SB2024060713 - Multiple vulnerabilities in Emerson PACSystem and Fanuc



SB2024060713 - Multiple vulnerabilities in Emerson PACSystem and Fanuc

Published: June 7, 2024

Security Bulletin ID SB2024060713
Severity
Low
Patch available
NO
Number of vulnerabilities 4
Exploitation vector Physical access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Cleartext transmission of sensitive information (CVE-ID: CVE-2022-30263)

The vulnerability allows a local attacker to compromise the target system.

The vulnerability exists due to software uses insecure communication channel to transmit sensitive information. An attacker with physical access can intercept and modify an active connection to gain access to sensitive data.


2) Download of code without integrity check (CVE-ID: CVE-2022-30265)

The vulnerability allows a local user to compromise the affected system

The vulnerability exists due to the control logic downloaded to the PLC is not cryptographically authenticated. A local administrator can gain access to the the target system.


3) Insufficient verification of data authenticity (CVE-ID: CVE-2022-30268)

The vulnerability allows a local attacker to compromise the target system.

The vulnerability exists due to insufficient verification of data authenticity in the Winloader utility. An authenticated attacker can push malicious firmware images to the controller and execute arbitrary code on the target system.


4) Insufficiently protected credentials (CVE-ID: CVE-2022-30266)

The vulnerability allows a local attacker to gain access to sensitive information.

The vulnerability exists due to the affected product uses a simple hashing scheme by client-side JavaScript. An attacker with physical access can gain access to sensitive information on the system.


Remediation

Cybersecurity Help is not aware of any official remediation provided by the vendor.