Changed |
Description |
A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (All versions < V8.3). Attackers with access to port 10005/tcp could perform device reconfigurations
and obtain project files from the devices. The system manual recommends to
protect access to this port.
The security vulnerability could be exploited by an unauthenticated attacker
with network access to port 10005/tcp. No user interaction is required to
exploit this security vulnerability. The vulnerability impacts confidentiality,
integrity, and availability of the device.
At the time of advisory publication no public exploitation of this security
vulnerability was known.
|
A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (All versions < V8.3). Attackers with access to port 10005/tcp could perform device reconfigurations and obtain project files from the devices. The system manual recommends to protect access to this port. The security vulnerability could be exploited by an unauthenticated attacker with network access to port 10005/tcp. No user interaction is required to exploit this security vulnerability. The vulnerability impacts confidentiality, integrity, and availability of the device. At the time of advisory publication no public exploitation of this security vulnerability was known.
|