ID

VAR-201501-0292


CVE

CVE-2014-5231


TITLE

iOS for Siemens SIMATIC WinCC Sm@rtClient Vulnerability in application to extract password from storage

Trust: 0.8

sources: JVNDB: JVNDB-2014-007606

DESCRIPTION

The Siemens SIMATIC WinCC Sm@rtClient app before 1.0.2 for iOS allows physically proximate attackers to extract the password from storage via unspecified vectors. Siemens SIMATIC WinCC is a monitoring control and data acquisition SCADA and human machine interface HMI system. Multiple Siemens SIMATIC WinCC products are prone to a local security-bypass vulnerability. Successful exploits will allow local attackers to bypass certain security restrictions. Other attacks are also possible. The following products are vulnerable: Versions prior to Siemens SIMATIC WinCC Sm@rtClient 1.0.2 are vulnerable. Versions prior to Siemens SIMATIC WinCC Sm@rtClient for IOS 1.0.2 are vulnerable. Siemens SIMATIC WinCC Sm@rtClient app for iOS is a set of client applications based on the iOS platform of Siemens, Germany, which provides remote mobile operation and observation of SIMATIC HMI systems. An attacker could exploit this vulnerability to obtain passwords in the repository

Trust: 2.88

sources: NVD: CVE-2014-5231 // JVNDB: JVNDB-2014-007606 // CNVD: CNVD-2015-00426 // BID: 72065 // IVD: a9f45384-2351-11e6-abef-000c29c66e3d // IVD: 91d3cfc5-257f-4a4f-8fa0-2b549a1ff7b0 // VULHUB: VHN-73172

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 1.0

sources: IVD: a9f45384-2351-11e6-abef-000c29c66e3d // IVD: 91d3cfc5-257f-4a4f-8fa0-2b549a1ff7b0 // CNVD: CNVD-2015-00426

AFFECTED PRODUCTS

vendor:siemensmodel:simatic wincc sm\@rtclientscope:lteversion:1.0

Trust: 1.0

vendor:siemensmodel:simatic wincc sm@rtclientscope:ltversion:1.0.2

Trust: 0.8

vendor:siemensmodel:simatic wincc sm@rtclient for iosscope:ltversion:1.0.2

Trust: 0.6

vendor:siemensmodel:simatic wincc sm@rtclient lite for iosscope:ltversion:1.0.2

Trust: 0.6

vendor:siemensmodel:simatic wincc sm\@rtclientscope:eqversion:1.0

Trust: 0.6

vendor:simatic wincc sm rtclientmodel: - scope:eqversion:*

Trust: 0.4

sources: IVD: a9f45384-2351-11e6-abef-000c29c66e3d // IVD: 91d3cfc5-257f-4a4f-8fa0-2b549a1ff7b0 // CNVD: CNVD-2015-00426 // JVNDB: JVNDB-2014-007606 // CNNVD: CNNVD-201501-289 // NVD: CVE-2014-5231

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-5231
value: LOW

Trust: 1.0

NVD: CVE-2014-5231
value: LOW

Trust: 0.8

CNVD: CNVD-2015-00426
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201501-289
value: LOW

Trust: 0.6

IVD: a9f45384-2351-11e6-abef-000c29c66e3d
value: LOW

Trust: 0.2

IVD: 91d3cfc5-257f-4a4f-8fa0-2b549a1ff7b0
value: LOW

Trust: 0.2

VULHUB: VHN-73172
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2014-5231
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2015-00426
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: a9f45384-2351-11e6-abef-000c29c66e3d
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

IVD: 91d3cfc5-257f-4a4f-8fa0-2b549a1ff7b0
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-73172
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: IVD: a9f45384-2351-11e6-abef-000c29c66e3d // IVD: 91d3cfc5-257f-4a4f-8fa0-2b549a1ff7b0 // CNVD: CNVD-2015-00426 // VULHUB: VHN-73172 // JVNDB: JVNDB-2014-007606 // CNNVD: CNNVD-201501-289 // NVD: CVE-2014-5231

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.9

sources: VULHUB: VHN-73172 // JVNDB: JVNDB-2014-007606 // NVD: CVE-2014-5231

THREAT TYPE

local

Trust: 0.9

sources: BID: 72065 // CNNVD: CNNVD-201501-289

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-201501-289

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-007606

PATCH

title:SSA-311299url:http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-311299.pdf

Trust: 0.8

title:Patch for Siemens SIMATIC WinCC Sm@rtClient app Information Disclosure Vulnerability (CNVD-2015-00426)url:https://www.cnvd.org.cn/patchInfo/show/54177

Trust: 0.6

sources: CNVD: CNVD-2015-00426 // JVNDB: JVNDB-2014-007606

EXTERNAL IDS

db:NVDid:CVE-2014-5231

Trust: 3.8

db:SIEMENSid:SSA-311299

Trust: 2.3

db:CNNVDid:CNNVD-201501-289

Trust: 1.1

db:SECTRACKid:1031546

Trust: 1.1

db:CNVDid:CNVD-2015-00426

Trust: 1.0

db:BIDid:72065

Trust: 1.0

db:JVNDBid:JVNDB-2014-007606

Trust: 0.8

db:ICS CERTid:ICSA-15-013-01

Trust: 0.3

db:IVDid:A9F45384-2351-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:IVDid:91D3CFC5-257F-4A4F-8FA0-2B549A1FF7B0

Trust: 0.2

db:VULHUBid:VHN-73172

Trust: 0.1

sources: IVD: a9f45384-2351-11e6-abef-000c29c66e3d // IVD: 91d3cfc5-257f-4a4f-8fa0-2b549a1ff7b0 // CNVD: CNVD-2015-00426 // VULHUB: VHN-73172 // BID: 72065 // JVNDB: JVNDB-2014-007606 // CNNVD: CNNVD-201501-289 // NVD: CVE-2014-5231

REFERENCES

url:http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-311299.pdf

Trust: 2.3

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-5231

Trust: 1.4

url:http://www.securitytracker.com/id/1031546

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-5231

Trust: 0.8

url:http://www.siemens.com/

Trust: 0.3

url:https://ics-cert.us-cert.gov/advisories/icsa-15-013-01

Trust: 0.3

sources: CNVD: CNVD-2015-00426 // VULHUB: VHN-73172 // BID: 72065 // JVNDB: JVNDB-2014-007606 // CNNVD: CNNVD-201501-289 // NVD: CVE-2014-5231

CREDITS

Kim Schlyter, Seyton Bradford, and Richard Warren

Trust: 0.3

sources: BID: 72065

SOURCES

db:IVDid:a9f45384-2351-11e6-abef-000c29c66e3d
db:IVDid:91d3cfc5-257f-4a4f-8fa0-2b549a1ff7b0
db:CNVDid:CNVD-2015-00426
db:VULHUBid:VHN-73172
db:BIDid:72065
db:JVNDBid:JVNDB-2014-007606
db:CNNVDid:CNNVD-201501-289
db:NVDid:CVE-2014-5231

LAST UPDATE DATE

2025-04-13T23:04:38.272000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2015-00426date:2015-01-20T00:00:00
db:VULHUBid:VHN-73172date:2015-11-13T00:00:00
db:BIDid:72065date:2015-01-14T00:00:00
db:JVNDBid:JVNDB-2014-007606date:2015-01-16T00:00:00
db:CNNVDid:CNNVD-201501-289date:2015-01-15T00:00:00
db:NVDid:CVE-2014-5231date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:IVDid:a9f45384-2351-11e6-abef-000c29c66e3ddate:2015-01-20T00:00:00
db:IVDid:91d3cfc5-257f-4a4f-8fa0-2b549a1ff7b0date:2015-01-20T00:00:00
db:CNVDid:CNVD-2015-00426date:2015-01-20T00:00:00
db:VULHUBid:VHN-73172date:2015-01-14T00:00:00
db:BIDid:72065date:2015-01-14T00:00:00
db:JVNDBid:JVNDB-2014-007606date:2015-01-16T00:00:00
db:CNNVDid:CNNVD-201501-289date:2015-01-15T00:00:00
db:NVDid:CVE-2014-5231date:2015-01-14T11:59:00.053