var-201501-0292
Vulnerability from variot
The Siemens SIMATIC WinCC Sm@rtClient app before 1.0.2 for iOS allows physically proximate attackers to extract the password from storage via unspecified vectors. Siemens SIMATIC WinCC is a monitoring control and data acquisition SCADA and human machine interface HMI system. Multiple Siemens SIMATIC WinCC products are prone to a local security-bypass vulnerability. Successful exploits will allow local attackers to bypass certain security restrictions. Other attacks are also possible. The following products are vulnerable: Versions prior to Siemens SIMATIC WinCC Sm@rtClient 1.0.2 are vulnerable. Versions prior to Siemens SIMATIC WinCC Sm@rtClient for IOS 1.0.2 are vulnerable. Siemens SIMATIC WinCC Sm@rtClient app for iOS is a set of client applications based on the iOS platform of Siemens, Germany, which provides remote mobile operation and observation of SIMATIC HMI systems. An attacker could exploit this vulnerability to obtain passwords in the repository
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201501-0292",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "simatic wincc sm\\@rtclient",
"scope": "lte",
"trust": 1.0,
"vendor": "siemens",
"version": "1.0"
},
{
"model": "simatic wincc sm@rtclient",
"scope": "lt",
"trust": 0.8,
"vendor": "siemens",
"version": "1.0.2"
},
{
"model": "simatic wincc sm@rtclient for ios",
"scope": "lt",
"trust": 0.6,
"vendor": "siemens",
"version": "1.0.2"
},
{
"model": "simatic wincc sm@rtclient lite for ios",
"scope": "lt",
"trust": 0.6,
"vendor": "siemens",
"version": "1.0.2"
},
{
"model": "simatic wincc sm\\@rtclient",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "1.0"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "simatic wincc sm rtclient",
"version": "*"
}
],
"sources": [
{
"db": "IVD",
"id": "a9f45384-2351-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "91d3cfc5-257f-4a4f-8fa0-2b549a1ff7b0"
},
{
"db": "CNVD",
"id": "CNVD-2015-00426"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-007606"
},
{
"db": "CNNVD",
"id": "CNNVD-201501-289"
},
{
"db": "NVD",
"id": "CVE-2014-5231"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:siemens:simatic_wincc_sm%40rtclient",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-007606"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Kim Schlyter, Seyton Bradford, and Richard Warren",
"sources": [
{
"db": "BID",
"id": "72065"
}
],
"trust": 0.3
},
"cve": "CVE-2014-5231",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "CVE-2014-5231",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "LOW",
"trust": 1.8,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "CNVD-2015-00426",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "a9f45384-2351-11e6-abef-000c29c66e3d",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "91d3cfc5-257f-4a4f-8fa0-2b549a1ff7b0",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "VHN-73172",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "LOW",
"trust": 0.1,
"vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2014-5231",
"trust": 1.0,
"value": "LOW"
},
{
"author": "NVD",
"id": "CVE-2014-5231",
"trust": 0.8,
"value": "Low"
},
{
"author": "CNVD",
"id": "CNVD-2015-00426",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201501-289",
"trust": 0.6,
"value": "LOW"
},
{
"author": "IVD",
"id": "a9f45384-2351-11e6-abef-000c29c66e3d",
"trust": 0.2,
"value": "LOW"
},
{
"author": "IVD",
"id": "91d3cfc5-257f-4a4f-8fa0-2b549a1ff7b0",
"trust": 0.2,
"value": "LOW"
},
{
"author": "VULHUB",
"id": "VHN-73172",
"trust": 0.1,
"value": "LOW"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "a9f45384-2351-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "91d3cfc5-257f-4a4f-8fa0-2b549a1ff7b0"
},
{
"db": "CNVD",
"id": "CNVD-2015-00426"
},
{
"db": "VULHUB",
"id": "VHN-73172"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-007606"
},
{
"db": "CNNVD",
"id": "CNNVD-201501-289"
},
{
"db": "NVD",
"id": "CVE-2014-5231"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The Siemens SIMATIC WinCC Sm@rtClient app before 1.0.2 for iOS allows physically proximate attackers to extract the password from storage via unspecified vectors. Siemens SIMATIC WinCC is a monitoring control and data acquisition SCADA and human machine interface HMI system. Multiple Siemens SIMATIC WinCC products are prone to a local security-bypass vulnerability. \nSuccessful exploits will allow local attackers to bypass certain security restrictions. Other attacks are also possible. \nThe following products are vulnerable:\nVersions prior to Siemens SIMATIC WinCC Sm@rtClient 1.0.2 are vulnerable. \nVersions prior to Siemens SIMATIC WinCC Sm@rtClient for IOS 1.0.2 are vulnerable. Siemens SIMATIC WinCC Sm@rtClient app for iOS is a set of client applications based on the iOS platform of Siemens, Germany, which provides remote mobile operation and observation of SIMATIC HMI systems. An attacker could exploit this vulnerability to obtain passwords in the repository",
"sources": [
{
"db": "NVD",
"id": "CVE-2014-5231"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-007606"
},
{
"db": "CNVD",
"id": "CNVD-2015-00426"
},
{
"db": "BID",
"id": "72065"
},
{
"db": "IVD",
"id": "a9f45384-2351-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "91d3cfc5-257f-4a4f-8fa0-2b549a1ff7b0"
},
