#VU25418 Incorrect permission assignment for critical resource in Emalytics Controller ILC 2050 BI and Emalytics Controller ILC 2050 BI-L


Published: 2020-02-18

Vulnerability identifier: #VU25418

Vulnerability risk: High

CVSSv3.1: 8.2 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-8768

CWE-ID: CWE-732

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Emalytics Controller ILC 2050 BI
Hardware solutions / Other hardware appliances
Emalytics Controller ILC 2050 BI-L
Hardware solutions / Other hardware appliances

Vendor: Phoenix Contact GmbH

Description

The vulnerability allows a remote attacker to gain access to unintended functionality on the target system.

The vulnerability exists due to an insecure mechanism for read and write access to the configuration of the device. A remote attacker can examine a link on the website of the device, discover this mechanism, change the device configuration and start or stop services.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Emalytics Controller ILC 2050 BI: All versions

Emalytics Controller ILC 2050 BI-L: All versions


External links
http://cert.vde.com/de-de/advisories/vde-2020-001


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability