Lucene search

K
cvelistMitreCVELIST:CVE-2020-12069
HistoryDec 26, 2022 - 12:00 a.m.

CVE-2020-12069 CODESYS V3 prone to Inadequate Password Hashing

2022-12-2600:00:00
CWE-916
mitre
www.cve.org
3
codesys v3
password hashing
weak hashing algorithm
local attacker
device control
cve-2020-12069

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

9.3

Confidence

High

EPSS

0.002

Percentile

59.4%

In CODESYS V3 products in all versions prior V3.5.16.0 containing the CmpUserMgr, the CODESYS Control runtime system stores the online communication passwords using a weak hashing algorithm. This can be used by a local attacker with low privileges to gain full control of the device.

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "CODESYS V3  containing the CmpUserMgr",
    "vendor": "CODESYS",
    "versions": [
      {
        "lessThan": "V3.5.16.0",
        "status": "affected",
        "version": "V3",
        "versionType": "custom"
      }
    ]
  }
]

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

9.3

Confidence

High

EPSS

0.002

Percentile

59.4%

Related for CVELIST:CVE-2020-12069