Vulnerability identifier: #VU48922
Vulnerability risk: Low
CVSSv3.1: 3.1 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:U/RC:C]
CVE-ID:
CWE-ID:
CWE-760
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Modicon M221
Hardware solutions /
Firmware
Vendor: Schneider Electric
Description
The vulnerability allows a local user to compromise the target system.
The vulnerability exists due to a use of a one-way hash with a predictable salt. A local user can pre-compute the hash value using a dictionary attack, effectively disabling the protection that an unpredictable salt would provide.
Mitigation
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versions
Modicon M221: All versions
External links
http://ics-cert.us-cert.gov/advisories/icsa-20-343-04
http://www.se.com/ww/en/download/document/SEVD-2020-315-05/
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.