漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
A vulnerability has been identified in SIMATIC WinCC OA UI for Android (All versions < V3.15.10), SIMATIC WinCC OA UI for iOS (All versions < V3.15.10). Insufficient limitation of CONTROL script capabilities could allow read and write access from one HMI project cache folder to other HMI project cache folders within the app's sandbox on the same mobile device. This includes HMI project cache folders of other configured WinCC OA servers. The security vulnerability could be exploited by an attacker who tricks an app user to connect to an attacker-controlled WinCC OA server. Successful exploitation requires user interaction and read/write access to the app's folder on a mobile device. The vulnerability could allow reading data from and writing data to the app's folder. At the time of advisory publication no public exploitation of this security vulnerability was known. Siemens confirms the security vulnerability and provides mitigations to resolve the security issue.
漏洞信息
N/A
漏洞
访问控制不恰当
漏洞
Siemens SIMATIC WinCC OA UI for Android和iOS 安全漏洞
漏洞信息
Siemens SIMATIC WinCC OA UI for Android和iOS都是德国西门子(Siemens)公司的产品。Siemens SIMATIC WinCC OA UI for Android是一套基于Android平台的SCADA系统控制界面。SIMATIC WinCC OA UI for iOS是它的基于iOS平台的版本。 基于Android平台的SIMATIC WinCC OA UI 3.15.10之前版本和基于iOS平台的SIMATIC WinCC OA UI 3.15.10之前版
漏洞信息
N/A
漏洞
N/A