Multiple Vulnerabilities in SINEC NMS before V2.0
Plan Patch7.8SSA-160243Oct 10, 2023
Attack VectorLocal
Auth RequiredLow
ComplexityLow
User InteractionNone needed
Summary
SINEC NMS before V2.0 contains a code injection vulnerability (CWE-732) and a stored cross-site scripting (XSS) vulnerability (CWE-79) that could allow an authenticated attacker with local access to execute arbitrary code or inject malicious scripts.
What this means
What could happen
An attacker with local access to a SINEC NMS workstation could inject code or malicious scripts that execute with the NMS application's privileges, potentially allowing them to manipulate network management functions, access sensitive configuration data, or alter monitoring of industrial devices across your network.
Who's at risk
Network and systems engineers who operate SINEC NMS in industrial plants, particularly those managing Siemens industrial control systems and network-connected devices. This affects network management workstations that run SINEC NMS for monitoring and configuring distributed industrial networks.
How it could be exploited
An authenticated user with local access to a SINEC NMS workstation could submit malicious input through the application interface to trigger code injection or stored XSS. The injected code would execute in the context of the NMS application, allowing the attacker to perform actions as that application user.
Prerequisites
- Local access to a SINEC NMS workstation
- Valid user account on the NMS system
- Ability to submit input through the NMS web or application interface
Requires local accessRequires valid user credentialsAffects network management visibility
Exploitability
Low exploit probability (EPSS 0.5%)
Affected products (1)
ProductAffected VersionsFix Status
SINEC NMS<V2.02.0
Remediation & Mitigation
0/1
Schedule — requires maintenance window
0/1Patching may require device reboot — plan for process interruption
HOTFIXUpdate SINEC NMS to version 2.0 or later
CVEs (2)
↑↓ Navigate · Esc Close
API:
/api/v1/advisories/a52e7775-e1c1-40a8-bd18-d9c980ff1a5f