Siemens SINEMA Remote Connect Server Cross-site Scripting Vulnerability
Siemens SINEMA Remote Connect Server versions prior to 1.2 contain a cross-site scripting (XSS) vulnerability that allows attackers to inject malicious scripts into the web interface. When an engineer or administrator visits a malicious URL or affected page, the script executes in their browser context. The vulnerability requires user interaction and does not directly impact connected industrial devices, but could compromise the credentials or session of the person using the remote access tool. No patch is planned for versions before 1.2, and version 1.2 availability/status is not confirmed in the advisory.
- User interaction required: engineer or administrator must click malicious link or visit attacker-controlled page
- Network access to the SINEMA Remote Connect Server web interface (port 443 typically)
- No special credentials needed from the attacker
/api/v1/advisories/ad13d3f5-d579-479d-a4e4-2706ff7dc63dGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.