OTPulse

Siemens SINEMA Remote Connect Server

Monitor5.4ICS-CERT ICSA-22-041-04Feb 8, 2022
Attack VectorNetwork
Auth RequiredNone
ComplexityLow
User InteractionRequired
Summary

An open redirect vulnerability in SINEMA Remote Connect Server versions prior to 2.0 allows an attacker to craft a malicious link that redirects authenticated users to an attacker-controlled website. When users click the link and enter their credentials on the fake login page, their SINEMA Remote Connect Server credentials are stolen. The attacker can then use these credentials to authenticate to the legitimate SINEMA Remote Connect Server and gain remote access to connected industrial systems.

What this means
What could happen
An attacker could craft a malicious link that redirects an authenticated user to a fake login page to steal their SINEMA Remote Connect Server credentials, allowing the attacker to gain access to the remote access infrastructure and potentially reach industrial systems.
Who's at risk
Engineering and IT staff at utilities and industrial facilities that use Siemens SINEMA Remote Connect Server for remote access to industrial control systems and devices. This includes water authorities, electric utilities, and manufacturing facilities that rely on this platform for remote engineering access and system maintenance.
How it could be exploited
An attacker sends a specially crafted malicious link (via email or other means) to a SINEMA Remote Connect Server user. When the user clicks the link, the server redirects them to an attacker-controlled website that mimics the legitimate login page. The user, believing they are logging into the legitimate service, enters their credentials which are captured by the attacker. The attacker can then use these stolen credentials to log into SINEMA Remote Connect Server and gain remote access to connected industrial systems.
Prerequisites
  • User must click a malicious link sent by attacker
  • SINEMA Remote Connect Server version prior to 2.0 must be in use
  • User must have valid credentials for the SINEMA Remote Connect Server
Remotely exploitableUser interaction required (social engineering)Credential theft can lead to unauthorized remote accessAffects remote access infrastructure used to manage critical industrial systems
Exploitability
Moderate exploit probability (EPSS 4.9%)
Affected products (1)
ProductAffected VersionsFix Status
SINEMA Remote Connect Server<V2.02.0
Remediation & Mitigation
0/4
Do now
0/3
HARDENINGRestrict network access to SINEMA Remote Connect Server using firewall rules to limit exposure
HARDENINGEnsure SINEMA Remote Connect Server is not directly accessible from the Internet; place behind VPN or firewall
HARDENINGEducate users to verify URLs before entering credentials and be cautious of unsolicited links requesting login
Schedule — requires maintenance window
0/1

Patching may require device reboot — plan for process interruption

HOTFIXUpdate SINEMA Remote Connect Server to version 2.0 or later
↑↓ Navigate · Esc Close
API: /api/v1/advisories/4936552d-d208-4d57-adda-7ca0badad68d
Siemens SINEMA Remote Connect Server | CVSS 5.4 - OTPulse