SCADA Vulnerabilities & Exposures (SVE)

CRITIFENCE® SCADA Vulnerabilities and Exposures Database (SVE)

[SVE-632649219] Siemens SINEMA Server Privilege Escalation Vulnerability

Date Type Platform Author EDB-ID CVE-ID OSVDB-ID Download App SIS Signature
2016-08-02OTHERSiemens SINEMArgodN/A2016-6486N/AN/AN/A


# Siemens SINEMA Server Privilege Escalation Vulnerability


Security researcher rgod working with Trend Micro’s Zero Day Initiative has identified a privilege escalation vulnerability in the Siemens SINEMA Server. Siemens has produced a temporary fix to mitigate this vulnerability.


Siemens reports that the vulnerability affects the following products:
SINEMA Server: All versions.


Successful exploitation of this vulnerability could allow users, authenticated via the operating system, to escalate their privileges under certain conditions.

Impact to individual organizations depends on many factors that are unique to each organization. NCCIC/ICS-CERT recommends that organizations evaluate the impact of this vulnerability based on their operational environment, architecture, and product implementation.


Siemens is a multinational company headquartered in Munich, Germany.

The affected product, SINEMA, is a network management appliance for industrial applications and allows network monitoring as well as diagnostics and reporting functions integrated into SCADA systems such as WinCC. According to Siemens, the SINEMA product is deployed across several sectors including Chemical, Commercial Facilities, Critical Manufacturing, Energy, Government Facilities, Water and Wastewater Systems, and others. Siemens estimates that this product is used worldwide.




The file permissions set for the SINEMA Server application folder could allow users, authenticated via the operating system, to escalate their privileges.
CVE-2016-6486 has been assigned to this vulnerability. A CVSS v3 base score of 7.3 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H).



This vulnerability is not exploitable remotely and cannot be exploited without user interaction.


No known public exploits specifically target this vulnerability. 


An attacker with a low skill would be able to exploit this vulnerability.


Siemens has a temporary fix for existing installations. For detailed information on how-to correct the file permissions please call your local service organization. If you require assistance in identifying your local service organization, please call a local Siemens hotline center:

Siemens is working on a new SINEMA Server version to resolve the vulnerability and the advisory will be updated as soon as new information becomes available.

As a general security measure, Siemens strongly recommends protecting network access to SINEMA Server systems with appropriate mechanisms. It is advised to configure the environment according to Siemens operational guidelines in order to run the devices in a protected IT environment.

For more information on this vulnerability, please see Siemens Security Advisory SSA-321174 at the following location: