ID

VAR-201503-0018


CVE

CVE-2015-1596


TITLE

SPCanywhere SSL Certificate Verification Security Restriction Bypass Vulnerability

Trust: 0.8

sources: IVD: 9e71c8fc-2351-11e6-abef-000c29c66e3d // CNVD: CNVD-2015-01534

DESCRIPTION

The Siemens SPCanywhere application for Android and iOS does not properly verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. SPCanywhere is a mobile app that provides remote access to the Siemens SPC intrusion alarm system via a mobile phone. SPCanywhere has an SSL certificate verification security limit bypass vulnerability that is caused by an application failing to properly validate an SSL certificate. Allows an attacker to conduct a man-in-the-middle attack, or pretend to be a trusted server, initiating further attack assistance. There is a security vulnerability in the Siemens SPCanywhere application based on Android and iOS platforms

Trust: 2.7

sources: NVD: CVE-2015-1596 // JVNDB: JVNDB-2015-001705 // CNVD: CNVD-2015-01534 // BID: 72972 // IVD: 9e71c8fc-2351-11e6-abef-000c29c66e3d // VULHUB: VHN-79557

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: 9e71c8fc-2351-11e6-abef-000c29c66e3d // CNVD: CNVD-2015-01534

AFFECTED PRODUCTS

vendor:siemensmodel:spcanywherescope:lteversion:1.4.1

Trust: 1.0

vendor:siemensmodel:spcanywherescope:lteversion:1.4

Trust: 1.0

vendor:siemensmodel:spcanywherescope:eqversion:(android/ios)

Trust: 0.8

vendor:siemensmodel:spcanywhere <=1.49scope: - version: -

Trust: 0.6

vendor:siemensmodel:spcanywhere <=1.4.1scope: - version: -

Trust: 0.6

vendor:siemensmodel:spcanywherescope:eqversion:1.4

Trust: 0.6

vendor:siemensmodel:spcanywherescope:eqversion:1.4.1

Trust: 0.6

vendor:spcanywheremodel: - scope:eqversion:*

Trust: 0.4

vendor:siemensmodel:spcanywherescope:eqversion:0

Trust: 0.3

sources: IVD: 9e71c8fc-2351-11e6-abef-000c29c66e3d // CNVD: CNVD-2015-01534 // BID: 72972 // JVNDB: JVNDB-2015-001705 // CNNVD: CNNVD-201503-130 // NVD: CVE-2015-1596

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-1596
value: MEDIUM

Trust: 1.0

NVD: CVE-2015-1596
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2015-01534
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201503-130
value: MEDIUM

Trust: 0.6

IVD: 9e71c8fc-2351-11e6-abef-000c29c66e3d
value: MEDIUM

Trust: 0.2

VULHUB: VHN-79557
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2015-1596
severity: MEDIUM
baseScore: 5.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2015-01534
severity: MEDIUM
baseScore: 5.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 9e71c8fc-2351-11e6-abef-000c29c66e3d
severity: MEDIUM
baseScore: 5.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-79557
severity: MEDIUM
baseScore: 5.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: IVD: 9e71c8fc-2351-11e6-abef-000c29c66e3d // CNVD: CNVD-2015-01534 // VULHUB: VHN-79557 // JVNDB: JVNDB-2015-001705 // CNNVD: CNNVD-201503-130 // NVD: CVE-2015-1596

PROBLEMTYPE DATA

problemtype:CWE-310

Trust: 1.9

sources: VULHUB: VHN-79557 // JVNDB: JVNDB-2015-001705 // NVD: CVE-2015-1596

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201503-130

TYPE

encryption problem

Trust: 0.6

sources: CNNVD: CNNVD-201503-130

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-001705

PATCH

title:SSA-185226url:http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-185226.pdf

Trust: 0.8

title:SPCanywhere SSL certificate verification security restrictions bypass the vulnerability patchurl:https://www.cnvd.org.cn/patchInfo/show/56028

Trust: 0.6

sources: CNVD: CNVD-2015-01534 // JVNDB: JVNDB-2015-001705

EXTERNAL IDS

db:NVDid:CVE-2015-1596

Trust: 3.6

db:SIEMENSid:SSA-185226

Trust: 2.0

db:BIDid:72972

Trust: 1.0

db:CNNVDid:CNNVD-201503-130

Trust: 0.9

db:CNVDid:CNVD-2015-01534

Trust: 0.8

db:JVNDBid:JVNDB-2015-001705

Trust: 0.8

db:ICS CERTid:ICSA-15-064-05

Trust: 0.3

db:IVDid:9E71C8FC-2351-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:VULHUBid:VHN-79557

Trust: 0.1

sources: IVD: 9e71c8fc-2351-11e6-abef-000c29c66e3d // CNVD: CNVD-2015-01534 // VULHUB: VHN-79557 // BID: 72972 // JVNDB: JVNDB-2015-001705 // CNNVD: CNNVD-201503-130 // NVD: CVE-2015-1596

REFERENCES

url:http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-185226.pdf

Trust: 2.0

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-1596

Trust: 1.4

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1596

Trust: 0.8

url:http://www.siemens.com/

Trust: 0.3

url:https://ics-cert.us-cert.gov/advisories/icsa-15-064-05

Trust: 0.3

sources: CNVD: CNVD-2015-01534 // VULHUB: VHN-79557 // BID: 72972 // JVNDB: JVNDB-2015-001705 // CNNVD: CNNVD-201503-130 // NVD: CVE-2015-1596

CREDITS

Karsten Sohr, Bernhard Berger, and Kai Hillmann from the TZI-Bremen

Trust: 0.3

sources: BID: 72972

SOURCES

db:IVDid:9e71c8fc-2351-11e6-abef-000c29c66e3d
db:CNVDid:CNVD-2015-01534
db:VULHUBid:VHN-79557
db:BIDid:72972
db:JVNDBid:JVNDB-2015-001705
db:CNNVDid:CNNVD-201503-130
db:NVDid:CVE-2015-1596

LAST UPDATE DATE

2025-04-13T23:09:56.711000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2015-01534date:2015-03-11T00:00:00
db:VULHUBid:VHN-79557date:2015-03-09T00:00:00
db:BIDid:72972date:2015-03-05T00:00:00
db:JVNDBid:JVNDB-2015-001705date:2015-03-11T00:00:00
db:CNNVDid:CNNVD-201503-130date:2015-03-09T00:00:00
db:NVDid:CVE-2015-1596date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:IVDid:9e71c8fc-2351-11e6-abef-000c29c66e3ddate:2015-03-11T00:00:00
db:CNVDid:CNVD-2015-01534date:2015-03-11T00:00:00
db:VULHUBid:VHN-79557date:2015-03-07T00:00:00
db:BIDid:72972date:2015-03-05T00:00:00
db:JVNDBid:JVNDB-2015-001705date:2015-03-11T00:00:00
db:CNNVDid:CNNVD-201503-130date:2015-03-09T00:00:00
db:NVDid:CVE-2015-1596date:2015-03-07T02:59:05.833