GE Fanuc iFIX 5.0 and earlier relies on client-side authentication involving a weakly encrypted local password file, which allows remote attackers to bypass intended access restrictions and start privileged server login sessions by recovering a password or by using a modified program module.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:59
Type | Values Removed | Values Added |
---|---|---|
References | () http://support.gefanuc.com/support/index?page=kbchannel&id=S:KB13253&actp=search - Vendor Advisory | |
References | () http://www.kb.cert.org/vuls/id/310355 - US Government Resource | |
References | () http://www.mcgrewsecurity.com/2009/02/10/ge-fanuc-releases-info-on-ifix-vulnerabilities-vu-310355/ - | |
References | () http://www.securityfocus.com/bid/33739 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/48691 - |
Information
Published : 2009-02-13 17:30
Updated : 2024-11-21 00:59
NVD link : CVE-2009-0216
Mitre link : CVE-2009-0216
CVE.ORG link : CVE-2009-0216
JSON object : View
Products Affected
ge_fanuc
- ifix
CWE
CWE-255
Credentials Management Errors