VAR-201501-0292

Vulnerability from variot - Updated: 2023-12-18 12:21

The Siemens SIMATIC WinCC Sm@rtClient app before 1.0.2 for iOS allows physically proximate attackers to extract the password from storage via unspecified vectors. Siemens SIMATIC WinCC is a monitoring control and data acquisition SCADA and human machine interface HMI system. Multiple Siemens SIMATIC WinCC products are prone to a local security-bypass vulnerability. Successful exploits will allow local attackers to bypass certain security restrictions. Other attacks are also possible. The following products are vulnerable: Versions prior to Siemens SIMATIC WinCC Sm@rtClient 1.0.2 are vulnerable. Versions prior to Siemens SIMATIC WinCC Sm@rtClient for IOS 1.0.2 are vulnerable. Siemens SIMATIC WinCC Sm@rtClient app for iOS is a set of client applications based on the iOS platform of Siemens, Germany, which provides remote mobile operation and observation of SIMATIC HMI systems. An attacker could exploit this vulnerability to obtain passwords in the repository

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201501-0292",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "simatic wincc sm\\@rtclient",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "1.0"
      },
      {
        "model": "simatic wincc sm@rtclient",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "siemens",
        "version": "1.0.2"
      },
      {
        "model": "simatic wincc sm@rtclient for ios",
        "scope": "lt",
        "trust": 0.6,
        "vendor": "siemens",
        "version": "1.0.2"
      },
      {
        "model": "simatic wincc sm@rtclient lite for ios",
        "scope": "lt",
        "trust": 0.6,
        "vendor": "siemens",
        "version": "1.0.2"
      },
      {
        "model": "simatic wincc sm\\@rtclient",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "siemens",
        "version": "1.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "simatic wincc sm rtclient",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "a9f45384-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "91d3cfc5-257f-4a4f-8fa0-2b549a1ff7b0"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-00426"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-007606"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-5231"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201501-289"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:a:siemens:simatic_wincc_sm\\@rtclient:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "1.0",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2014-5231"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Kim Schlyter, Seyton Bradford, and Richard Warren",
    "sources": [
      {
        "db": "BID",
        "id": "72065"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2014-5231",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": true,
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "LOW",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Local",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 2.1,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "CVE-2014-5231",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Low",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "CNVD-2015-00426",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "a9f45384-2351-11e6-abef-000c29c66e3d",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "91d3cfc5-257f-4a4f-8fa0-2b549a1ff7b0",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "VHN-73172",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "LOW",
            "trust": 0.1,
            "vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2014-5231",
            "trust": 1.8,
            "value": "LOW"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2015-00426",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201501-289",
            "trust": 0.6,
            "value": "LOW"
          },
          {
            "author": "IVD",
            "id": "a9f45384-2351-11e6-abef-000c29c66e3d",
            "trust": 0.2,
            "value": "LOW"
          },
          {
            "author": "IVD",
            "id": "91d3cfc5-257f-4a4f-8fa0-2b549a1ff7b0",
            "trust": 0.2,
            "value": "LOW"
          },
          {
            "author": "VULHUB",
            "id": "VHN-73172",
            "trust": 0.1,
            "value": "LOW"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "a9f45384-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "91d3cfc5-257f-4a4f-8fa0-2b549a1ff7b0"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-00426"
      },
      {
        "db": "VULHUB",
        "id": "VHN-73172"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-007606"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-5231"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201501-289"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The Siemens SIMATIC WinCC Sm@rtClient app before 1.0.2 for iOS allows physically proximate attackers to extract the password from storage via unspecified vectors. Siemens SIMATIC WinCC is a monitoring control and data acquisition SCADA and human machine interface HMI system. Multiple Siemens SIMATIC WinCC products are prone to a local security-bypass vulnerability. \nSuccessful exploits will allow local attackers to bypass certain security restrictions. Other attacks are also possible. \nThe following products are vulnerable:\nVersions prior to Siemens SIMATIC WinCC Sm@rtClient 1.0.2 are vulnerable. \nVersions prior to Siemens SIMATIC WinCC Sm@rtClient for IOS 1.0.2 are vulnerable. Siemens SIMATIC WinCC Sm@rtClient app for iOS is a set of client applications based on the iOS platform of Siemens, Germany, which provides remote mobile operation and observation of SIMATIC HMI systems. An attacker could exploit this vulnerability to obtain passwords in the repository",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2014-5231"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-007606"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-00426"
      },
      {
        "db": "BID",
        "id": "72065"
      },
      {
        "db": "IVD",
        "id": "a9f45384-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "91d3cfc5-257f-4a4f-8fa0-2b549a1ff7b0"
      },
      {
        "db": "VULHUB",
        "id": "VHN-73172"
      }
    ],
    "trust": 2.88
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2014-5231",
