Lucene search

K
cve[email protected]CVE-2023-43776
HistoryOct 17, 2023 - 1:15 p.m.

CVE-2023-43776

2023-10-1713:15:11
CWE-326
CWE-261
web.nvd.nist.gov
22
eaton
easye4 plc
password protection
weak encoding
vulnerability
cve-2023-43776

6.8 Medium

CVSS3

Attack Vector

PHYSICAL

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:P/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H

6.5 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

21.7%

Eaton easyE4 PLC offers a device password protection functionality to facilitate a secure connection and prevent unauthorized access. It was observed that the device password was stored with a weak encoding algorithm in the easyE4 program file when exported to SD card (*.PRG file ending).

Affected configurations

NVD
Node
eatoneasy-box-e4-ac1Match-
AND
eatoneasy-box-e4-ac1_firmwareRange<2.02
Node
eatoneasy-box-e4-dc1_firmwareRange<2.02
AND
eatoneasy-box-e4-dc1Match-
Node
eatoneasy-box-e4-uc1_firmwareRange<2.02
AND
eatoneasy-box-e4-uc1Match-
Node
eatoneasy-e4-ac-12rc1p_firmwareRange<2.02
AND
eatoneasy-e4-ac-12rc1pMatch-
Node
eatoneasy-e4-ac-12rcx1p_firmwareRange<2.02
AND
eatoneasy-e4-ac-12rcx1pMatch-
Node
eatoneasy-e4-ac-16re1p_firmwareRange<2.02
AND
eatoneasy-e4-ac-16re1pMatch-
Node
eatoneasy_e4-ac-8re1p_firmwareRange<2.02
AND
eatoneasy_e4-ac-8re1pMatch-
Node
eatoneasy-e4-dc-12tc1p_firmwareRange<2.02
AND
eatoneasy-e4-dc-12tc1pMatch-
Node
eatoneasy-e4-dc-12tcx1p_firmwareRange<2.02
AND
eatoneasy-e4-dc-12tcx1pMatch-
Node
eatoneasy-e4-dc-16te1p_firmwareRange<2.02
AND
eatoneasy-e4-dc-16te1pMatch-
Node
eatoneasy-e4-dc-4pe1p_firmwareRange<2.02
AND
eatoneasy-e4-dc-4pe1pMatch-
Node
eatoneasy-e4-dc-6ae1p_firmwareRange<2.02
AND
eatoneasy-e4-dc-6ae1pMatch-
Node
eatoneasy-e4-dc-8te1p_firmwareRange<2.02
AND
eatoneasy-e4-dc-8te1pMatch-
Node
eatoneasy-e4-uc-12rc1p_firmwareRange<2.02
AND
eatoneasy-e4-uc-12rc1pMatch-
Node
eatoneasy-e4-uc-12rcx1p_firmwareRange<2.02
AND
eatoneasy-e4-uc-12rcx1pMatch-
Node
eatoneasy-e4-uc-16re1_firmwareRange<2.02
AND
eatoneasy-e4-uc-16re1Match-
Node
eatoneasy-e4-uc-16re1p_firmwareRange<2.02
AND
eatoneasy-e4-uc-16re1pMatch-
Node
eatoneasy-e4-uc-8re1p_firmwareRange<2.02
AND
eatoneasy-e4-uc-8re1pMatch-
Node
eatonxv-102-a035tqrb-1e4_firmwareRange<2.02
AND
eatonxv-102-a035tqrb-1e4Match-
Node
eatonxv-102-a3-57tvrb-1e4_firmwareRange<2.02
AND
eatonxv-102-a3-57tvrb-1e4Match-
Node
eatonxv100-box-e4-dc1_firmwareRange<2.02
AND
eatonxv100-box-e4-dc1Match-
Node
eatonxv100-box-e4-uc1_firmwareRange<2.02
AND
eatonxv100-box-e4-uc1Match-

CNA Affected

[
  {
    "defaultStatus": "affected",
    "product": "easyE4",
    "vendor": "Eaton",
    "versions": [
      {
        "lessThan": "2.02",
        "status": "affected",
        "version": "0",
        "versionType": "custom"
      }
    ]
  }
]

6.8 Medium

CVSS3

Attack Vector

PHYSICAL

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:P/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H

6.5 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

21.7%

Related for CVE-2023-43776