Описание
The Siemens SPCanywhere application for Android and iOS does not use encryption during lookups of system ID to IP address mappings, which allows man-in-the-middle attackers to discover alarm IP addresses and spoof servers by intercepting the client-server data stream.
Уязвимые конфигурации
Конфигурация 1Версия до 1.4 (включая)Версия до 1.4.1 (включая)
Одно из
cpe:2.3:a:siemens:spcanywhere:*:*:*:*:*:iphone_os:*:*
cpe:2.3:a:siemens:spcanywhere:*:*:*:*:*:android:*:*
EPSS
Процентиль: 35%
0.00141
Низкий
4.3 Medium
CVSS2
Дефекты
CWE-200
Связанные уязвимости
github
больше 3 лет назад
The Siemens SPCanywhere application for Android and iOS does not use encryption during lookups of system ID to IP address mappings, which allows man-in-the-middle attackers to discover alarm IP addresses and spoof servers by intercepting the client-server data stream.
EPSS
Процентиль: 35%
0.00141
Низкий
4.3 Medium
CVSS2
Дефекты
CWE-200