CVE-2020-25229
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (All versions < V8.3). The implemented encryption for communication with affected devices is prone to replay attacks due to the usage of a static key. An attacker could change the password or change the configuration on any affected device if using prepared messages that were generated for another device.
Se ha identificado una vulnerabilidad en LOGO! 8 BM (incluyendo variantes SIPLUS) (Todas las versiones anteriores a V8.3). El cifrado implementado para la comunicación con los dispositivos afectados es propenso a reproducir ataques debido al uso de una clave estática. Un atacante podría cambiar la contraseña o cambiar la configuración en cualquier dispositivo afectado si usa mensajes preparados que se generaron para otro dispositivo
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-09-10 CVE Reserved
- 2020-12-14 CVE Published
- 2023-08-30 EPSS Updated
- 2024-08-04 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-321: Use of Hard-coded Cryptographic Key
- CWE-798: Use of Hard-coded Credentials
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-480824.pdf | 2022-04-25 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Siemens Search vendor "Siemens" | Logo\! 8 Bm Firmware Search vendor "Siemens" for product "Logo\! 8 Bm Firmware" | < 8.3 Search vendor "Siemens" for product "Logo\! 8 Bm Firmware" and version " < 8.3" | - |
Affected
| in | Siemens Search vendor "Siemens" | Logo\! 8 Bm Search vendor "Siemens" for product "Logo\! 8 Bm" | - | - |
Safe
|