- Description
- A lack of SSL certificate validation in Splicecom iPCS (iOS App) v1.3.4, iPCS2 (iOS App) v2.8 and before, and iPCS (Android App) v1.8.5 and before allows attackers to eavesdrop on communications via a man-in-the-middle attack.
- Source
- cve@mitre.org
- NVD status
- Modified
CVSS 3.1
- Type
- Primary
- Base score
- 5.9
- Impact score
- 3.6
- Exploitability score
- 2.2
- Vector string
- CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
- Severity
- MEDIUM
- nvd@nist.gov
- CWE-295
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:splicecom:ipcs:*:*:*:*:*:android:*:*",
"vulnerable": true,
"matchCriteriaId": "EF0D97E8-4C21-497D-8EE6-413C1228BB11",
"versionEndIncluding": "1.8.5"
},
{
"criteria": "cpe:2.3:a:splicecom:ipcs:1.3.4:*:*:*:*:iphone_os:*:*",
"vulnerable": true,
"matchCriteriaId": "5D3B5805-04BF-4561-87E7-71980EEB3596"
},
{
"criteria": "cpe:2.3:a:splicecom:ipcs2:*:*:*:*:*:iphone_os:*:*",
"vulnerable": true,
"matchCriteriaId": "51D3CC91-4071-49CD-BCFA-75D519AC0034",
"versionEndIncluding": "2.8"
}
],
"operator": "OR"
}
]
}
]