Softing Secure Integration Server V1.22 is vulnerable to authentication bypass via a machine-in-the-middle attack. The default the administration interface is accessible via plaintext HTTP protocol, facilitating the attack. The HTTP request may contain the session cookie in the request, which may be captured for use in authenticating to the server.
References
Link | Resource |
---|---|
https://industrial.softing.com/fileadmin/psirt/downloads/syt-2022-5.html | Mitigation Vendor Advisory |
https://www.cisa.gov/uscert/ics/advisories/icsa-22-228-04 | Mitigation Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2022-08-17 21:15
Updated : 2022-08-19 12:36
NVD link : CVE-2022-2338
Mitre link : CVE-2022-2338
CVE.ORG link : CVE-2022-2338
JSON object : View
Products Affected
softing
- uagates
- opc
- secure_integration_server
- edgeconnector
- edgeaggregator
- opc_ua_c\+\+_software_development_kit
CWE
CWE-319
Cleartext Transmission of Sensitive Information