Siemens SINEMA Remote Connect Server
SINEMA Remote Connect Server before version 3.2 contains multiple vulnerabilities including input validation flaws (CWE-79) and insufficient access control (CWE-284). These allow an unauthenticated attacker with network access to execute arbitrary code and bypass authentication mechanisms on the server. The vulnerability affects all remote connections managed through the server and could allow unauthorized access to engineering workstations and industrial control systems connected via this remote access solution.
- Network access to the SINEMA Remote Connect Server web interface (typically port 443)
- No authentication required to trigger the vulnerability
- Server must be running an affected version (below V3.2)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/df9cb93f-2c71-419e-841d-9865bf73ccd4Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.