Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2018-4849

Опубликовано: 03 мая 2018
Источник: nvd
CVSS3: 7.4
CVSS2: 5.8
EPSS Низкий

Описание

A vulnerability has been identified in Siveillance VMS Video for Android (All versions < V12.1a (2018 R1)), Siveillance VMS Video for iOS (All versions < V12.1a (2018 R1)). Improper certificate validation could allow an attacker in a privileged network position to read data from and write data to the encrypted communication channel between the app and a server. The security vulnerability could be exploited by an attacker in a privileged network position which allows intercepting the communication channel between the affected app and a server (such as Man-in-the-Middle). Furthermore, an attacker must be able to generate a certificate that results for the validation algorithm in a checksum identical to a trusted certificate. Successful exploitation requires no user interaction. The vulnerability could allow reading data from and writing data to the encrypted communication channel between the app and a server, impacting the communication's confidentiality and integrity. At the time of adv

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:siemens:siveillance_vms_video:*:*:*:*:*:android:*:*
Версия до 12.1a (исключая)
cpe:2.3:a:siemens:siveillance_vms_video:*:*:*:*:*:iphone_os:*:*
Версия до 12.1a (исключая)

EPSS

Процентиль: 29%
0.00104
Низкий

7.4 High

CVSS3

5.8 Medium

CVSS2

Дефекты

CWE-295
CWE-295

Связанные уязвимости

CVSS3: 7.4
github
больше 3 лет назад

A vulnerability has been identified in Siveillance VMS Video for Android (All versions < V12.1a (2018 R1)), Siveillance VMS Video for iOS (All versions < V12.1a (2018 R1)). Improper certificate validation could allow an attacker in a privileged network position to read data from and write data to the encrypted communication channel between the app and a server. The security vulnerability could be exploited by an attacker in a privileged network position which allows intercepting the communication channel between the affected app and a server (such as Man-in-the-Middle). Furthermore, an attacker must be able to generate a certificate that results for the validation algorithm in a checksum identical to a trusted certificate. Successful exploitation requires no user interaction. The vulnerability could allow reading data from and writing data to the encrypted communication channel between the app and a server, impacting the communication's confidentiality and integrity. At the time of ...

EPSS

Процентиль: 29%
0.00104
Низкий

7.4 High

CVSS3

5.8 Medium

CVSS2

Дефекты

CWE-295
CWE-295