A vulnerability was discovered in Siemens SIMATIC WinCC Sm@rtClient for Android (All versions before V1.0.2.2). The existing TLS protocol implementation could allow an attacker to read and modify data within a TLS session while performing a Man-in-the-Middle (MitM) attack.
The product does not adequately verify the identity of actors at both ends of a communication channel, or does not adequately ensure the integrity of the channel, in a way that allows the channel to be accessed or influenced by an actor that is not an endpoint.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/99582 | third party advisory vdb entry |
https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-589378.pdf | vendor advisory |