Use of hard-coded credentials in LOGO! - CVE-2019-10920

 

Use of hard-coded credentials in LOGO! - CVE-2019-10920

Published: June 19, 2019


Vulnerability identifier: #VU18843
CSH Severity: High
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:A/U:Amber
CVE-ID: CVE-2019-10920
CWE-ID: CWE-798
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Siemens
Affected software:
LOGO!

Detailed vulnerability description

The vulnerability allows a remote attacker to gain access to vulnerable device.

The vulnerability exists due to presence of hard-coded credentials in application code. A remote unauthenticated attacker with access to port 10005/tcp can decrypt project data with a hardcoded encryption key.



How to mitigate CVE-2019-10920

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vendor's recommendation:
  • Apply Defense-in-Depth concept, including protection concept outlined in the system manual.


Sources