Логотип exploitDog
bind:CVE-2017-6870
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2017-6870

Количество 2

Количество 2

nvd логотип

CVE-2017-6870

больше 8 лет назад

A vulnerability was discovered in Siemens SIMATIC WinCC Sm@rtClient for Android (All versions before V1.0.2.2). The existing TLS protocol implementation could allow an attacker to read and modify data within a TLS session while performing a Man-in-the-Middle (MitM) attack.

CVSS3: 7.4
EPSS: Низкий
github логотип

GHSA-fhhq-wp7p-mxf8

больше 3 лет назад

A vulnerability was discovered in Siemens SIMATIC WinCC Sm@rtClient for Android (All versions before V1.0.2.2). The existing TLS protocol implementation could allow an attacker to read and modify data within a TLS session while performing a Man-in-the-Middle (MitM) attack.

CVSS3: 7.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2017-6870

A vulnerability was discovered in Siemens SIMATIC WinCC Sm@rtClient for Android (All versions before V1.0.2.2). The existing TLS protocol implementation could allow an attacker to read and modify data within a TLS session while performing a Man-in-the-Middle (MitM) attack.

CVSS3: 7.4
0%
Низкий
больше 8 лет назад
github логотип
GHSA-fhhq-wp7p-mxf8

A vulnerability was discovered in Siemens SIMATIC WinCC Sm@rtClient for Android (All versions before V1.0.2.2). The existing TLS protocol implementation could allow an attacker to read and modify data within a TLS session while performing a Man-in-the-Middle (MitM) attack.

CVSS3: 7.4
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу