Siemens SINEMA Remote Connect Server
Multiple vulnerabilities in SINEMA Remote Connect Server (versions before 3.0 SP2) allow an unauthenticated remote attacker to retrieve or modify sensitive information and cause denial-of-service conditions affecting devices managed through this remote access platform. The vulnerabilities stem from improper access controls (CWE-284), information exposure (CWE-200), and uncontrolled resource consumption (CWE-799). Siemens has released version 3.0 SP2 as a fix. No known public exploits are currently circulating.
- Network access to SINEMA Remote Connect Server
- No authentication required (based on CWE-284 and CWE-200 indicating authorization bypass or improper access control)
- Server must be running version prior to 3.0 SP2
Patching may require device reboot — plan for process interruption
/api/v1/advisories/96b090e0-4765-47f4-bf3b-8c91368a8ac7Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.