ID

VAR-201708-1508


CVE

CVE-2017-6871


TITLE

Siemens SIMATIC WinCC Sm@rtClient for Android Authentication Bypass Vulnerability

Trust: 0.8

sources: IVD: aa04aa25-a2f9-467b-9eb1-3a6fa82523a0 // CNVD: CNVD-2017-14606

DESCRIPTION

A vulnerability was discovered in Siemens SIMATIC WinCC Sm@rtClient for Android (All versions before V1.0.2.2) and SIMATIC WinCC Sm@rtClient for Android Lite (All versions before V1.0.2.2). An attacker with physical access to an unlocked mobile device, that has the affected app running, could bypass the app's authentication mechanism under certain conditions. Android for Siemens SIMATIC WinCC Sm@rtClient and Sm@rtClient Lite Contains an authentication vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Siemens SIMATIC WinCC Sm@rtClient for Android is a client program on Android. Siemens SIMATIC is an automation software in a single engineering environment. A security-bypass vulnerability 2. A local authentication-bypass vulnerability An attacker may leverage these issues to disclose sensitive information, perform certain unauthorized actions by conducting a man-in-the-middle attack, gain unauthorized access

Trust: 2.7

sources: NVD: CVE-2017-6871 // JVNDB: JVNDB-2017-006992 // CNVD: CNVD-2017-14606 // BID: 99582 // IVD: aa04aa25-a2f9-467b-9eb1-3a6fa82523a0 // VULHUB: VHN-115074

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: aa04aa25-a2f9-467b-9eb1-3a6fa82523a0 // CNVD: CNVD-2017-14606

AFFECTED PRODUCTS

vendor:siemensmodel:simatic wincc sm\@rtclient litescope:lteversion:1.0.2.1

Trust: 1.0

vendor:siemensmodel:simatic wincc sm\@rtclientscope:lteversion:1.0.2.1

Trust: 1.0

vendor:siemensmodel:simatic wincc sm@rtclientscope:eqversion:1.0.2.2

Trust: 0.8

vendor:siemensmodel:simatic wincc sm@rtclientscope:ltversion:all versions

Trust: 0.8

vendor:siemensmodel:simatic wincc sm@rtclient litescope:ltversion:all versions

Trust: 0.8

vendor:siemensmodel:simatic wincc sm@rtclient litescope:eqversion:1.0.2.2

Trust: 0.8

vendor:siemensmodel:simatic wincc sm@rtclient for androidscope:ltversion:1.0.2.2

Trust: 0.6

vendor:siemensmodel:simatic wincc sm@rtclient lite for androidscope:ltversion:1.0.2.2

Trust: 0.6

vendor:siemensmodel:simatic wincc sm\@rtclientscope:eqversion:1.0.2.1

Trust: 0.6

vendor:siemensmodel:simatic wincc sm\@rtclient litescope:eqversion:1.0.2.1

Trust: 0.6

vendor:siemensmodel:simatic wincc sm@rtclient lite for androidscope:eqversion:1.0.2

Trust: 0.3

vendor:siemensmodel:simatic wincc sm@rtclient lite for androidscope:eqversion:01.00.00.00

Trust: 0.3

vendor:siemensmodel:simatic wincc sm@rtclient for androidscope:eqversion:1.0.2

Trust: 0.3

vendor:siemensmodel:simatic wincc sm@rtclient for androidscope:eqversion:01.00.00.00

Trust: 0.3

vendor:siemensmodel:simatic wincc sm@rtclient lite for androidscope:neversion:1.0.2.2

Trust: 0.3

vendor:siemensmodel:simatic wincc sm@rtclient for androidscope:neversion:1.0.2.2

Trust: 0.3

vendor:simatic wincc sm rtclientmodel: - scope:eqversion:*

Trust: 0.2

vendor:simatic wincc sm rtclient litemodel: - scope:eqversion:*

Trust: 0.2

sources: IVD: aa04aa25-a2f9-467b-9eb1-3a6fa82523a0 // CNVD: CNVD-2017-14606 // BID: 99582 // JVNDB: JVNDB-2017-006992 // CNNVD: CNNVD-201703-626 // NVD: CVE-2017-6871

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-6871
value: MEDIUM

Trust: 1.0

NVD: CVE-2017-6871
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2017-14606
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201703-626
value: MEDIUM

Trust: 0.6

IVD: aa04aa25-a2f9-467b-9eb1-3a6fa82523a0
value: MEDIUM

Trust: 0.2

VULHUB: VHN-115074
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2017-6871
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2017-14606
severity: MEDIUM
baseScore: 6.1
vectorString: AV:N/AC:H/AU:N/C:C/I:P/A:N
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 4.9
impactScore: 7.8
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: aa04aa25-a2f9-467b-9eb1-3a6fa82523a0
severity: MEDIUM
baseScore: 6.1
vectorString: AV:N/AC:H/AU:N/C:C/I:P/A:N
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 4.9
impactScore: 7.8
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-115074
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-6871
baseSeverity: MEDIUM
baseScore: 5.4
vectorString: CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L
attackVector: PHYSICAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: LOW
availabilityImpact: LOW
exploitabilityScore: 0.7
impactScore: 4.7
version: 3.0

