#VU83227 Cleartext transmission of sensitive information in Siemens COMOS - CVE-2023-43503


Vulnerability identifier: #VU83227

Vulnerability risk: Low

CVSSv4.0: 1.2 [CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-43503

CWE-ID: CWE-319

Exploitation vector: Local network

Exploit availability: No

Vulnerable software:
Siemens COMOS
Other software / Other software solutions

Vendor: Siemens

Description

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to software uses insecure communication channel to transmit sensitive information via UDP. A remote user with ability to intercept network traffic can gain access to sensitive data.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Siemens COMOS: before 10.4.4


External links
https://cert-portal.siemens.com/productcert/txt/ssa-137900.txt


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability