A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could be able to enumerate running RPC services. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known.
                
            References
                    | Link | Resource | 
|---|---|
| https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf | Mitigation Vendor Advisory | 
| https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf | Mitigation Vendor Advisory | 
Configurations
                    History
                    21 Nov 2024, 04:33
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf - Mitigation, Vendor Advisory | 
Information
                Published : 2019-12-12 19:15
Updated : 2024-11-21 04:33
NVD link : CVE-2019-18312
Mitre link : CVE-2019-18312
CVE.ORG link : CVE-2019-18312
JSON object : View
Products Affected
                siemens
- sppa-t3000_ms3000_migration_server
CWE
                
                    
                        
                        CWE-287
                        
            Improper Authentication
