A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.2 SP4). Affected applications do not properly validate license restrictions against the database, allowing direct modification of the system_ticketinfo table to bypass license limitations without proper enforcement checks. This could allow with database access to circumvent licensing restrictions by directly modifying database values and potentially enabling unauthorized use beyond the permitted scope.
History

Wed, 10 Dec 2025 21:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:siemens:sinema_remote_connect_server:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:sinema_remote_connect_server:3.2:sp1:*:*:*:*:*:*
cpe:2.3:a:siemens:sinema_remote_connect_server:3.2:sp2:*:*:*:*:*:*
cpe:2.3:a:siemens:sinema_remote_connect_server:3.2:sp3:*:*:*:*:*:*

Wed, 10 Dec 2025 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Siemens
Siemens sinema Remote Connect Server
Vendors & Products Siemens
Siemens sinema Remote Connect Server

Tue, 09 Dec 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 09 Dec 2025 11:00:00 +0000

Type Values Removed Values Added
Description A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.2 SP4). Affected applications do not properly validate license restrictions against the database, allowing direct modification of the system_ticketinfo table to bypass license limitations without proper enforcement checks. This could allow with database access to circumvent licensing restrictions by directly modifying database values and potentially enabling unauthorized use beyond the permitted scope.
Weaknesses CWE-863
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: siemens

Published: 2025-12-09T10:44:29.280Z

Updated: 2025-12-09T16:24:31.046Z

Reserved: 2025-04-16T08:50:26.975Z

Link: CVE-2025-40819

cve-icon Vulnrichment

Updated: 2025-12-09T16:23:58.789Z

cve-icon NVD

Status : Analyzed

Published: 2025-12-09T16:17:46.223

Modified: 2025-12-10T21:42:00.563

Link: CVE-2025-40819

cve-icon Redhat

No data.