Siemens SINEMA Remote Connect Server
SINEMA Remote Connect Client versions before V3.2 HF1 are affected by a local command injection vulnerability (CWE-77) that allows a local user with low privileges to execute arbitrary commands with elevated privileges. The vulnerability has a CVSS score of 7.8 with high impact on confidentiality, integrity, and availability. Siemens has released a patched version (V3.2 HF1) and recommends all users update immediately. General hardening measures include implementing proper network access controls and following Siemens operational security guidelines.
- Local user account on the SINEMA Remote Connect Client machine
- SINEMA Remote Connect Client version before 3.2 HF1 must be installed and running
Patching may require device reboot — plan for process interruption
/api/v1/advisories/14ca17eb-a686-4d51-a353-1b0b916a5e4eGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.