First published: Sat Mar 07 2015(Updated: )
The Siemens SPCanywhere application for Android and iOS does not use encryption during lookups of system ID to IP address mappings, which allows man-in-the-middle attackers to discover alarm IP addresses and spoof servers by intercepting the client-server data stream.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Spcanywhere | <=1.4 | |
Siemens Spcanywhere | <=1.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1595 is classified as a high severity vulnerability due to its potential for exploitation by man-in-the-middle attacks.
To fix CVE-2015-1595, update the Siemens SPCanywhere application to the latest version that implements encryption for system ID to IP address lookups.
CVE-2015-1595 affects Siemens SPCanywhere applications running on Android and iOS devices with specific versions up to 1.4 and 1.4.1.
An attacker exploiting CVE-2015-1595 can intercept client-server communications to discover alarm IP addresses and potentially spoof server responses.
Currently, there is no documented workaround for CVE-2015-1595 other than updating to a fixed version of the application.