Advisory Details

March 28th, 2024

Softing edgeConnector Siemens Cleartext Transmission of Credentials Authentication Bypass Vulnerability

ZDI-24-353
ZDI-CAN-20492

CVE ID CVE-2024-0860
CVSS SCORE 8.0, AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AFFECTED VENDORS Softing
AFFECTED PRODUCTS edgeConnector Siemens
VULNERABILITY DETAILS

This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of Softing edgeConnector Siemens. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the web console, which listens on TCP port 8099 by default. HTTP traffic to this port contains unprotected credentials. An attacker can leverage this vulnerability to bypass authentication on the system.

ADDITIONAL DETAILS Softing has issued an update to correct this vulnerability. More details can be found at:
https://www.cisa.gov/news-events/ics-advisories/icsa-24-074-13
DISCLOSURE TIMELINE
  • 2023-05-30 - Vulnerability reported to vendor
  • 2024-03-28 - Coordinated public release of advisory
  • 2024-07-01 - Advisory Updated
CREDIT Pan ZhenPeng (@Peterpan0927) & Li JianTao (@CurseRed) of STAR Labs SG Pte. Ltd. (@starlabs_sg)
BACK TO ADVISORIES