Siemens OpenSSL Affecting Industrial Products
SINEMA Remote Connect Server contains multiple critical vulnerabilities including command injection in file upload (CVE-2022-32262), authentication bypass and privilege escalation flaws (CVE-2022-32251 through -32261), cross-site scripting (CVE-2022-29034), and multiple library vulnerabilities in curl and libexpat. These flaws affect versions prior to 3.1 and could allow remote attackers to execute commands, bypass access controls, crash the server, or inject malicious content. Siemens has released version 3.1 with fixes for all identified issues.
- Network access to the SINEMA Remote Connect Server web interface (typically port 443)
- For some vulnerabilities, ability to upload files to the server
- For privilege escalation paths, a valid unprivileged user account on the server
Patching may require device reboot — plan for process interruption
/api/v1/advisories/42d142ec-5f28-4428-8ddf-ab9ad1231958Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.