        "trust": 3.8
      },
      {
        "db": "SIEMENS",
        "id": "SSA-311299",
        "trust": 2.3
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201501-289",
        "trust": 1.1
      },
      {
        "db": "SECTRACK",
        "id": "1031546",
        "trust": 1.1
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-00426",
        "trust": 1.0
      },
      {
        "db": "BID",
        "id": "72065",
        "trust": 1.0
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-007606",
        "trust": 0.8
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-15-013-01",
        "trust": 0.3
      },
      {
        "db": "IVD",
        "id": "A9F45384-2351-11E6-ABEF-000C29C66E3D",
        "trust": 0.2
      },
      {
        "db": "IVD",
        "id": "91D3CFC5-257F-4A4F-8FA0-2B549A1FF7B0",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-73172",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "a9f45384-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "91d3cfc5-257f-4a4f-8fa0-2b549a1ff7b0"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-00426"
      },
      {
        "db": "VULHUB",
        "id": "VHN-73172"
      },
      {
        "db": "BID",
        "id": "72065"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-007606"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-5231"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201501-289"
      }
    ]
  },
  "id": "VAR-201501-0292",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "a9f45384-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "91d3cfc5-257f-4a4f-8fa0-2b549a1ff7b0"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-00426"
      },
      {
        "db": "VULHUB",
        "id": "VHN-73172"
      }
    ],
    "trust": 1.9285676433333334
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "a9f45384-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "91d3cfc5-257f-4a4f-8fa0-2b549a1ff7b0"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-00426"
      }
    ]
  },
  "last_update_date": "2023-12-18T12:21:05.329000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "SSA-311299",
        "trust": 0.8,
        "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-311299.pdf"
      },
      {
        "title": "Patch for Siemens SIMATIC WinCC Sm@rtClient app Information Disclosure Vulnerability (CNVD-2015-00426)",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/54177"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-00426"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-007606"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-200",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-73172"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-007606"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-5231"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.3,
        "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-311299.pdf"
      },
      {
        "trust": 1.4,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-5231"
      },
      {
        "trust": 1.1,
        "url": "http://www.securitytracker.com/id/1031546"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-5231"
      },
      {
        "trust": 0.3,
        "url": "http://www.siemens.com/"
      },
      {
        "trust": 0.3,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-15-013-01"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-00426"
      },
      {
        "db": "VULHUB",
        "id": "VHN-73172"
      },
      {
        "db": "BID",
        "id": "72065"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-007606"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-5231"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201501-289"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "a9f45384-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "91d3cfc5-257f-4a4f-8fa0-2b549a1ff7b0"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-00426"
      },
      {
        "db": "VULHUB",
        "id": "VHN-73172"
      },
      {
        "db": "BID",
        "id": "72065"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-007606"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-5231"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201501-289"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2015-01-20T00:00:00",
        "db": "IVD",
        "id": "a9f45384-2351-11e6-abef-000c29c66e3d"
      },
      {
        "date": "2015-01-20T00:00:00",
        "db": "IVD",
        "id": "91d3cfc5-257f-4a4f-8fa0-2b549a1ff7b0"
      },
      {
        "date": "2015-01-20T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2015-00426"
      },
      {
        "date": "2015-01-14T00:00:00",
        "db": "VULHUB",
        "id": "VHN-73172"
      },
      {
        "date": "2015-01-14T00:00:00",
        "db": "BID",
        "id": "72065"
      },
      {
        "date": "2015-01-16T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2014-007606"
      },
      {
        "date": "2015-01-14T11:59:00.053000",
        "db": "NVD",
        "id": "CVE-2014-5231"
      },
      {
        "date": "2015-01-15T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201501-289"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2015-01-20T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2015-00426"
      },
      {
        "date": "2015-11-13T00:00:00",
        "db": "VULHUB",
        "id": "VHN-73172"
      },
      {
        "date": "2015-01-14T00:00:00",
        "db": "BID",
        "id": "72065"
      },
      {
        "date": "2015-01-16T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2014-007606"
      },
      {
        "date": "2015-11-13T16:52:17.800000",
        "db": "NVD",
        "id": "CVE-2014-5231"
      },
      {
        "date": "2015-01-15T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201501-289"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "BID",
        "id": "72065"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201501-289"
      }
    ],
    "trust": 0.9
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "iOS for  Siemens SIMATIC WinCC Sm@rtClient Vulnerability in application to extract password from storage",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-007606"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "information disclosure",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201501-289"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…