SB2024060713 - Multiple vulnerabilities in Emerson PACSystem and Fanuc
Published: June 7, 2024
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 4 secuirty vulnerabilities.
1) Cleartext transmission of sensitive information (CVE-ID: CVE-2022-30263)
The vulnerability allows a local attacker to compromise the target system.
The vulnerability exists due to software uses insecure communication channel to transmit sensitive information. An attacker with physical access can intercept and modify an active connection to gain access to sensitive data.
2) Download of code without integrity check (CVE-ID: CVE-2022-30265)
The vulnerability allows a local user to compromise the affected system
The vulnerability exists due to the control logic downloaded to the PLC is not cryptographically authenticated. A local administrator can gain access to the the target system.
3) Insufficient verification of data authenticity (CVE-ID: CVE-2022-30268)
The vulnerability allows a local attacker to compromise the target system.
The vulnerability exists due to insufficient verification of data authenticity in the Winloader utility. An authenticated attacker can push malicious firmware images to the controller and execute arbitrary code on the target system.
4) Insufficiently protected credentials (CVE-ID: CVE-2022-30266)
The vulnerability allows a local attacker to gain access to sensitive information.
The vulnerability exists due to the affected product uses a simple hashing scheme by client-side JavaScript. An attacker with physical access can gain access to sensitive information on the system.
Remediation
Cybersecurity Help is not aware of any official remediation provided by the vendor.