CVE-2022-2758
high-risk
Published 2022-08-31
Passwords are not adequately encrypted during the communication process between all versions of LS Industrial Systems (LSIS) Co. Ltd LS Electric XG5000 software prior to V4.0 and LS Electric PLCs: all versions of XGK-CPUU/H/A/S/E prior to V3.50, all versions of XGI-CPUU/UD/H/S/E prior to V3.20, all versions of XGR-CPUH prior to V1.80, all versions of XGB-XBMS prior to V3.00, all versions of XGB-XBCH prior to V1.90, and all versions of XGB-XECH prior to V1.30. This would allow an attacker to identify and decrypt the password of the affected PLCs by sniffing the PLC’s communication traffic.
Do I need to act?
-
0.12% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
6
CVSS 6.5/10
Medium
NETWORK
/ LOW complexity
Affected Products (20)
Xg5000
Xgk-Cpuun Firmware
Xgk-Cpuhn Firmware
Xgk-Cpusn Firmware
Xgk-Cpuu Firmware
Xgk-Cpuh Firmware
Xgk-Cpua Firmware
Xgk-Cpus Firmware
Xgk-Cpue Firmware
Xgi-Cpuun Firmware
Xgi-Cpuu Firmware
Xgi-Cpuh Firmware
Xgi-Cpus Firmware
Xgi-Cpue Firmware
Xgr-Cpuh\/F Firmware
Xgr-Cpuh\/T Firmware
Xgr-Cpuh\/S Firmware
Xgi-D21A Firmware
Xgi-D22A Firmware
Xgi-D22B Firmware
Affected Vendors
References (2)
Third Party Advisory
https://www.cisa.gov/uscert/ics/advisories/icsa-22-228-02
Third Party Advisory
https://www.cisa.gov/uscert/ics/advisories/icsa-22-228-02
57
/ 100
high-risk
Severity
24/34 · High
Exploitability
0/34 · Minimal
Exposure
33/34 · Critical