Siemens SINEMA Remote Connect Server
Siemens SINEMA Remote Connect Server versions prior to 3.0 contain an improper access control vulnerability (CWE-863). The vulnerability allows authenticated users with non-administrative privileges to perform unauthorized administrative actions, including but not limited to: reading or exporting sensitive VPN credentials, modifying remote access templates, and altering system configuration. An attacker with valid user credentials can exploit this to gain unauthorized high-privilege access without needing to compromise admin accounts or exploit additional vulnerabilities. The vulnerability has a CVSS score of 8.8 (High severity) and affects all versions below 3.0.
- Valid user account credentials for SINEMA Remote Connect Server (non-admin account sufficient)
- Network access to the SINEMA server management interface
- Vulnerable version installed (v3.0 or earlier)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/278449b4-2be0-4e1d-ba42-29d00bac9281Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.