Advisory Details

August 23rd, 2022

(Pwn2Own) Softing Secure Integration Server Use of Default Credentials Authentication Bypass Vulnerability

ZDI-22-1161
ZDI-CAN-17056

CVE ID CVE-2022-2336
CVSS SCORE 9.8, AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AFFECTED VENDORS Softing
AFFECTED PRODUCTS Secure Integration Server
VULNERABILITY DETAILS

This vulnerability allows remote attackers to bypass authentication on affected installations of Softing Secure Integration Server. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the default configuration of user accounts. The configuration contains hard-coded credentials. An attacker can leverage this vulnerability to bypass authentication and execute arbitrary code in the context of the Administrator.

ADDITIONAL DETAILS Softing has issued an update to correct this vulnerability. More details can be found at:
https://industrial.softing.com/fileadmin/psirt/downloads/syt-2022-6.html
DISCLOSURE TIMELINE
  • 2022-05-09 - Vulnerability reported to vendor
  • 2022-08-23 - Coordinated public release of advisory
CREDIT Flashback Team: Pedro Ribeiro (@pedrib1337) && Radek Domanski (@RabbitPro)
BACK TO ADVISORIES