Trust: 1.8

sources: IVD: aa04aa25-a2f9-467b-9eb1-3a6fa82523a0 // CNVD: CNVD-2017-14606 // VULHUB: VHN-115074 // JVNDB: JVNDB-2017-006992 // CNNVD: CNNVD-201703-626 // NVD: CVE-2017-6871

PROBLEMTYPE DATA

problemtype:CWE-287

Trust: 1.9

problemtype:CWE-288

Trust: 1.0

sources: VULHUB: VHN-115074 // JVNDB: JVNDB-2017-006992 // NVD: CVE-2017-6871

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201703-626

TYPE

authorization issue

Trust: 0.6

sources: CNNVD: CNNVD-201703-626

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-006992

PATCH

title:SSA-589378url:https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-589378.pdf

Trust: 0.8

title:Siemens SIMATIC WinCC Sm@rtClient for Android authentication bypass vulnerability patchurl:https://www.cnvd.org.cn/patchInfo/show/98179

Trust: 0.6

title:Siemens SIMATIC WinCC Sm@rtClient for Android and Android Lite Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=99679

Trust: 0.6

sources: CNVD: CNVD-2017-14606 // JVNDB: JVNDB-2017-006992 // CNNVD: CNNVD-201703-626

EXTERNAL IDS

db:NVDid:CVE-2017-6871

Trust: 3.6

db:SIEMENSid:SSA-589378

Trust: 2.3

db:BIDid:99582

Trust: 2.0

db:ICS CERTid:ICSA-17-194-03

Trust: 1.1

db:CNNVDid:CNNVD-201703-626

Trust: 0.9

db:CNVDid:CNVD-2017-14606

Trust: 0.8

db:JVNDBid:JVNDB-2017-006992

Trust: 0.8

db:IVDid:AA04AA25-A2F9-467B-9EB1-3A6FA82523A0

Trust: 0.2

db:VULHUBid:VHN-115074

Trust: 0.1

sources: IVD: aa04aa25-a2f9-467b-9eb1-3a6fa82523a0 // CNVD: CNVD-2017-14606 // VULHUB: VHN-115074 // BID: 99582 // JVNDB: JVNDB-2017-006992 // CNNVD: CNNVD-201703-626 // NVD: CVE-2017-6871

REFERENCES

url:https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-589378.pdf

Trust: 2.3

url:http://www.securityfocus.com/bid/99582

Trust: 1.7

url:https://ics-cert.us-cert.gov/advisories/icsa-17-194-03

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-6871

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-6871

Trust: 0.8

url:http://subscriber.communications.siemens.com/

Trust: 0.3

sources: CNVD: CNVD-2017-14606 // VULHUB: VHN-115074 // BID: 99582 // JVNDB: JVNDB-2017-006992 // CNNVD: CNNVD-201703-626 // NVD: CVE-2017-6871

CREDITS

Karsten Sohr and Timo Glander from the TZI at the University of Bremen

Trust: 0.3

sources: BID: 99582

SOURCES

db:IVDid:aa04aa25-a2f9-467b-9eb1-3a6fa82523a0
db:CNVDid:CNVD-2017-14606
db:VULHUBid:VHN-115074
db:BIDid:99582
db:JVNDBid:JVNDB-2017-006992
db:CNNVDid:CNNVD-201703-626
db:NVDid:CVE-2017-6871

LAST UPDATE DATE

2025-04-20T23:27:17.277000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2017-14606date:2017-07-15T00:00:00
db:VULHUBid:VHN-115074date:2019-10-09T00:00:00
db:BIDid:99582date:2017-07-13T00:00:00
db:JVNDBid:JVNDB-2017-006992date:2017-09-07T00:00:00
db:CNNVDid:CNNVD-201703-626date:2019-10-17T00:00:00
db:NVDid:CVE-2017-6871date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:IVDid:aa04aa25-a2f9-467b-9eb1-3a6fa82523a0date:2017-07-15T00:00:00
db:CNVDid:CNVD-2017-14606date:2017-07-15T00:00:00
db:VULHUBid:VHN-115074date:2017-08-08T00:00:00
db:BIDid:99582date:2017-07-13T00:00:00
db:JVNDBid:JVNDB-2017-006992date:2017-09-07T00:00:00
db:CNNVDid:CNNVD-201703-626date:2017-03-16T00:00:00
db:NVDid:CVE-2017-6871date:2017-08-08T00:29:00.260