First published: Sat Mar 07 2015(Updated: )
The Siemens SPCanywhere application for Android does not use encryption during the loading of code, which allows man-in-the-middle attackers to execute arbitrary code by modifying the client-server data stream.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Spcanywhere | <=1.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1597 is classified as a critical vulnerability due to the potential for arbitrary code execution.
To mitigate CVE-2015-1597, update the Siemens SPCanywhere application to a version newer than 1.4.1, if available.
CVE-2015-1597 exposes users to man-in-the-middle attacks, allowing attackers to manipulate the client-server data stream.
CVE-2015-1597 affects Siemens SPCanywhere versions up to and including 1.4.1 on Android.
No, the Siemens SPCanywhere application does not use encryption during the loading of code, which contributes to the vulnerability.