First published: Wed Jan 14 2015(Updated: )
The Siemens SIMATIC WinCC Sm@rtClient app before 1.0.2 for iOS allows local users to bypass an intended application-password requirement by leveraging the running of the app in the background state.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Simatic WinCC Sm@rtclient | <=1.0 | |
iPhone OS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-5232 is considered a medium severity vulnerability due to its potential to allow unauthorized access to the application.
To fix CVE-2014-5232, update the Siemens SIMATIC WinCC Sm@rtClient app to version 1.0.2 or later.
CVE-2014-5232 affects local users of the Siemens SIMATIC WinCC Sm@rtClient app version 1.0 or lower on iOS devices.
CVE-2014-5232 is a local authentication bypass vulnerability.
Yes, CVE-2014-5232 specifically impacts the iOS version of the Siemens SIMATIC WinCC Sm@rtClient app.