CVE-2018-19009
Published on: 01/25/2019 12:00:00 AM UTC
Last Modified on: 03/23/2021 11:24:39 PM UTC
Certain versions of Pnozmulti Configurator from Pilz contain the following vulnerability:
Pilz PNOZmulti Configurator prior to version 10.9 allows an authenticated attacker with local access to the system containing the PNOZmulti Configurator software to view sensitive credential data in clear-text. This sensitive data is applicable to only the PMI m107 diag HMI device. An attacker with access to this sensitive data and physical access to the PMI m107 diag can modify data on the HMI device.
- CVE-2018-19009 has been assigned by
[email protected] to track the vulnerability - currently rated as HIGH severity.
- Affected Vendor/Software:
Pilz - Pilz PNOZmulti Configurator version All versions prior to version 10.9
CVSS3 Score: 7.8 - HIGH
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
LOCAL | LOW | LOW | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | HIGH | HIGH | HIGH |
CVSS2 Score: 2.1 - LOW
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
LOCAL | LOW | NONE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
PARTIAL | NONE | NONE |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
Pilz PNOZmulti Configurator | CISA | Third Party Advisory US Government Resource ics-cert.us-cert.gov text/html |
![]() |
Pilz PNOZmulti Configurator CVE-2018-19009 Local Information Disclosure Vulnerability | Third Party Advisory VDB Entry cve.report (archive) text/html |
![]() |
There are currently no QIDs associated with this CVE
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Application | Pilz | Pnozmulti Configurator | All | All | All | All |
Application | Pilz | Pnozmulti Configurator | All | All | All | All |
- cpe:2.3:a:pilz:pnozmulti_configurator:*:*:*:*:*:*:*:*:
- cpe:2.3:a:pilz:pnozmulti_configurator:*:*:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE