Risk | Low |
Patch available | NO |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2018-4847 |
CWE-ID | CWE-538 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software Subscribe |
Simatic WinCC OA iOS App Mobile applications / Apps for mobile phones |
Vendor | Siemens |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU12076
Risk: Low
CVSSv3.1: 4.1 [CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:W/RC:C]
CVE-ID: CVE-2018-4847
CWE-ID:
CWE-538 - File And Directory Information Exposure
Exploit availability: No
DescriptionThe vulnerability allows a physical attacker to obtain potentially sensitive information.
The vulnerability exists due to file and directory information exposure. A remote attacker with physical access to the mobile device can read unencrypted sensitive data from the app’s directory.
MitigationSiemens has identified the following specific workarounds and mitigations that users can apply to reduce the risk:
Simatic WinCC OA iOS App: All versions
External linkshttp://www.siemens.com/cert/advisories
Q & A
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
How the attacker can exploit this vulnerability?
The attacker would have to trick the victim to perform certain actions on the device.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.