Siemens SINEMA Server & SINEC NMS
A path traversal vulnerability (CWE-22) in SINEMA Server (all versions before 14.0 SP2 Update 2) and SINEC NMS (all versions before 1.0 SP1 Update 1) allows an authenticated user to read, write, or delete arbitrary files on the affected system. An attacker with valid web interface credentials could exploit this to access sensitive configuration files, modify system behavior, or disrupt network management functions. Siemens has released security advisory SSA-156833 with detailed information. No public exploits are currently known.
- Valid login credentials for SINEMA Server or SINEC NMS web interface
- Network access to the management server (port 443 or configured web service port)
- Knowledge of the path traversal payload format
Patching may require device reboot — plan for process interruption
/api/v1/advisories/8256d11f-6db5-4f20-aa52-aada6f8fa4ebGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.