The Siemens SPCanywhere application for Android and iOS does not use encryption during lookups of system ID to IP address mappings, which allows man-in-the-middle attackers to discover alarm IP addresses and spoof servers by intercepting the client-server data stream.
References
Link | Resource |
---|---|
http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-185226.pdf | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2015-03-06 18:59
Updated : 2015-07-15 08:07
NVD link : CVE-2015-1595
Mitre link : CVE-2015-1595
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
siemens
- spcanywhere