ID

VAR-201905-1075


CVE

CVE-2019-10921


TITLE

Siemens LOGO!8 BM Trust Management Issue Vulnerability

Trust: 1.4

sources: IVD: 481c2a28-c0fa-4e6c-b8f6-6dee4da03ec1 // CNVD: CNVD-2019-15666 // CNNVD: CNNVD-201905-600

DESCRIPTION

A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (All versions < V8.3). Unencrypted storage of passwords in the project could allow an attacker with access to port 10005/tcp to obtain passwords of the device. The security vulnerability could be exploited by an unauthenticated attacker with network access to port 10005/tcp. No user interaction is required to exploit this security vulnerability. The vulnerability impacts confidentiality of the device. At the time of advisory publication no public exploitation of this security vulnerability was known. LOGO!8 BM contains a vulnerability related to plaintext storage of authentication information.Information may be obtained. Siemens LOGO!8 BM is a programmable logic controller from Siemens AG, Germany. A vulnerability management issue vulnerability exists in Siemens LOGO!8 BM (all versions). The vulnerability stems from the lack of an effective trust management mechanism in network systems or products. An attacker can attack an affected component with a default password or hard-coded password, hard-coded certificate, and so on. An attacker can exploit these issues to obtain sensitive information. Successful exploits may lead to other attacks. All versions of LOGO!8 BM are vulnerable. to attack affected components

Trust: 2.7

sources: NVD: CVE-2019-10921 // JVNDB: JVNDB-2019-004558 // CNVD: CNVD-2019-15666 // BID: 108382 // IVD: 481c2a28-c0fa-4e6c-b8f6-6dee4da03ec1 // VULHUB: VHN-142516

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: 481c2a28-c0fa-4e6c-b8f6-6dee4da03ec1 // CNVD: CNVD-2019-15666

AFFECTED PRODUCTS

vendor:siemensmodel:logo\!8 bmscope:ltversion:8.3

Trust: 1.0

vendor:シーメンスmodel:logo! 8 bmscope:eqversion:logo! 8 bm firmware

Trust: 0.8

vendor:シーメンスmodel:logo! 8 bmscope:eqversion: -

Trust: 0.8

vendor:siemensmodel:logo!8 bmscope: - version: -

Trust: 0.6

vendor:siemensmodel:logo!8 bmscope:eqversion:0

Trust: 0.3

vendor:logo 8 bmmodel: - scope:eqversion:*

Trust: 0.2

sources: IVD: 481c2a28-c0fa-4e6c-b8f6-6dee4da03ec1 // CNVD: CNVD-2019-15666 // BID: 108382 // JVNDB: JVNDB-2019-004558 // NVD: CVE-2019-10921

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-10921
value: HIGH

Trust: 1.0

NVD: CVE-2019-10921
value: HIGH

Trust: 0.8

CNVD: CNVD-2019-15666
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201905-600
value: HIGH

Trust: 0.6

IVD: 481c2a28-c0fa-4e6c-b8f6-6dee4da03ec1
value: HIGH

Trust: 0.2

VULHUB: VHN-142516
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2019-10921
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2019-15666
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 481c2a28-c0fa-4e6c-b8f6-6dee4da03ec1
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-142516
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-10921
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2019-10921
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: IVD: 481c2a28-c0fa-4e6c-b8f6-6dee4da03ec1 // CNVD: CNVD-2019-15666 // VULHUB: VHN-142516 // JVNDB: JVNDB-2019-004558 // CNNVD: CNNVD-201905-600 // NVD: CVE-2019-10921

PROBLEMTYPE DATA

problemtype:CWE-522

Trust: 1.1

problemtype:CWE-256

Trust: 1.0

problemtype:Plain text storage of authentication information (CWE-256) [ others ]

Trust: 0.8

problemtype: Inadequate protection of credentials (CWE-522) [NVD evaluation ]

Trust: 0.8

problemtype:CWE-255

Trust: 0.1

sources: VULHUB: VHN-142516 // JVNDB: JVNDB-2019-004558 // NVD: CVE-2019-10921

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201905-600

TYPE

trust management problem

Trust: 0.6

sources: CNNVD: CNNVD-201905-600

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-142516

PATCH

title:SSA-542701url:https://cert-portal.siemens.com/productcert/pdf/ssa-542701.pdf

