3.8
CVSSv2

CVE-2018-4844

Published: 20/03/2018 Updated: 24/03/2023
CVSS v2 Base Score: 3.8 | Impact Score: 4.9 | Exploitability Score: 4.4
CVSS v3 Base Score: 6.7 | Impact Score: 5.2 | Exploitability Score: 1.5
VMScore: 338
Vector: AV:A/AC:M/Au:S/C:P/I:P/A:N

Vulnerability Summary

A vulnerability has been identified in SIMATIC WinCC OA UI for Android (All versions < V3.15.10), SIMATIC WinCC OA UI for iOS (All versions < V3.15.10). Insufficient limitation of CONTROL script capabilities could allow read and write access from one HMI project cache folder to other HMI project cache folders within the app's sandbox on the same mobile device. This includes HMI project cache folders of other configured WinCC OA servers. The security vulnerability could be exploited by an attacker who tricks an app user to connect to an attacker-controlled WinCC OA server. Successful exploitation requires user interaction and read/write access to the app's folder on a mobile device. The vulnerability could allow reading data from and writing data to the app's folder. At the time of advisory publication no public exploitation of this security vulnerability was known. Siemens confirms the security vulnerability and provides mitigations to resolve the security issue.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

siemens simatic wincc oa ui

Github Repositories

Hi there 👋 My name is Ivan, or Steph I do security trainings, researches, and, from time to time, some bughunting, pentests, and other security stuff ⚡ Fun fact: I'm not a cat Contacts Twitter: @w34kp455 Telegram: zzzteph Discord: discordgg/eEEWHPyEVp LinkedIn: ivan iushkevich Projects For any kind of bruteforce find wordlists weakpasscom