Vulnerability Name:

CVE-2022-29034 (CCN-228958)

Assigned:2022-06-14
Published:2022-06-14
Updated:2022-06-23
Summary:A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.1). An error message pop up window in the web interface of the affected application does not prevent injection of JavaScript code. This could allow attackers to perform reflected cross-site scripting (XSS) attacks.
CVSS v3 Severity:6.1 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)
5.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:H/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): Required
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): None
6.1 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)
5.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:H/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): Required
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
5.5 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-79
Vulnerability Consequences:Cross-Site Scripting
References:Source: MITRE
Type: CNA
CVE-2022-29034

Source: MISC
Type: Exploit, Mailing List, Third Party Advisory
http://packetstormsecurity.com/files/167554/SIEMENS-SINEMA-Remote-Connect-3.0.1.0-01.01.00.02-Cross-Site-Scripting.html

Source: FULLDISC
Type: Exploit, Mailing List, Third Party Advisory
20220614 SEC Consult SA-20220614-0 :: Reflected Cross Site Scripting in SIEMENS-SINEMA Remote Connect

Source: CCN
Type: Siemens Security Advisory SSA-484086
Multiple Vulnerabilities in SINEMA Remote Connect Server before V3.1

Source: MISC
Type: Patch, Vendor Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf

Source: XF
Type: UNKNOWN
siemens-cve202229034-xss(228958)

Source: CCN
Type: Packet Storm Security [06-20-2022]
SIEMENS-SINEMA Remote Connect 3.0.1.0-01.01.00.02 Cross Site Scripting

Vulnerable Configuration:Configuration 1:
  • cpe:/a:siemens:sinema_remote_connect_server:*:*:*:*:*:*:*:* (Version < 3.1)

  • Configuration CCN 1:
  • cpe:/a:siemens:sinema_remote_connect_server:3.0:*:*:*:*:*:*:*
  • OR cpe:/a:siemens:sinema_remote_connect_server:2.0:-:*:*:*:*:*:*
  • OR cpe:/a:siemens:sinema_remote_connect_server:1.0:sp3_hf1:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    siemens sinema remote connect server *
    siemens sinema remote connect server 3.0
    siemens sinema remote connect server 2.0 -
    siemens sinema remote connect server 1.0 sp3_hf1