Cleartext transmission of sensitive information in CODESYS products - CVE-2019-9013

 

Cleartext transmission of sensitive information in CODESYS products - CVE-2019-9013

Published: August 2, 2019


Vulnerability identifier: #VU19623
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2019-9013
CWE-ID: CWE-319
Exploitation vector: Adjecent network
Exploit availability: No public exploit available
Vendor: CODESYS
Affected software:
CODESYS HMI
CODESYS Control Runtime System Toolkit
CODESYS Simulation Runtime
CODESYS Control RTE
CODESYS Control for Raspberry Pi
CODESYS Control for PFC200
CODESYS Control for PFC100
CODESYS Control for Linux
CODESYS Control for IOT2000
CODESYS Control for emPC-A/iMX6
CODESYS Control for BeagleBone
CODESYS firmware

Detailed vulnerability description

The vulnerability allows a remote attacker to perform MitM attack.

The vulnerability exists due to software allows transmission of user credentials via insecure HTTP protocol. A remote attacker with ability to intercept network traffic can obtain user's credentials and gain unauthorized access to the system.


How to mitigate CVE-2019-9013

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

According to vendor statement, the vulnerability will be fixed in software version 3.5.16.0, planned for February 2020.

Sources