A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.2 SP2). The affected application does not properly handle user session establishment and invalidation. This could allow a remote attacker to circumvent the additional multi factor authentication for user session establishment.
Authenticating a user, or otherwise establishing a new user session, without invalidating any existing session identifier gives an attacker the opportunity to steal authenticated sessions.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Sinema_remote_connect_server | Siemens | * | 3.2 (excluding) |
Sinema_remote_connect_server | Siemens | 3.2 (including) | 3.2 (including) |
Sinema_remote_connect_server | Siemens | 3.2-hf1 (including) | 3.2-hf1 (including) |
Sinema_remote_connect_server | Siemens | 3.2-sp1 (including) | 3.2-sp1 (including) |
Such a scenario is commonly observed when: