Use of hard-coded credentials in LOGO! - CVE-2019-10920
Published: June 19, 2019
Vulnerability identifier: #VU18843
CSH Severity: High
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:A/U:Amber
CVE-ID: CVE-2019-10920
CWE-ID: CWE-798
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: Siemens
Affected software:
LOGO!
LOGO!
Detailed vulnerability description
The vulnerability allows a remote attacker to gain access to vulnerable device.
The vulnerability exists due to presence of hard-coded credentials in application code. A remote unauthenticated attacker with access to port 10005/tcp can decrypt project data with a hardcoded encryption key.
How to mitigate CVE-2019-10920
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vendor's recommendation:
- Apply Defense-in-Depth concept, including protection concept outlined in the system manual.