First published: Wed Jan 14 2015(Updated: )
The Siemens SIMATIC WinCC Sm@rtClient app before 1.0.2 for iOS allows physically proximate attackers to extract the password from storage via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Simatic WinCC Sm@rtclient | <=1.0 | |
iPhone OS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-5231 has been assigned a medium severity rating due to its potential for exposing sensitive user credentials.
To mitigate CVE-2014-5231, update the Siemens SIMATIC WinCC Sm@rtClient app to version 1.0.2 or later.
Users of Siemens SIMATIC WinCC Sm@rtClient app versions prior to 1.0.2 on iOS are affected by CVE-2014-5231.
CVE-2014-5231 involves a local attack where physically proximate attackers can extract stored passwords.
The technical impact of CVE-2014-5231 allows unauthorized users to gain access to stored passwords, potentially compromising user accounts.