#VU48922 Use of a One-Way Hash with a Predictable Salt in Modicon M221


Published: 2020-11-19 | Updated: 2020-12-10

Vulnerability identifier: #VU48922

Vulnerability risk: Low

CVSSv3.1: 3.1 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:U/RC:C]

CVE-ID: CVE-2020-28214

CWE-ID: CWE-760

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Modicon M221
Hardware solutions / Firmware

Vendor: Schneider Electric

Description

The vulnerability allows a local user to compromise the target system.

The vulnerability exists due to a use of a one-way hash with a predictable salt. A local user can pre-compute the hash value using a dictionary attack, effectively disabling the protection that an unpredictable salt would provide. 

Mitigation
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

Modicon M221: All versions


External links
http://ics-cert.us-cert.gov/advisories/icsa-20-343-04
http://www.se.com/ww/en/download/document/SEVD-2020-315-05/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability