Unprotected storage of credentials in LOGO! - CVE-2019-10921

 

Unprotected storage of credentials in LOGO! - CVE-2019-10921

Published: June 19, 2019


Vulnerability identifier: #VU18842
CSH Severity: High
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:A/U:Amber
CVE-ID: CVE-2019-10921
CWE-ID: CWE-256
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Siemens
Affected software:
LOGO!

Detailed vulnerability description

The vulnerability allows to remote attacker to obtain passwords of the device.

The vulnerability exists due to unencrypted storage of passwords in the project. A remote attacker with access to port 10005/tcp can gain access to configured passwords as cleartext.

How to mitigate CVE-2019-10921

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vendor's recommendation:
  • Apply Defense-in-Depth concept, including protection concept outlined in the system manual.


Sources