First published: Sat Mar 07 2015(Updated: )
The Siemens SPCanywhere application for Android and iOS does not properly verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Spcanywhere | <=1.4 | |
Siemens Spcanywhere | <=1.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1596 is classified as a medium severity vulnerability due to its potential exploitation by man-in-the-middle attacks.
To fix CVE-2015-1596, ensure you are using an updated version of the Siemens SPCanywhere application, as updates include improved SSL certificate verification.
CVE-2015-1596 affects Siemens SPCanywhere applications on both iOS and Android platforms up to specific versions.
Yes, CVE-2015-1596 can allow attackers to spoof servers, potentially leading to the theft of sensitive information.
While there are no public exploits specifically documented for CVE-2015-1596, its nature makes it vulnerable to man-in-the-middle attacks.