ID

VAR-201708-1507


CVE

CVE-2017-6870


TITLE

Siemens SIMATIC WinCC Sm@rtClient for Android Man-in-the-middle attack vulnerability

Trust: 0.8

sources: IVD: 5e4036b4-a2fd-4e01-88e7-f57b551c3571 // CNVD: CNVD-2017-14605

DESCRIPTION

A vulnerability was discovered in Siemens SIMATIC WinCC Sm@rtClient for Android (All versions before V1.0.2.2). The existing TLS protocol implementation could allow an attacker to read and modify data within a TLS session while performing a Man-in-the-Middle (MitM) attack. Siemens SIMATIC WinCC Sm@rtClient for Android is a client program on Android. Siemens SIMATIC is an automation software in a single engineering environment. A security-bypass vulnerability 2. A local authentication-bypass vulnerability An attacker may leverage these issues to disclose sensitive information, perform certain unauthorized actions by conducting a man-in-the-middle attack, gain unauthorized access

Trust: 2.7

sources: NVD: CVE-2017-6870 // JVNDB: JVNDB-2017-006991 // CNVD: CNVD-2017-14605 // BID: 99582 // IVD: 5e4036b4-a2fd-4e01-88e7-f57b551c3571 // VULHUB: VHN-115073

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: 5e4036b4-a2fd-4e01-88e7-f57b551c3571 // CNVD: CNVD-2017-14605

AFFECTED PRODUCTS

vendor:siemensmodel:simatic wincc sm\@rtclientscope:lteversion:1.0.2.1

Trust: 1.0

vendor:siemensmodel:simatic wincc sm@rtclientscope:eqversion:1.0.2.2

Trust: 0.8

vendor:siemensmodel:simatic wincc sm@rtclientscope:ltversion:all versions

Trust: 0.8

vendor:siemensmodel:simatic wincc sm@rtclient for androidscope:ltversion:1.0.2.2

Trust: 0.6

vendor:siemensmodel:simatic wincc sm\@rtclientscope:eqversion:1.0.2.1

Trust: 0.6

vendor:siemensmodel:simatic wincc sm@rtclient lite for androidscope:eqversion:1.0.2

Trust: 0.3

vendor:siemensmodel:simatic wincc sm@rtclient lite for androidscope:eqversion:01.00.00.00

Trust: 0.3

vendor:siemensmodel:simatic wincc sm@rtclient for androidscope:eqversion:1.0.2

Trust: 0.3

vendor:siemensmodel:simatic wincc sm@rtclient for androidscope:eqversion:01.00.00.00

Trust: 0.3

vendor:siemensmodel:simatic wincc sm@rtclient lite for androidscope:neversion:1.0.2.2

Trust: 0.3

vendor:siemensmodel:simatic wincc sm@rtclient for androidscope:neversion:1.0.2.2

Trust: 0.3

vendor:simatic wincc sm rtclientmodel: - scope:eqversion:*

Trust: 0.2

sources: IVD: 5e4036b4-a2fd-4e01-88e7-f57b551c3571 // CNVD: CNVD-2017-14605 // BID: 99582 // JVNDB: JVNDB-2017-006991 // CNNVD: CNNVD-201703-627 // NVD: CVE-2017-6870

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-6870
value: HIGH

Trust: 1.0

NVD: CVE-2017-6870
value: HIGH

Trust: 0.8

CNVD: CNVD-2017-14605
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201703-627
value: HIGH

Trust: 0.6

IVD: 5e4036b4-a2fd-4e01-88e7-f57b551c3571
value: HIGH

Trust: 0.2

VULHUB: VHN-115073
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2017-6870
severity: MEDIUM
baseScore: 5.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2017-14605
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:H/AU:N/C:C/I:C/A:N
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: NONE
exploitabilityScore: 4.9
impactScore: 9.2
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 5e4036b4-a2fd-4e01-88e7-f57b551c3571
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:H/AU:N/C:C/I:C/A:N
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: NONE
exploitabilityScore: 4.9
impactScore: 9.2
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-115073
severity: MEDIUM
baseScore: 5.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-6870
baseSeverity: HIGH
baseScore: 7.4
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 2.2
impactScore: 5.2
version: 3.0