Trust: 0.8

sources: JVNDB: JVNDB-2019-004558

EXTERNAL IDS

db:NVDid:CVE-2019-10921

Trust: 4.4

db:BIDid:108382

Trust: 2.6

db:SIEMENSid:SSA-542701

Trust: 2.3

db:PACKETSTORMid:153124

Trust: 1.7

db:ICS CERTid:ICSA-19-134-04

Trust: 1.7

db:CNNVDid:CNNVD-201905-600

Trust: 0.9

db:CNVDid:CNVD-2019-15666

Trust: 0.8

db:JVNDBid:JVNDB-2019-004558

Trust: 0.8

db:ICS CERTid:ICSA-19-134-02

Trust: 0.6

db:AUSCERTid:ESB-2019.1716.2

Trust: 0.6

db:IVDid:481C2A28-C0FA-4E6C-B8F6-6DEE4DA03EC1

Trust: 0.2

db:VULHUBid:VHN-142516

Trust: 0.1

sources: IVD: 481c2a28-c0fa-4e6c-b8f6-6dee4da03ec1 // CNVD: CNVD-2019-15666 // VULHUB: VHN-142516 // BID: 108382 // JVNDB: JVNDB-2019-004558 // CNNVD: CNNVD-201905-600 // NVD: CVE-2019-10921

REFERENCES

url:http://www.securityfocus.com/bid/108382

Trust: 2.9

url:http://packetstormsecurity.com/files/153124/siemens-logo-8-recoverable-password-format.html

Trust: 2.9

url:https://cert-portal.siemens.com/productcert/pdf/ssa-542701.pdf

Trust: 2.3

url:https://seclists.org/bugtraq/2019/may/74

Trust: 1.7

url:http://seclists.org/fulldisclosure/2019/may/49

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2019-10921

Trust: 1.4

url:http://www.siemens.com/

Trust: 0.9

url:https://ics-cert.us-cert.gov/advisories/icsa-19-134-04

Trust: 0.9

url:https://www.us-cert.gov/ics/advisories/icsa-19-134-04

Trust: 0.8

url:https://ics-cert.us-cert.gov/advisories/icsa-19-134-02-0

Trust: 0.6

url:https://us-cert.cisa.gov/ics/advisories/icsa-19-134-04

Trust: 0.6

url:https://www.auscert.org.au/bulletins/80946

Trust: 0.6

sources: CNVD: CNVD-2019-15666 // VULHUB: VHN-142516 // BID: 108382 // JVNDB: JVNDB-2019-004558 // CNNVD: CNNVD-201905-600 // NVD: CVE-2019-10921

CREDITS

Manuel Stotz and Matthias Deeg from SySS GmbH reported these vulnerabilities to Siemens.

Trust: 0.6

sources: CNNVD: CNNVD-201905-600

SOURCES

db:IVDid:481c2a28-c0fa-4e6c-b8f6-6dee4da03ec1
db:CNVDid:CNVD-2019-15666
db:VULHUBid:VHN-142516
db:BIDid:108382
db:JVNDBid:JVNDB-2019-004558
db:CNNVDid:CNNVD-201905-600
db:NVDid:CVE-2019-10921

LAST UPDATE DATE

2024-12-28T22:51:38.286000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2019-15666date:2019-05-28T00:00:00
db:VULHUBid:VHN-142516date:2020-10-02T00:00:00
db:BIDid:108382date:2019-05-14T00:00:00
db:JVNDBid:JVNDB-2019-004558date:2024-12-27T03:11:00
db:CNNVDid:CNNVD-201905-600date:2020-12-15T00:00:00
db:NVDid:CVE-2019-10921date:2024-11-21T04:20:09.347

SOURCES RELEASE DATE

db:IVDid:481c2a28-c0fa-4e6c-b8f6-6dee4da03ec1date:2019-05-28T00:00:00
db:CNVDid:CNVD-2019-15666date:2019-05-28T00:00:00
db:VULHUBid:VHN-142516date:2019-05-14T00:00:00
db:BIDid:108382date:2019-05-14T00:00:00
db:JVNDBid:JVNDB-2019-004558date:2019-06-04T00:00:00
db:CNNVDid:CNNVD-201905-600date:2019-05-14T00:00:00
db:NVDid:CVE-2019-10921date:2019-05-14T20:29:02.700