Local Privilege Escalation Flaw in SPPA-T3000 MS3000 Migration Server by Siemens
CVE-2019-18297
7.8HIGH
Key Information:
- Vendor
- Siemens
- Vendor
- CVE Published:
- 12 December 2019
Summary
A vulnerability has been discovered in the SPPA-T3000 MS3000 Migration Server that allows an attacker with local access and low privileges to escalate their permissions to root level. This can be achieved by sending specifically crafted packets to a named pipe within the server. For exploitation, the attacker must have local access to the MS3000, which limits the attack surface. As of the latest advisory, there were no known public exploits associated with this vulnerability. Detailed security advisories can be referenced for further information.
Affected Version(s)
SPPA-T3000 MS3000 Migration Server All versions
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved