Vulnerability Description
A vulnerability was discovered in Siemens SIMATIC WinCC Sm@rtClient for Android (All versions before V1.0.2.2). The existing TLS protocol implementation could allow an attacker to read and modify data within a TLS session while performing a Man-in-the-Middle (MitM) attack.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Siemens | Simatic Wincc Sm\@Rtclient | <= 1.0.2.1 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/99582Third Party AdvisoryVDB Entry
- https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-589378.pdfVendor Advisory
- http://www.securityfocus.com/bid/99582Third Party AdvisoryVDB Entry
- https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-589378.pdfVendor Advisory
FAQ
What is CVE-2017-6870?
CVE-2017-6870 is a vulnerability with a CVSS score of 7.4 (HIGH). A vulnerability was discovered in Siemens SIMATIC WinCC Sm@rtClient for Android (All versions before V1.0.2.2). The existing TLS protocol implementation could allow an attacker to read and modify data...
How severe is CVE-2017-6870?
CVE-2017-6870 has been rated HIGH with a CVSS base score of 7.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-6870?
Check the references section above for vendor advisories and patch information. Affected products include: Siemens Simatic Wincc Sm\@Rtclient.