Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2019-10920

Опубликовано: 14 мая 2019
Источник: nvd
CVSS3: 7.5
CVSS2: 5
EPSS Низкий

Описание

A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (All versions < V8.3). Project data stored on the device, which is accessible via port 10005/tcp, can be decrypted due to a hardcoded encryption key. The security vulnerability could be exploited by an unauthenticated attacker with network access to port 10005/tcp. No user interaction is required to exploit this security vulnerability. The vulnerability impacts confidentiality of the device. At the time of advisory publication no public exploitation of this security vulnerability was known.

Уязвимые конфигурации

Конфигурация 1

Одновременно

Одно из

cpe:2.3:o:siemens:logo\!8_bm_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:siemens:logo\!8_bm_firmware:*:*:*:*:*:*:*:*
Версия до 8.3 (исключая)
cpe:2.3:h:siemens:logo\!8_bm:*:*:*:*:*:*:*:*

EPSS

Процентиль: 74%
0.00809
Низкий

7.5 High

CVSS3

5 Medium

CVSS2

Дефекты

CWE-321
CWE-798

Связанные уязвимости

github
больше 3 лет назад

A vulnerability has been identified in LOGO!8 BM (All versions). Project data stored on the device, which is accessible via port 10005/tcp, can be decrypted due to a hardcoded encryption key. The security vulnerability could be exploited by an unauthenticated attacker with network access to port 10005/tcp. No user interaction is required to exploit this security vulnerability. The vulnerability impacts confidentiality of the device. At the time of advisory publication no public exploitation of this security vulnerability was known.

CVSS3: 7.5
fstec
больше 6 лет назад

Уязвимость микропрограммного обеспечения программируемого логического контроллера Siemens LOGO!8 BM, связанная с наличием предустановленных ключей шифрования, позволяющая нарушителю расшифровать данные проекта

EPSS

Процентиль: 74%
0.00809
Низкий

7.5 High

CVSS3

5 Medium

CVSS2

Дефекты

CWE-321
CWE-798