CVE-2018-10612
Summary
| CVE | CVE-2018-10612 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2019-01-29 16:29:00 UTC |
| Updated | 2019-10-09 23:32:00 UTC |
| Description | In 3S-Smart Software Solutions GmbH CODESYS Control V3 products prior to version 3.5.14.0, user access management and communication encryption is not enabled by default, which could allow an attacker access to the device and sensitive information, including user credentials. |
Risk And Classification
Problem Types: CWE-311 | CWE-732
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Codesys | Control For Beaglebone Sl | All | All | All | All |
| Application | Codesys | Control For Beaglebone Sl | All | All | All | All |
| Application | Codesys | Control For Empc-a/imx6 Sl | All | All | All | All |
| Application | Codesys | Control For Empc-a/imx6 Sl | All | All | All | All |
| Application | Codesys | Control For Empc-a/imx6 Sl | All | All | All | All |
| Application | Codesys | Control For Iot2000 Sl | All | All | All | All |
| Application | Codesys | Control For Iot2000 Sl | All | All | All | All |
| Application | Codesys | Control For Linux Sl | All | All | All | All |
| Application | Codesys | Control For Linux Sl | All | All | All | All |
| Application | Codesys | Control For Pfc100 Sl | All | All | All | All |
| Application | Codesys | Control For Pfc100 Sl | All | All | All | All |
| Application | Codesys | Control For Pfc200 Sl | All | All | All | All |
| Application | Codesys | Control For Pfc200 Sl | All | All | All | All |
| Application | Codesys | Control For Raspberry Pi Sl | All | All | All | All |
| Application | Codesys | Control For Raspberry Pi Sl | All | All | All | All |
| Application | Codesys | Control Rte Sl | All | All | All | All |
| Application | Codesys | Control Rte Sl | All | All | All | All |
| Application | Codesys | Control Runtime Toolkit | All | All | All | All |
| Application | Codesys | Control Runtime Toolkit | All | All | All | All |
| Application | Codesys | Control Win Sl | All | All | All | All |
| Application | Codesys | Control Win Sl | All | All | All | All |
| Application | Codesys | Development System V3 | All | All | All | All |
| Application | Codesys | Development System V3 | All | All | All | All |
| Application | Codesys | Hmi Sl | All | All | All | All |
| Application | Codesys | Hmi Sl | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| 3S-Smart Software Solutions GmbH CODESYS ICSA-18-352-03 Access Bypass Vulnerability | BID | www.securityfocus.com | Third Party Advisory, VDB Entry |
| 3S-Smart Software Solutions GmbH CODESYS Control V3 Products | CISA | MISC | ics-cert.us-cert.gov | Third Party Advisory, US Government Resource |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 590718 3S-Smart Software Solutions GmbH CODESYS Control V3 Products Vulnerability (ICSA-18-352-03)