A vulnerability has been identified in Desigo DXR2 (All versions < V01.21.142.5-22), Desigo PXC3 (All versions < V01.21.142.4-18), Desigo PXC4 (All versions < V02.20.142.10-10884), Desigo PXC5 (All versions < V02.20.142.10-10884). The web application stores the PBKDF2 derived key of users passwords with a low iteration count. An attacker with user profile access privilege can retrieve the stored password hashes of other accounts and then successfully perform an offline cracking attack and recover the plaintext passwords of other users.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-626968.pdf | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
History
No history.
Information
Published : 2022-05-10 11:15
Updated : 2022-10-06 02:49
NVD link : CVE-2022-24041
Mitre link : CVE-2022-24041
CVE.ORG link : CVE-2022-24041
JSON object : View
Products Affected
siemens
- desigo_pxc5_firmware
- desigo_dxr2_firmware
- desigo_pxc5
- desigo_pxc4
- desigo_dxr2
- desigo_pxc3
- desigo_pxc3_firmware
- desigo_pxc4_firmware
CWE
CWE-916
Use of Password Hash With Insufficient Computational Effort