#VU7493 Man-in-the-middle attack in SiPass


Published: 2017-07-13

Vulnerability identifier: #VU7493

Vulnerability risk: Low

CVSSv3.1: 6.4 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-9941

CWE-ID: CWE-300

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
SiPass
Client/Desktop applications / Other client software

Vendor: Siemens

Description
The vulnerability allows a remote attacker to conduct a man-in-the-middle attack.

The weakness exists due to improper permissions and access controls. A remote attacker can perform a man-in-in-the-middle attack, gain position between the SiPass integrated server and SiPass integrated clients and read or modify the network communication.

Mitigation
Update to version 2.70.

Vulnerable software versions

SiPass: 2.60 - 2.65


External links
http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-339433.pdf


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability