ID

VAR-201803-2306


TITLE

CODESYS Runtime plclinux_rt Multiple Authentication Bypass Vulnerabilities

Trust: 0.8

sources: IVD: e2e43bef-39ab-11e9-9e44-000c29342cb1 // CNVD: CNVD-2018-04064

DESCRIPTION

CoDeSys is a powerful PLC software programming tool that supports IEC61131-3 standard IL, ST, FBD, LD, CFC, SFC six PLC programming languages. There are multiple authentication bypass vulnerabilities in CODESYS Runtime plclinux_rt. An attacker can use these issues to bypass the authentication mechanism and perform unauthorized operations. This can lead to further attacks

Trust: 0.99

sources: CNVD: CNVD-2018-04064 // BID: 102113 // IVD: e2e43bef-39ab-11e9-9e44-000c29342cb1

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: e2e43bef-39ab-11e9-9e44-000c29342cb1 // CNVD: CNVD-2018-04064

AFFECTED PRODUCTS

vendor:codesysmodel:runtimescope: - version: -

Trust: 0.6

vendor:wagomodel:pfc200scope:eqversion:02.07.07(10)

Trust: 0.3

vendor:wagomodel:pfc200scope:eqversion:0

Trust: 0.3

vendor:3s smartmodel:codesys control runtime toolkitscope:eqversion:2.4.7.0

Trust: 0.3

vendor:codesysmodel:runtimescope:eqversion:*

Trust: 0.2

sources: IVD: e2e43bef-39ab-11e9-9e44-000c29342cb1 // CNVD: CNVD-2018-04064 // BID: 102113

CVSS

SEVERITY

CVSSV2

CVSSV3

CNVD: CNVD-2018-04064
value: MEDIUM

Trust: 0.6

IVD: e2e43bef-39ab-11e9-9e44-000c29342cb1
value: MEDIUM

Trust: 0.2

CNVD: CNVD-2018-04064
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: e2e43bef-39ab-11e9-9e44-000c29342cb1
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

sources: IVD: e2e43bef-39ab-11e9-9e44-000c29342cb1 // CNVD: CNVD-2018-04064

THREAT TYPE

network

Trust: 0.3

sources: BID: 102113

TYPE

Access Validation Error

Trust: 0.3

sources: BID: 102113

EXTERNAL IDS

db:BIDid:102113

Trust: 0.9

db:CNVDid:CNVD-2018-04064

Trust: 0.8

db:ICS CERT ALERTid:ICS-ALERT-17-341-01

Trust: 0.3

db:IVDid:E2E43BEF-39AB-11E9-9E44-000C29342CB1

Trust: 0.2

sources: IVD: e2e43bef-39ab-11e9-9e44-000c29342cb1 // CNVD: CNVD-2018-04064 // BID: 102113

REFERENCES

url:http://www.securityfocus.com/bid/102113/

Trust: 0.6

url:https://www.sec-consult.com/en/blog/advisories/wago-pfc-200-series-critical-codesys-vulnerabilities/index.html

Trust: 0.3

url:https://ics-cert.us-cert.gov/alerts/ics-alert-17-341-01

Trust: 0.3

sources: CNVD: CNVD-2018-04064 // BID: 102113

CREDITS

T. Weber (Office Vienna) of SEC Consult Vulnerability Lab.

Trust: 0.3

sources: BID: 102113

SOURCES

db:IVDid:e2e43bef-39ab-11e9-9e44-000c29342cb1
db:CNVDid:CNVD-2018-04064
db:BIDid:102113

LAST UPDATE DATE

2022-05-17T02:03:13.142000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2018-04064date:2018-03-02T00:00:00
db:BIDid:102113date:2017-12-19T22:01:00

SOURCES RELEASE DATE

db:IVDid:e2e43bef-39ab-11e9-9e44-000c29342cb1date:2018-03-02T00:00:00
db:CNVDid:CNVD-2018-04064date:2018-03-02T00:00:00
db:BIDid:102113date:2017-11-30T00:00:00