Sinec Security Monitor Siemens Sinec Security Monitor

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Siemens Sinec Security Monitor.

By the Year

In 2026 there have been 0 vulnerabilities in Siemens Sinec Security Monitor. Last year, in 2025 Sinec Security Monitor had 2 security vulnerabilities published. Right now, Sinec Security Monitor is on track to have less security vulnerabilities in 2026 than it did last year.

Year Vulnerabilities Average Score
2026 0 0.00
2025 2 6.60
2024 4 7.08

It may take a day or so for new Sinec Security Monitor vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Siemens Sinec Security Monitor Security Vulnerabilities

SINEC Security Monitor < V4.10.0 Denial of Service via Date Input
CVE-2025-40831 6.5 - Medium - December 09, 2025

A vulnerability has been identified in SINEC Security Monitor (All versions < V4.10.0). The affected application lacks input validation of date parameter in report generation functionality. This could allow an authenticated, lowly privileged attacker to cause denial of service condition of the report functionality.

Improper Input Validation

Auth Bypass in SINEC Security Monitor <4.10.0 ssmctl-client File Transfer
CVE-2025-40830 6.7 - Medium - December 09, 2025

A vulnerability has been identified in SINEC Security Monitor (All versions < V4.10.0). The affected application does not have proper authorization checks for the file_transfer feature in ssmctl-client command. This could allow an authenticated, lowly privileged local attacker to read or write to any file on server or sensor.

AuthZ

Siemens SINEC SM <V4.9.0 - Auth Remote Input Validation Flaw
CVE-2024-47565 4.3 - Medium - October 08, 2024

A vulnerability has been identified in Siemens SINEC Security Monitor (All versions < V4.9.0). The affected application does not properly validate that user input complies with a list of allowed values. This could allow an authenticated remote attacker to compromise the integrity of the configuration of the affected application.

Allowlist / Allow List

Siemens SINEC Security Monitor <V4.9.0: Path Traversal in CSR Endpoint
CVE-2024-47563 5.3 - Medium - October 08, 2024

A vulnerability has been identified in Siemens SINEC Security Monitor (All versions < V4.9.0). The affected application does not properly validate a file path that is supplied to an endpoint intended to create CSR files. This could allow an unauthenticated remote attacker to create files in writable directories outside the intended location and thus compromise integrity of files in those writable directories.

Directory traversal

Siemens SINEC Security Monitor <4.9.0 ssmctl-client Command Injection
CVE-2024-47562 8.8 - High - October 08, 2024

A vulnerability has been identified in Siemens SINEC Security Monitor (All versions < V4.9.0). The affected application does not properly neutralize special elements in user input to the ```ssmctl-client``` command. This could allow an authenticated, lowly privileged local attacker to execute privileged commands in the underlying OS.

Command Injection

Arbitrary Code Exec via ssmctl-client in Siemens SINEC Security Monitor < V4.9.0
CVE-2024-47553 9.9 - Critical - October 08, 2024

A vulnerability has been identified in Siemens SINEC Security Monitor (All versions < V4.9.0). The affected application does not properly validate user input to the ```ssmctl-client``` command. This could allow an authenticated, lowly privileged remote attacker to execute arbitrary code with root privileges on the underlying OS.

Argument Injection

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Siemens Sinec Security Monitor or by Siemens? Click the Watch button to subscribe.

Siemens
Vendor

subscribe