Unauthorized Role Change Vulnerability in Siveillance VMS from Siemens
CVE-2019-6581

8.8HIGH

Key Information:

Summary

A vulnerability exists within the Siveillance VMS software that allows an authenticated attacker with network access to port 80/TCP to change user roles without appropriate authorization. This security flaw can be exploited remotely, compromising the system's confidentiality, integrity, and availability. There is no requirement for user interaction to carry out this exploit, highlighting a significant risk in network security for the affected versions of Siveillance VMS. At the time of this advisory, there have been no reported public exploits targeting this vulnerability.

Affected Version(s)

Siveillance VMS 2017 R2 All versions < V11.2a

Siveillance VMS 2018 R1 All versions < V12.1a

Siveillance VMS 2018 R2 All versions < V12.2a

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.