Festo CECX-X-(C1/M1) Controller Improper Authentication

Summary

CVECVE-2014-0769
StatePUBLISHED
Assignericscert
Source PriorityCVE Program / NVD first with legacy fallback
Published2014-04-25 05:12:07 UTC
Updated2026-05-06 22:30:45 UTC
DescriptionThe Festo CECX-X-C1 Modular Master Controller with CoDeSys and CECX-X-M1 Modular Controller with CoDeSys and SoftMotion do not require authentication for connections to certain TCP ports, which allows remote attackers to (1) modify the configuration via a request to the debug service on port 4000 or (2) delete log entries via a request to the log service on port 4001.

Risk And Classification

Primary CVSS: v2.0 9.3 from [email protected]

AV:N/AC:M/Au:N/C:C/I:C/A:C

Problem Types: CWE-287 | CWE-287 CWE-287


VersionSourceTypeScoreSeverityVector
2.0[email protected]Primary9.3AV:N/AC:M/Au:N/C:C/I:C/A:C
2.0[email protected]Secondary9.3AV:N/AC:M/Au:N/C:C/I:C/A:C
2.0CNACVSS9.3AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS v2.0 Breakdown

Access Vector
Network
Access Complexity
Medium
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete

AV:N/AC:M/Au:N/C:C/I:C/A:C

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Application 3s-software Codesys Runtime System - All All All
Hardware Festo Cecx-x-c1 Modular Master Controller - All All All
Hardware Festo Cecx-x-m1 Modular Controller - All All All
Application Softmotion3d Softmotion - All All All

Vendor Declared Affected Products

SourceVendorProductVersionPlatforms
CNA Festo CECX-X-C1 Modular Master Controller With CoDeSys affected all Not specified
CNA Festo CECX-X-M1 Modular Controller With CoDeSys And SoftMotion affected all Not specified

References

ReferenceSourceLinkTags
Festo CECX-X-(C1/M1) Controller Vulnerabilities | ICS-CERT af854a3a-2127-422b-91ae-364da2661108 ics-cert.us-cert.gov US Government Resource
www.cisa.gov/news-events/ics-advisories/icsa-14-084-01 [email protected] www.cisa.gov
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Vendor Comments And Credit

Discovery Credit

CNA: K. Reid Wightman of IOActive, Inc. has identified vulnerabilities in Festo’s CECX-X-C1 and CECX-X-M1 controllers. (en)

Additional Advisory Data

Workarounds

CNA: Festo has decided not to resolve these vulnerabilities, placing critical infrastructure asset owners using this product at risk. This advisory is being published to alert critical infrastructure asset owners of the risk of using this equipment, and to increase compensating security measures if possible. Some of these compensating measures can be: * Minimize network exposure for all control system devices and/or systems, and ensure that they are not accessible from the Internet. * Locate control system networks and remote devices behind firewalls, and isolate them from the business network. * When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing that VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize that VPN is only as secure as the connected devices. * Investigate the practicality of configuring and deploying an intrusion detection system (IDS) to log and monitor the control system network, as well as adjacent networks. * Configure, activate, and test existing defenses, such as port security and traffic logging, among other defensive strategies in the recommended practices document listed below.

© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report