#VU83227 Cleartext transmission of sensitive information in Siemens COMOS


Published: 2023-11-16

Vulnerability identifier: #VU83227

Vulnerability risk: Low

CVSSv3.1: 3.1 [CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-43503

CWE-ID: CWE-319

Exploitation vector: Local network

Exploit availability: No

Vulnerable software:
Siemens COMOS
Other software / Other software solutions

Vendor:

Description

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to software uses insecure communication channel to transmit sensitive information via UDP. A remote user with ability to intercept network traffic can gain access to sensitive data.

Mitigation
Install updates from vendor's website.

Vulnerable software versions


External links
http://cert-portal.siemens.com/productcert/txt/ssa-137900.txt


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability