Man-in-the-middle attack in LOGO! - CVE-2017-12735

 

Man-in-the-middle attack in LOGO! - CVE-2017-12735

Published: August 31, 2017


Vulnerability identifier: #VU8048
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/U:Clear
CVE-ID: CVE-2017-12735
CWE-ID: CWE-300
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Siemens
Affected software:
LOGO!

Detailed vulnerability description

The vulnerability allows a remote attacker to perform man-in-the-middle attack.

The weakness exists due to improper permissions and access controls.  A remote attacker with network access to the integrated web server on port 80/tcp can obtain the session ID of an active user session.

How to mitigate CVE-2017-12735

Siemens recommends applying the following mitigations for customers with existing
installations, and for mitigation of the second vulnerability:
- Configure the environment according to the recommendations in the user manual;
- Apply cell protection concept;
- Use VPN for protecting network communication between cells;
- Apply Defense-in-Depth.

Sources