Sinema Remote Connect Client Siemens Sinema Remote Connect Client

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Siemens Sinema Remote Connect Client.

By the Year

In 2025 there have been 1 vulnerability in Siemens Sinema Remote Connect Client with an average score of 7.8 out of ten. Last year, in 2024 Sinema Remote Connect Client had 4 security vulnerabilities published. Right now, Sinema Remote Connect Client is on track to have less security vulnerabilities in 2025 than it did last year. However, the average CVE base score of the vulnerabilities in 2025 is greater by 1.05.

Year Vulnerabilities Average Score
2025 1 7.80
2024 4 6.75
2023 0 0.00
2022 0 0.00
2021 0 0.00
2020 0 0.00
2019 2 8.65

It may take a day or so for new Sinema Remote Connect Client vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Siemens Sinema Remote Connect Client Security Vulnerabilities

DLL Hijacking in Windows Setup Component Enables RCE
CVE-2025-30033 7.8 - High - August 12, 2025

The affected setup component is vulnerable to DLL hijacking. This could allow an attacker to execute arbitrary code when a legitimate user installs an application that uses the affected setup component.

DLL preloading

SINEMA RC Client <3.2 SP2 Log Sensitive Config Data Leak
CVE-2024-42344 5.5 - Medium - September 10, 2024

A vulnerability has been identified in SINEMA Remote Connect Client (All versions < V3.2 SP2). The affected application inserts sensitive information into a log file which is readable by all legitimate users of the underlying system. This could allow an authenticated attacker to compromise the confidentiality of other users' configuration data.

Insertion of Sensitive Information into Log File

Command Injection in SINEMA Remote Connect Client < V3.2 HF1
CVE-2024-39569 7.2 - High - July 09, 2024

A vulnerability has been identified in SINEMA Remote Connect Client (All versions < V3.2 HF1). The system service of affected applications is vulnerable to command injection due to missing server side input sanitation when loading VPN configurations. This could allow an administrative remote attacker running a corresponding SINEMA Remote Connect Server to execute arbitrary code with system privileges on the client system.

Command Injection

SINEMA RC Cmd Injection (v<3.2HF1) Allow Local Auth Exec
CVE-2024-39568 7.8 - High - July 09, 2024

A vulnerability has been identified in SINEMA Remote Connect Client (All versions < V3.2 HF1). The system service of affected applications is vulnerable to command injection due to missing server side input sanitation when loading proxy configurations. This could allow an authenticated local attacker to execute arbitrary code with system privileges.

Command Injection

SINEMA RC Client < V3.1.SP1: Unintended File Access & Web Disclosure
CVE-2024-22045 6.5 - Medium - March 12, 2024

A vulnerability has been identified in SINEMA Remote Connect Client (All versions < V3.1 SP1). The product places sensitive information into files or directories that are accessible to actors who are allowed to have access to the files, but not to the sensitive information. This information is also available via the web interface of the product.

libcurl versions from 7.36.0 to before 7.64.0 are vulnerable to a stack-based buffer overflow
CVE-2019-3822 9.8 - Critical - February 06, 2019

libcurl versions from 7.36.0 to before 7.64.0 are vulnerable to a stack-based buffer overflow. The function creating an outgoing NTLM type-3 header (`lib/vauth/ntlm.c:Curl_auth_create_ntlm_type3_message()`), generates the request HTTP header contents based on previously received data. The check that exists to prevent the local buffer from getting overflowed is implemented wrongly (using unsigned math) and as such it does not prevent the overflow from happening. This output data can grow larger than the local buffer if very large 'nt response' data is extracted from a previous NTLMv2 header provided by the malicious or broken HTTP server. Such a 'large value' needs to be around 1000 bytes or more. The actual payload data copied to the target buffer comes from the NTLMv2 type-2 response header.

Memory Corruption

libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap buffer out-of-bounds read
CVE-2018-16890 7.5 - High - February 06, 2019

libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap buffer out-of-bounds read. The function handling incoming NTLM type-2 messages (`lib/vauth/ntlm.c:ntlm_decode_type2_target`) does not validate incoming data correctly and is subject to an integer overflow vulnerability. Using that overflow, a malicious or broken NTLM server could trick libcurl to accept a bad length + offset combination that would lead to a buffer read out-of-bounds.

Integer Overflow or Wraparound

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Siemens Sinema Remote Connect Client or by Siemens? Click the Watch button to subscribe.

Siemens
Vendor

subscribe