First published: Mon Apr 23 2018(Updated: )
A vulnerability has been identified in SIMATIC WinCC OA Operator iOS App (All versions < V1.4). Insufficient protection of sensitive information (e.g. session key for accessing server) in Siemens WinCC OA Operator iOS app could allow an attacker with physical access to the mobile device to read unencrypted data from the app's directory. Siemens provides mitigations to resolve the security issue.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens SIMATIC WinCC OA (Open Architecture) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-4847 is classified as a medium severity vulnerability due to insufficient protection of sensitive information.
To remediate CVE-2018-4847, users should update the SIMATIC WinCC OA Operator iOS app to version 1.4 or higher.
CVE-2018-4847 exposes sensitive information such as session keys that could allow unauthorized access to the server.
CVE-2018-4847 affects users of the SIMATIC WinCC OA Operator iOS app running versions prior to 1.4.
CVE-2018-4847 was reported in 2018, highlighting a security issue in the SIMATIC WinCC OA Operator iOS app.