VYPR
Unrated severityNVD Advisory· Published Mar 7, 2015· Updated May 6, 2026

CVE-2015-1595

CVE-2015-1595

Description

The Siemens SPCanywhere application for Android and iOS does not use encryption during lookups of system ID to IP address mappings, which allows man-in-the-middle attackers to discover alarm IP addresses and spoof servers by intercepting the client-server data stream.

Affected products

2
  • cpe:2.3:a:siemens:spcanywhere:*:*:*:*:*:android:*:*+ 1 more
    • cpe:2.3:a:siemens:spcanywhere:*:*:*:*:*:android:*:*range: <=1.4.1
    • cpe:2.3:a:siemens:spcanywhere:*:*:*:*:*:iphone_os:*:*range: <=1.4

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.