Risk | Low |
Patch available | NO |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2020-12023 |
CWE-ID | CWE-532 |
Exploitation vector | Local network |
Public exploit | N/A |
Vulnerable software |
IntelliBridge Enterprise (IBE) Server applications / SCADA systems |
Vendor | Philips |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU28992
Risk: Low
CVSSv4.0: 0.4 [CVSS:4.0/AV:A/AC:L/AT:P/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2020-12023
CWE-ID:
CWE-532 - Information Exposure Through Log Files
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to software stores sensitive information into log files. An administrator on the local network can read plain text credentials from log files.
This vulnerability affects the following Workflows:
IntelliBridge Enterprise system integration with,
Mitigation
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versionsIntelliBridge Enterprise (IBE): - - B.12¨
CPE2.3https://www.us-cert.gov/ics/advisories/icsma-20-163-01
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the local network (LAN).
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.