Trust: 1.8

sources: IVD: 5e4036b4-a2fd-4e01-88e7-f57b551c3571 // CNVD: CNVD-2017-14605 // VULHUB: VHN-115073 // JVNDB: JVNDB-2017-006991 // CNNVD: CNNVD-201703-627 // NVD: CVE-2017-6870

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:CWE-300

Trust: 1.0

problemtype:CWE-310

Trust: 0.9

sources: VULHUB: VHN-115073 // JVNDB: JVNDB-2017-006991 // NVD: CVE-2017-6870

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201703-627

TYPE

encryption problem

Trust: 0.6

sources: CNNVD: CNNVD-201703-627

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-006991

PATCH

title:SSA-589378url:https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-589378.pdf

Trust: 0.8

title:Siemens SIMATIC WinCC Sm@rtClient for Android man-in-the-middle attack vulnerability patchurl:https://www.cnvd.org.cn/patchInfo/show/98178

Trust: 0.6

title:Siemens SIMATIC WinCC Sm@rtClient for Android Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=99680

Trust: 0.6

sources: CNVD: CNVD-2017-14605 // JVNDB: JVNDB-2017-006991 // CNNVD: CNNVD-201703-627

EXTERNAL IDS

db:NVDid:CVE-2017-6870

Trust: 3.6

db:SIEMENSid:SSA-589378

Trust: 2.3

db:BIDid:99582

Trust: 2.0

db:ICS CERTid:ICSA-17-194-03

Trust: 1.1

db:CNNVDid:CNNVD-201703-627

Trust: 0.9

db:CNVDid:CNVD-2017-14605

Trust: 0.8

db:JVNDBid:JVNDB-2017-006991

Trust: 0.8

db:IVDid:5E4036B4-A2FD-4E01-88E7-F57B551C3571

Trust: 0.2

db:VULHUBid:VHN-115073

Trust: 0.1

sources: IVD: 5e4036b4-a2fd-4e01-88e7-f57b551c3571 // CNVD: CNVD-2017-14605 // VULHUB: VHN-115073 // BID: 99582 // JVNDB: JVNDB-2017-006991 // CNNVD: CNNVD-201703-627 // NVD: CVE-2017-6870

REFERENCES

url:https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-589378.pdf

Trust: 2.3

url:http://www.securityfocus.com/bid/99582

Trust: 1.7

url:https://ics-cert.us-cert.gov/advisories/icsa-17-194-03

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-6870

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-6870

Trust: 0.8

url:http://subscriber.communications.siemens.com/

Trust: 0.3

sources: CNVD: CNVD-2017-14605 // VULHUB: VHN-115073 // BID: 99582 // JVNDB: JVNDB-2017-006991 // CNNVD: CNNVD-201703-627 // NVD: CVE-2017-6870

CREDITS

Karsten Sohr and Timo Glander from the TZI at the University of Bremen

Trust: 0.3

sources: BID: 99582

SOURCES

db:IVDid:5e4036b4-a2fd-4e01-88e7-f57b551c3571
db:CNVDid:CNVD-2017-14605
db:VULHUBid:VHN-115073
db:BIDid:99582
db:JVNDBid:JVNDB-2017-006991
db:CNNVDid:CNNVD-201703-627
db:NVDid:CVE-2017-6870

LAST UPDATE DATE

2025-04-20T23:27:17.235000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2017-14605date:2017-07-15T00:00:00
db:VULHUBid:VHN-115073date:2019-10-09T00:00:00
db:BIDid:99582date:2017-07-13T00:00:00
db:JVNDBid:JVNDB-2017-006991date:2017-09-07T00:00:00
db:CNNVDid:CNNVD-201703-627date:2019-10-17T00:00:00
db:NVDid:CVE-2017-6870date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:IVDid:5e4036b4-a2fd-4e01-88e7-f57b551c3571date:2017-07-15T00:00:00
db:CNVDid:CNVD-2017-14605date:2017-07-15T00:00:00
db:VULHUBid:VHN-115073date:2017-08-08T00:00:00
db:BIDid:99582date:2017-07-13T00:00:00
db:JVNDBid:JVNDB-2017-006991date:2017-09-07T00:00:00
db:CNNVDid:CNNVD-201703-627date:2017-03-16T00:00:00
db:NVDid:CVE-2017-6870date:2017-08-08T00:29:00.227