSON object : View
Products Affected
siemens
- sinema_remote_connect_server