Overview
- Description
- A lack of SSL certificate validation in Splicecom iPCS (iOS App) v1.3.4, iPCS2 (iOS App) v2.8 and before, and iPCS (Android App) v1.8.5 and before allows attackers to eavesdrop on communications via a man-in-the-middle attack.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 5.9
- Impact score
- 3.6
- Exploitability score
- 2.2
- Vector string
- CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
- Severity
- MEDIUM
Weaknesses
- nvd@nist.gov
- CWE-295
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:splicecom:ipcs:*:*:*:*:*:android:*:*", "vulnerable": true, "matchCriteriaId": "EF0D97E8-4C21-497D-8EE6-413C1228BB11", "versionEndIncluding": "1.8.5" }, { "criteria": "cpe:2.3:a:splicecom:ipcs:1.3.4:*:*:*:*:iphone_os:*:*", "vulnerable": true, "matchCriteriaId": "5D3B5805-04BF-4561-87E7-71980EEB3596" }, { "criteria": "cpe:2.3:a:splicecom:ipcs2:*:*:*:*:*:iphone_os:*:*", "vulnerable": true, "matchCriteriaId": "51D3CC91-4071-49CD-BCFA-75D519AC0034", "versionEndIncluding": "2.8" } ], "operator": "OR" } ] } ]