Siemens SINEMA Remote Connect Server
Two Denial-of-Service vulnerabilities exist in the underlying third-party XML parser used by SINEMA Remote Connect Server versions prior to 3.0. An attacker can trigger a crash by sending specially crafted XML requests to the service, rendering it unavailable for remote engineering access. The vulnerabilities stem from improper handling of XML input (CWE-772: Missing Release of Resource After Effective Lifetime Ends; CWE-835: Loop with Unreachable Exit Condition). No known public exploits are currently available.
- Network access to SINEMA Remote Connect Server management interface
- No authentication required to trigger the denial-of-service condition
Patching may require device reboot — plan for process interruption
/api/v1/advisories/e887f1d6-ea24-4bd8-a950-c89f6a7fdb30Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.