Unrated severityNVD Advisory· Published Mar 7, 2015· Updated May 6, 2026
CVE-2015-1595
CVE-2015-1595
Description
The Siemens SPCanywhere application for Android and iOS does not use encryption during lookups of system ID to IP address mappings, which allows man-in-the-middle attackers to discover alarm IP addresses and spoof servers by intercepting the client-server data stream.
Affected products
2cpe:2.3:a:siemens:spcanywhere:*:*:*:*:*:android:*:*+ 1 more
- cpe:2.3:a:siemens:spcanywhere:*:*:*:*:*:android:*:*range: <=1.4.1
- cpe:2.3:a:siemens:spcanywhere:*:*:*:*:*:iphone_os:*:*range: <=1.4
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.