Description
A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.2 SP4). Affected applications do not properly validate license restrictions against the database, allowing direct modification of the system_ticketinfo table to bypass license limitations without proper enforcement checks. This could allow with database access to circumvent licensing restrictions by directly modifying database values and potentially enabling unauthorized use beyond the permitted scope.
CVSS Metrics
- Vector
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
- Attack Vector
- network
- Complexity
- low
- Privileges
- low
- User Action
- none
- Scope
- unchanged
- Confidentiality
- none
- Integrity
- low
- Availability
- none
- Weaknesses
- CWE-863
Metadata
- Primary Vendor
- SIEMENS
- Published
- 12/9/2025
- Last Modified
- 12/10/2025
- Source
- NIST NVD
- Note: Verify all details with official vendor sources before applying patches.
Affected Products
siemens : sinema_remote_connect_serversiemens : sinema_remote_connect_serversiemens : sinema_remote_connect_serversiemens : sinema_remote_connect_server
AI-Powered Remediation
Generate remediation guidance or a C-suite brief for this vulnerability.