CVE-2020-12069
high-risk
Published 2022-12-26
In CODESYS V3 products in all versions prior V3.5.16.0 containing the CmpUserMgr, the CODESYS Control runtime system stores the online communication passwords using a weak hashing algorithm. This can be used by a local attacker with low privileges to gain full control of the device.
Do I need to act?
-
0.08% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.8/10
High
LOCAL
/ LOW complexity
Affected Products (20)
Pmc
Control For Beaglebone
Control For Empc-A\/Imx6
Control For Iot2000
Control For Linux
Control For Pfc100
Control For Pfc200
Control For Plcnext
Control For Raspberry Pi
Control Rte V3
Control V3 Runtime System Toolkit
Control Win V3
Hmi V3
V3 Simulation Runtime
Controller Cecc-D Firmware
Controller Cecc-D Firmware
Controller Cecc-Lk Firmware
Controller Cecc-Lk Firmware
Controller Cecc-S Firmware
Controller Cecc-S Firmware
References (8)
Third Party Advisory
https://cert.vde.com/en/advisories/VDE-2021-061/
Third Party Advisory
https://cert.vde.com/en/advisories/VDE-2022-022/
Third Party Advisory
https://cert.vde.com/en/advisories/VDE-2022-031/
Third Party Advisory
https://cert.vde.com/en/advisories/VDE-2021-061/
Third Party Advisory
https://cert.vde.com/en/advisories/VDE-2022-022/
Third Party Advisory
https://cert.vde.com/en/advisories/VDE-2022-031/
51
/ 100
high-risk
Severity
24/34 · High
Exploitability
0/34 · Minimal
Exposure
27/34 · High