Vulnerability CVE-2015-4051


Published: 2015-06-08

Description:
Beckhoff IPC Diagnostics before 1.8 does not properly restrict access to functions in /config, which allows remote attackers to cause a denial of service (reboot or shutdown), create arbitrary users, or possibly have unspecified other impact via a crafted request, as demonstrated by a beckhoff.com:service:cxconfig:1#Write SOAP action to /upnpisapi.

See advisories in our WLB2 database:
Topic
Author
Date
High
Beckhoff IPC diagnostics < 1.8 : Authentication bypass
Frank Lycops
05.06.2015
High
Beckhoff CX9020 CPU Module Web Exploit (RCE)
Photubias
23.10.2015
High
Beckoff CX9020 CPU Model Remote Code Execution
Photubias
24.10.2015

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:P/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
9/10
8.5/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Complete
Affected software
Beckhoff -> Ipc diagnostics 

 References:
http://ftp.beckhoff.com/download/document/IndustPC/Advisory-2015-001.pdf
http://packetstormsecurity.com/files/132168/Beckhoff-IPC-Diagnositcs-Authentication-Bypass.html
http://packetstormsecurity.com/files/134071/Beckoff-CX9020-CPU-Model-Remote-Code-Execution.html
http://seclists.org/fulldisclosure/2015/Jun/10
http://www.securityfocus.com/bid/75042
http://www.thesecurityfactory.be/permalink/beckhoff-authentication-bypass.html

Copyright 2024, cxsecurity.com

 

Back to Top