A vulnerability has been identified in Desigo DXR2 (All versions < V01.21.142.5-22), Desigo PXC3 (All versions < V01.21.142.4-18), Desigo PXC4 (All versions < V02.20.142.10-10884), Desigo PXC5 (All versions < V02.20.142.10-10884). The web application stores the PBKDF2 derived key of users passwords with a low iteration count. An attacker with user profile access privilege can retrieve the stored password hashes of other accounts and then successfully perform an offline cracking attack and recover the plaintext passwords of other users.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-626968.pdf | Vendor Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-626968.pdf | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
History
21 Nov 2024, 06:49
Type | Values Removed | Values Added |
---|---|---|
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-626968.pdf - Vendor Advisory |
Information
Published : 2022-05-10 11:15
Updated : 2024-11-21 06:49
NVD link : CVE-2022-24041
Mitre link : CVE-2022-24041
CVE.ORG link : CVE-2022-24041
JSON object : View
Products Affected
siemens
- desigo_dxr2_firmware
- desigo_pxc5_firmware
- desigo_pxc4
- desigo_pxc3_firmware
- desigo_pxc5
- desigo_pxc3
- desigo_pxc4_firmware
- desigo_dxr2
CWE
CWE-916
Use of Password Hash With Insufficient Computational Effort