CVE-2020-12069
Severity CVSS v4.0:
Pending analysis
Type:
CWE-916
Use of Password Hash With Insufficient Computational Effort
Publication date:
26/12/2022
Last modified:
05/05/2025
Description
In CODESYS V3 products in all versions prior V3.5.16.0 containing the CmpUserMgr, the CODESYS Control runtime system stores the online communication passwords using a weak hashing algorithm. This can be used by a local attacker with low privileges to gain full control of the device.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:pilz:pmc:*:*:*:*:*:*:*:* | 3.0.0 (including) | 3.5.17 (excluding) |
cpe:2.3:a:codesys:control_for_beaglebone:*:*:*:*:*:*:*:* | 3.5.16.0 (excluding) | |
cpe:2.3:a:codesys:control_for_empc-a\/imx6:*:*:*:*:*:*:*:* | 3.5.16.0 (excluding) | |
cpe:2.3:a:codesys:control_for_iot2000:*:*:*:*:*:*:*:* | 3.5.16.0 (excluding) | |
cpe:2.3:a:codesys:control_for_linux:*:*:*:*:*:*:*:* | 3.5.16.0 (excluding) | |
cpe:2.3:a:codesys:control_for_pfc100:*:*:*:*:*:*:*:* | 3.5.16.0 (excluding) | |
cpe:2.3:a:codesys:control_for_pfc200:*:*:*:*:*:*:*:* | 3.5.16.0 (excluding) | |
cpe:2.3:a:codesys:control_for_plcnext:*:*:*:*:*:*:*:* | 3.5.16.0 (excluding) | |
cpe:2.3:a:codesys:control_for_raspberry_pi:*:*:*:*:*:*:*:* | 3.5.16.0 (excluding) | |
cpe:2.3:a:codesys:control_rte_v3:*:*:*:*:*:*:*:* | 3.5.16.0 (excluding) | |
cpe:2.3:a:codesys:control_v3_runtime_system_toolkit:*:*:*:*:*:*:*:* | 3.5.16.0 (excluding) | |
cpe:2.3:a:codesys:control_win_v3:*:*:*:*:*:*:*:* | 3.5.16.0 (excluding) | |
cpe:2.3:a:codesys:hmi_v3:*:*:*:*:*:*:*:* | 3.5.16.0 (excluding) | |
cpe:2.3:a:codesys:v3_simulation_runtime:*:*:*:*:*:*:*:* | 3.5.16.0 (excluding) | |
cpe:2.3:o:festo:controller_cecc-d_firmware:2.3.8.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://cert.vde.com/en/advisories/VDE-2021-061/
- https://cert.vde.com/en/advisories/VDE-2022-022/
- https://cert.vde.com/en/advisories/VDE-2022-031/
- https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=12943&token=d097958a67ba382de688916f77e3013c0802fade&download=
- https://cert.vde.com/en/advisories/VDE-2021-061/
- https://cert.vde.com/en/advisories/VDE-2022-022/
- https://cert.vde.com/en/advisories/VDE-2022-031/
- https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=12943&token=d097958a67ba382de688916f77e3013c0802fade&download=