OTPulse

Multiple Vulnerabilities in SINEC NMS

Plan Patch8.8SSA-163251Oct 12, 2021
Attack VectorNetwork
Auth RequiredLow
ComplexityLow
User InteractionNone needed
Summary

Multiple vulnerabilities in SINEC NMS, a network management system for industrial networks, allow an authenticated remote attacker to execute arbitrary code with system privileges. The vulnerabilities include path traversal (CWE-22), improper access control (CWE-285), information disclosure (CWE-200), insecure deserialization (CWE-502), and SQL injection (CWE-89).

What this means
What could happen
An authenticated attacker could remotely execute commands on the SINEC NMS server with full system privileges, potentially allowing them to modify network configurations, intercept traffic, or disrupt management of your industrial control network. This could cascade to loss of visibility and control over critical infrastructure devices managed by NMS.
Who's at risk
Network operators and engineers managing industrial control networks via SINEC NMS (versions prior to 1.0 SP2 Update 1) are affected. This includes operators of power distribution networks, water treatment systems, manufacturing facilities, and any organization using Siemens SINEC for centralized management of industrial devices and networks.
How it could be exploited
An attacker with valid credentials to the SINEC NMS management interface could exploit the code execution vulnerability by sending a specially crafted request to the web interface. The combination of path traversal and deserialization flaws allows the attacker to execute arbitrary code under the NMS process account (which typically runs with elevated privileges).
Prerequisites
  • Valid SINEC NMS user account credentials
  • Network access to the SINEC NMS web interface (typically port 443/HTTPS)
Remotely exploitableRequires valid credentialsLow complexity attackSystem privilege executionHigh CVSS score (8.8)
Exploitability
Moderate exploit probability (EPSS 2.0%)
Affected products (1)
ProductAffected VersionsFix Status
SINEC NMS< V1.0 SP2 Update 11.0 SP2 Update 1
Remediation & Mitigation
0/1
Schedule — requires maintenance window
0/1

Patching may require device reboot — plan for process interruption

HOTFIXUpdate SINEC NMS to version 1.0 SP2 Update 1 or later
↑↓ Navigate · Esc Close
API: /api/v1/advisories/f6af4c05-a262-40eb-b6a4-8071ef77106a
Multiple Vulnerabilities in SINEC NMS | CVSS 8.8 - OTPulse