CVE-2017-6871

A vulnerability was discovered in Siemens SIMATIC WinCC Sm@rtClient for Android (All versions before V1.0.2.2) and SIMATIC WinCC Sm@rtClient for Android Lite (All versions before V1.0.2.2). An attacker with physical access to an unlocked mobile device, that has the affected app running, could bypass the app's authentication mechanism under certain conditions.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:siemens:simatic_wincc_sm\@rtclient:*:*:*:*:*:android:*:*
cpe:2.3:a:siemens:simatic_wincc_sm\@rtclient_lite:*:*:*:*:*:android:*:*

History

21 Nov 2024, 03:30

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/99582 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/99582 - Third Party Advisory, VDB Entry
References () https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-589378.pdf - Vendor Advisory () https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-589378.pdf - Vendor Advisory

Information

Published : 2017-08-08 00:29

Updated : 2024-11-21 03:30


NVD link : CVE-2017-6871

Mitre link : CVE-2017-6871

CVE.ORG link : CVE-2017-6871


JSON object : View

Products Affected

siemens

  • simatic_wincc_sm\@rtclient_lite
  • simatic_wincc_sm\@rtclient
CWE
CWE-288

Authentication Bypass Using an Alternate Path or Channel

CWE-287

Improper Authentication