{
"db": "VULHUB",
"id": "VHN-73172"
}
],
"trust": 2.88
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2014-5231",
"trust": 3.8
},
{
"db": "SIEMENS",
"id": "SSA-311299",
"trust": 2.3
},
{
"db": "CNNVD",
"id": "CNNVD-201501-289",
"trust": 1.1
},
{
"db": "SECTRACK",
"id": "1031546",
"trust": 1.1
},
{
"db": "CNVD",
"id": "CNVD-2015-00426",
"trust": 1.0
},
{
"db": "BID",
"id": "72065",
"trust": 1.0
},
{
"db": "JVNDB",
"id": "JVNDB-2014-007606",
"trust": 0.8
},
{
"db": "ICS CERT",
"id": "ICSA-15-013-01",
"trust": 0.3
},
{
"db": "IVD",
"id": "A9F45384-2351-11E6-ABEF-000C29C66E3D",
"trust": 0.2
},
{
"db": "IVD",
"id": "91D3CFC5-257F-4A4F-8FA0-2B549A1FF7B0",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-73172",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "a9f45384-2351-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "91d3cfc5-257f-4a4f-8fa0-2b549a1ff7b0"
},
{
"db": "CNVD",
"id": "CNVD-2015-00426"
},
{
"db": "VULHUB",
"id": "VHN-73172"
},
{
"db": "BID",
"id": "72065"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-007606"
},
{
"db": "CNNVD",
"id": "CNNVD-201501-289"
},
{
"db": "NVD",
"id": "CVE-2014-5231"
}
]
},
"id": "VAR-201501-0292",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "a9f45384-2351-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "91d3cfc5-257f-4a4f-8fa0-2b549a1ff7b0"
},
{
"db": "CNVD",
"id": "CNVD-2015-00426"
},
{
"db": "VULHUB",
"id": "VHN-73172"
}
],
"trust": 1.9346759666666666
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 1.0
}
],
"sources": [
{
"db": "IVD",
"id": "a9f45384-2351-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "91d3cfc5-257f-4a4f-8fa0-2b549a1ff7b0"
},
{
"db": "CNVD",
"id": "CNVD-2015-00426"
}
]
},
"last_update_date": "2024-11-23T22:01:54.393000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "SSA-311299",
"trust": 0.8,
"url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-311299.pdf"
},
{
"title": "Patch for Siemens SIMATIC WinCC Sm@rtClient app Information Disclosure Vulnerability (CNVD-2015-00426)",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/54177"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-00426"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-007606"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-200",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-73172"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-007606"
},
{
"db": "NVD",
"id": "CVE-2014-5231"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.3,
"url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-311299.pdf"
},
{
"trust": 1.4,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-5231"
},
{
"trust": 1.1,
"url": "http://www.securitytracker.com/id/1031546"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-5231"
},
{
"trust": 0.3,
"url": "http://www.siemens.com/"
},
{
"trust": 0.3,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-15-013-01"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-00426"
},
{
"db": "VULHUB",
"id": "VHN-73172"
},
{
"db": "BID",
"id": "72065"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-007606"
},
{
"db": "CNNVD",
"id": "CNNVD-201501-289"
},
{
"db": "NVD",
"id": "CVE-2014-5231"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "a9f45384-2351-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "91d3cfc5-257f-4a4f-8fa0-2b549a1ff7b0"
},
{
"db": "CNVD",
"id": "CNVD-2015-00426"
},
{
"db": "VULHUB",
"id": "VHN-73172"
},
{
"db": "BID",
"id": "72065"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-007606"
},
{
"db": "CNNVD",
"id": "CNNVD-201501-289"
},
{
"db": "NVD",
"id": "CVE-2014-5231"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-01-20T00:00:00",
"db": "IVD",
"id": "a9f45384-2351-11e6-abef-000c29c66e3d"
},
{
"date": "2015-01-20T00:00:00",
"db": "IVD",
"id": "91d3cfc5-257f-4a4f-8fa0-2b549a1ff7b0"
},
{
"date": "2015-01-20T00:00:00",
"db": "CNVD",
"id": "CNVD-2015-00426"
},
{
"date": "2015-01-14T00:00:00",
"db": "VULHUB",
"id": "VHN-73172"
},
{
"date": "2015-01-14T00:00:00",
"db": "BID",
"id": "72065"
},
{
"date": "2015-01-16T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-007606"
},
{
"date": "2015-01-15T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201501-289"
},
{
"date": "2015-01-14T11:59:00.053000",
"db": "NVD",
"id": "CVE-2014-5231"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-01-20T00:00:00",
"db": "CNVD",
"id": "CNVD-2015-00426"
},
{
"date": "2015-11-13T00:00:00",
"db": "VULHUB",
"id": "VHN-73172"
},
{
"date": "2015-01-14T00:00:00",
"db": "BID",
"id": "72065"
},
{
"date": "2015-01-16T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-007606"
},
{
"date": "2015-01-15T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201501-289"
},
{
"date": "2024-11-21T02:11:39.367000",
"db": "NVD",
"id": "CVE-2014-5231"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "BID",
"id": "72065"
},
{
"db": "CNNVD",
"id": "CNNVD-201501-289"
}
],
"trust": 0.9
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "iOS for Siemens SIMATIC WinCC Sm@rtClient Vulnerability in application to extract password from storage",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-007606"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "information disclosure",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201501-289"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.