Vulnerability Description
A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.1). An attacker in machine-in-the-middle could obtain plaintext secret values by observing length differences during a series of guesses in which a string in an HTTP request URL potentially matches an unknown string in an HTTP response body, aka a "BREACH" attack.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Siemens | Sinema Remote Connect Server | < 3.1 |
Related Weaknesses (CWE)
References
- https://cert-portal.siemens.com/productcert/html/ssa-484086.html
- https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdfPatchVendor Advisory
- https://cert-portal.siemens.com/productcert/html/ssa-484086.html
- https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdfPatchVendor Advisory
FAQ
What is CVE-2022-27221?
CVE-2022-27221 is a vulnerability with a CVSS score of 5.9 (MEDIUM). A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.1). An attacker in machine-in-the-middle could obtain plaintext secret values by observing length differences dur...
How severe is CVE-2022-27221?
CVE-2022-27221 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-27221?
Check the references section above for vendor advisories and patch information. Affected products include: Siemens Sinema Remote Connect Server.