ID

VAR-201404-0544


CVE

CVE-2014-0769


TITLE

Festo Modular controllers CECX-X-C1 and CECX-X-M1 Vulnerabilities whose settings are changed

Trust: 0.8

sources: JVNDB: JVNDB-2014-002256

DESCRIPTION

The Festo CECX-X-C1 Modular Master Controller with CoDeSys and CECX-X-M1 Modular Controller with CoDeSys and SoftMotion do not require authentication for connections to certain TCP ports, which allows remote attackers to (1) modify the configuration via a request to the debug service on port 4000 or (2) delete log entries via a request to the log service on port 4001. Festo CECX-X-C1 and CECX-X-M1 are modular air-sourced controllers. Attackers can exploit these issues to bypass authentication mechanism and gain unauthorized access. Successful exploits may allow attackers to execute arbitrary code, causing a denial-of-service condition. http://drupal.org/node/207891

Trust: 2.52

sources: NVD: CVE-2014-0769 // JVNDB: JVNDB-2014-002256 // CNVD: CNVD-2014-02691 // BID: 67067 // VULHUB: VHN-68262

AFFECTED PRODUCTS

vendor:softmotion3dmodel:softmotionscope:eqversion: -

Trust: 1.6

vendor:festomodel:cecx-x-m1 modular controllerscope:eqversion: -

Trust: 1.0

vendor:festomodel:cecx-x-c1 modular master controllerscope:eqversion: -

Trust: 1.0

vendor:3smodel:codesys runtime systemscope:eqversion: -

Trust: 1.0

vendor:3s smartmodel:codesys control runtime systemscope: - version: -

Trust: 0.8

vendor:festomodel:cecx-x-c1 modular master controllerscope:eqversion:with codesys

Trust: 0.8

vendor:festomodel:cecx-x-m1 modular controllerscope:eqversion:with codesys and softmotion

Trust: 0.8

vendor:softmotion3dmodel:softmotionscope: - version: -

Trust: 0.8

vendor:festomodel:cecx-x-c1scope: - version: -

Trust: 0.6

vendor:festomodel:cecx-x-m1scope: - version: -

Trust: 0.6

vendor:festomodel:cecx-x-m1scope:eqversion:0

Trust: 0.3

vendor:festomodel:cecx-x-c1scope:eqversion:0

Trust: 0.3

sources: CNVD: CNVD-2014-02691 // BID: 67067 // JVNDB: JVNDB-2014-002256 // CNNVD: CNNVD-201404-503 // NVD: CVE-2014-0769

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-0769
value: HIGH

Trust: 1.0

NVD: CVE-2014-0769
value: HIGH

Trust: 0.8

CNVD: CNVD-2014-02691
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201404-503
value: CRITICAL

Trust: 0.6

VULHUB: VHN-68262
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2014-0769
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2014-02691
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-68262
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2014-02691 // VULHUB: VHN-68262 // JVNDB: JVNDB-2014-002256 // CNNVD: CNNVD-201404-503 // NVD: CVE-2014-0769

PROBLEMTYPE DATA

problemtype:CWE-287

Trust: 1.9

sources: VULHUB: VHN-68262 // JVNDB: JVNDB-2014-002256 // NVD: CVE-2014-0769

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201404-503

TYPE

authorization issue

Trust: 0.6

sources: CNNVD: CNNVD-201404-503

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-002256

PATCH

title:CODESYS Control Runtime Toolkiturl:http://www.codesys.com/products/codesys-runtime/runtime-toolkit.html

Trust: 0.8

title:CODESYS Downloadurl:http://www.codesys.com/support-training/self-help/downloads-updates.html

Trust: 0.8

title:ModularcontrollersCECXurl:http://www.festo.com/cat/en-gb_gb/data/doc_engb/PDF/EN/CECX_EN.PDF

Trust: 0.8

title:Top Pageurl:http://www.smotion3d.com/forum/

Trust: 0.8

sources: JVNDB: JVNDB-2014-002256

EXTERNAL IDS

db:ICS CERTid:ICSA-14-084-01

Trust: 3.4

db:NVDid:CVE-2014-0769

Trust: 3.4

db:BIDid:67067

Trust: 0.9

db:JVNDBid:JVNDB-2014-002256

Trust: 0.8

db:CNNVDid:CNNVD-201404-503

Trust: 0.7

db:OSVDBid:106276

Trust: 0.6

db:CNVDid:CNVD-2014-02691

Trust: 0.6

db:VULHUBid:VHN-68262

Trust: 0.1

sources: CNVD: CNVD-2014-02691 // VULHUB: VHN-68262 // BID: 67067 // JVNDB: JVNDB-2014-002256 // CNNVD: CNNVD-201404-503 // NVD: CVE-2014-0769

REFERENCES

url:http://ics-cert.us-cert.gov/advisories/icsa-14-084-01

Trust: 3.4

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0769

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-0769

Trust: 0.8

url:http://osvdb.com/show/osvdb/106276

Trust: 0.6

url:https://www.festo.com/net/startpage/

Trust: 0.3

sources: CNVD: CNVD-2014-02691 // VULHUB: VHN-68262 // BID: 67067 // JVNDB: JVNDB-2014-002256 // CNNVD: CNNVD-201404-503 // NVD: CVE-2014-0769

CREDITS

K. Reid Wightman of IOActive

Trust: 0.3

sources: BID: 67067

SOURCES

db:CNVDid:CNVD-2014-02691
db:VULHUBid:VHN-68262
db:BIDid:67067
db:JVNDBid:JVNDB-2014-002256
db:CNNVDid:CNNVD-201404-503
db:NVDid:CVE-2014-0769

LAST UPDATE DATE

2024-11-23T22:02:12.760000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2014-02691date:2014-04-29T00:00:00
db:VULHUBid:VHN-68262date:2014-04-25T00:00:00
db:BIDid:67067date:2014-04-24T00:00:00
db:JVNDBid:JVNDB-2014-002256date:2014-04-28T00:00:00
db:CNNVDid:CNNVD-201404-503date:2014-04-28T00:00:00
db:NVDid:CVE-2014-0769date:2024-11-21T02:02:46.637

SOURCES RELEASE DATE

db:CNVDid:CNVD-2014-02691date:2014-04-29T00:00:00
db:VULHUBid:VHN-68262date:2014-04-25T00:00:00
db:BIDid:67067date:2014-04-24T00:00:00
db:JVNDBid:JVNDB-2014-002256date:2014-04-28T00:00:00
db:CNNVDid:CNNVD-201404-503date:2014-04-28T00:00:00
db:NVDid:CVE-2014-0769date:2014-04-25T05:12:07.753