Lucene search

K
zdiPan ZhenPeng (@Peterpan0927) & Li JianTao (@CurseRed) of STAR Labs SG Pte. Ltd. (@starlabs_sg)ZDI-24-353
HistoryMar 28, 2024 - 12:00 a.m.

Softing edgeConnector Siemens Cleartext Transmission of Credentials Authentication Bypass Vulnerability

2024-03-2800:00:00
Pan ZhenPeng (@Peterpan0927) & Li JianTao (@CurseRed) of STAR Labs SG Pte. Ltd. (@starlabs_sg)
www.zerodayinitiative.com
11
softing edgeconnector
siemens
cleartext transmission
credentials
authentication bypass
vulnerability
network-adjacent attackers
web console
tcp port 8099
http traffic
unprotected credentials
exploit

7.1 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

29.0%

This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of Softing edgeConnector Siemens. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web console, which listens on TCP port 8099 by default. HTTP traffic to this port contains unprotected credentials. An attacker can leverage this vulnerability to bypass authentication on the system.

7.1 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

29.0%

Related for ZDI-24-353