ICSA-19-260-02 Siemens SINEMA Remote Connect Server
SINEMA Remote Connect Server (versions before 2.0 SP1) contains multiple vulnerabilities in authentication, access control, CSRF protection, and encryption (CWE-307, CWE-284, CWE-352, CWE-311). These vulnerabilities allow unauthenticated or low-privilege attackers to bypass authentication, access sensitive information, or perform unauthorized actions via the web interface. The affected product is used to provide secure remote access from engineering workstations and remote operation centers to industrial control devices at distributed sites. No public exploit code is currently available, and exploitation requires high technical skill.
- Network access to the SINEMA Remote Connect Server web interface (port 443 or configured HTTPS port)
- Server version prior to 2.0 SP1
- No authentication required for some vulnerability paths
Patching may require device reboot — plan for process interruption
/api/v1/advisories/46556a0c-112b-48bf-a978-7b6dc5982f98Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.