Sinema Remote Connect Server
by Siemens
Standard maintenance is sufficient
Sinema Remote Connect Server has low exploitation rates. Attackers rarely target this software's known vulnerabilities.
What to do
- Keep automatic updates enabled
- No urgent action needed
- Review periodically as part of normal maintenance
What Attackers Target
Vulnerabilities with high exploit probability
5.6%
Confirmed actively exploited (CISA)
1.4%
Public exploit code available
0.0%
Based on 71 known vulnerabilities. Percentages show the proportion that are actively dangerous — a low percentage means most vulnerabilities in this product are not being exploited.
Most Dangerous Vulnerabilities
| CVE | CVSS | Exploit Probability | Confirmed |
|---|---|---|---|
| CVE-2021-40438 | 9.0 | 94.4% | Yes |
| CVE-2022-25235 | 9.8 | 13.3% | — |
| CVE-2024-39865 | 8.8 | 10.6% | — |
| CVE-2021-34798 | 7.5 | 10.3% | — |
| CVE-2021-20093 | 9.1 | 8.2% | — |
| CVE-2022-25315 | 9.8 | 7.7% | — |
| CVE-2022-25236 | 9.8 | 7.4% | — |
| CVE-2022-29034 | 6.1 | 7.0% | — |
| CVE-2022-23102 | 6.1 | 4.9% | — |
| CVE-2021-46143 | 8.1 | 4.1% | — |
| CVE-2022-23990 | 7.5 | 3.5% | — |
| CVE-2021-41991 | 7.5 | 2.5% | — |
| CVE-2022-32262 | 8.8 | 2.1% | — |
| CVE-2024-39570 | 8.8 | 2.0% | — |
| CVE-2022-23852 | 9.8 | 1.7% | — |
| CVE-2024-39571 | 8.8 | 1.5% | — |
| CVE-2022-22822 | 9.8 | 1.3% | — |
| CVE-2021-22924 | 3.7 | 0.7% | — |
| CVE-2024-39876 | 4.0 | 0.6% | — |
| CVE-2024-39869 | 6.5 | 0.5% | — |
4
/ 100
low-risk
Active Threat
4/50 · Minimal
Exploit Availability
0/50 · Minimal
Score uses Wilson score intervals to account for sample size. Products with few CVEs are scored conservatively.