Lucene search

K
SiemensSimatic Wincc Sm@rtclient*

6 matches found

CVE
CVE
added 2017/08/08 12:29 a.m.47 views

CVE-2017-6870

A vulnerability was discovered in Siemens SIMATIC WinCC Sm@rtClient for Android (All versions before V1.0.2.2). The existing TLS protocol implementation could allow an attacker to read and modify data within a TLS session while performing a Man-in-the-Middle (MitM) attack.

7.4CVSS7AI score0.0024EPSS
CVE
CVE
added 2015/01/14 11:59 a.m.38 views

CVE-2014-5233

The Siemens SIMATIC WinCC Sm@rtClient app before 1.0.2 for iOS allows physically proximate attackers to discover Sm@rtServer credentials by leveraging an error in the credential-processing mechanism.

1.9CVSS6.4AI score0.00063EPSS
CVE
CVE
added 2015/08/03 1:59 a.m.38 views

CVE-2015-5084

The Siemens SIMATIC WinCC Sm@rtClient and Sm@rtClient Lite applications before 01.00.01.00 for Android do not properly store passwords, which allows physically proximate attackers to obtain sensitive information via unspecified vectors.

2.1CVSS6.1AI score0.00131EPSS
CVE
CVE
added 2015/01/14 11:59 a.m.36 views

CVE-2014-5231

The Siemens SIMATIC WinCC Sm@rtClient app before 1.0.2 for iOS allows physically proximate attackers to extract the password from storage via unspecified vectors.

2.1CVSS6.5AI score0.00063EPSS
CVE
CVE
added 2017/08/08 12:29 a.m.35 views

CVE-2017-6871

A vulnerability was discovered in Siemens SIMATIC WinCC Sm@rtClient for Android (All versions before V1.0.2.2) and SIMATIC WinCC Sm@rtClient for Android Lite (All versions before V1.0.2.2). An attacker with physical access to an unlocked mobile device, that has the affected app running, could bypas...

5.4CVSS5.2AI score0.00059EPSS
CVE
CVE
added 2015/01/14 11:59 a.m.34 views

CVE-2014-5232

The Siemens SIMATIC WinCC Sm@rtClient app before 1.0.2 for iOS allows local users to bypass an intended application-password requirement by leveraging the running of the app in the background state.

1.9CVSS6.2AI score0.00054EPSS