Unprotected storage of credentials in LOGO! - CVE-2019-10921
Published: June 19, 2019
Vulnerability identifier: #VU18842
CSH Severity: High
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:A/U:Amber
CVE-ID: CVE-2019-10921
CWE-ID: CWE-256
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: Siemens
Affected software:
LOGO!
LOGO!
Detailed vulnerability description
The vulnerability allows to remote attacker to obtain passwords of the device.
The vulnerability exists due to unencrypted storage of passwords in the project. A remote attacker with access to port 10005/tcp can gain access to configured passwords as cleartext.
How to mitigate CVE-2019-10921
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vendor's recommendation:
- Apply Defense-in-Depth concept, including protection concept outlined in the system manual.