siemens sinvr-3-central-control-server CVE-2019-18340 vulnerability in Siemens Products
Published on December 12, 2019

A vulnerability has been identified in Control Center Server (CCS) (All versions < V1.5.0), Control Center Server (CCS) (All versions >= V1.5.0), SiNVR/SiVMS Video Server (All versions < V5.0.0), SiNVR/SiVMS Video Server (All versions >= V5.0.0). Both the SiVMS/SiNVR Video Server and the Control Center Server (CCS) store user and device passwords by applying weak cryptography. A local attacker could exploit this vulnerability to extract the passwords from the user database and/or the device configuration files to conduct further attacks.

NVD

Weakness Type

Use of a Broken or Risky Cryptographic Algorithm

The use of a broken or risky cryptographic algorithm is an unnecessary risk that may result in the exposure of sensitive information. The use of a non-standard algorithm is dangerous because a determined attacker may be able to break the algorithm and compromise whatever data has been protected. Well-known techniques may exist to break the algorithm.


Products Associated with CVE-2019-18340

Want to know whenever a new CVE is published for Siemens products? stack.watch will email you.

 
 
 

Affected Versions

Siemens Control Center Server (CCS): Siemens Control Center Server (CCS): Siemens SiNVR/SiVMS Video Server: Siemens SiNVR/SiVMS Video Server:

Exploit Probability

EPSS
0.06%
Percentile
17.92%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.