CVE-2016-8366

Webvisit in Phoenix Contact ILC PLCs offers a password macro to protect HMI pages on the PLC against casual or coincidental opening of HMI pages by the user. The password macro can be configured in a way that the password is stored and transferred in clear text.
References
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:phoenixcontact:ilc_plcs_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:ilc_plcs:-:*:*:*:*:*:*:*

History

21 Nov 2024, 02:59

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/94163 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/94163 - Third Party Advisory, VDB Entry
References () https://ics-cert.us-cert.gov/advisories/ICSA-313-01 - Third Party Advisory, US Government Resource () https://ics-cert.us-cert.gov/advisories/ICSA-313-01 - Third Party Advisory, US Government Resource
References () https://www.exploit-db.com/exploits/45586/ - () https://www.exploit-db.com/exploits/45586/ -

Information

Published : 2018-04-05 16:29

Updated : 2024-11-21 02:59


NVD link : CVE-2016-8366

Mitre link : CVE-2016-8366

CVE.ORG link : CVE-2016-8366


JSON object : View

Products Affected

phoenixcontact

  • ilc_plcs
  • ilc_plcs_firmware
CWE
CWE-312

Cleartext Storage of Sensitive Information

CWE-255

Credentials Management Errors