Back to overview

Lenze: Vulnerability in the OPC-UA authentification connection in the firmware

VDE-2022-030
Last update
07/11/2022 12:00
Published at
07/11/2022 12:00
Vendor(s)
Lenze SE
External ID
VDE-2022-030
CSAF Document

Summary

The machine controller of the cabinet series include an OPC-UA server which uses an user management to authenticate clients via anonymous or user/password authentication. If the user/password authentication is selected, password verification is skipped upon second login. As a result, cases occur in which users can establish communication without correct authentication. This vulnerability is not located in the OPC-UA protocol or server, but in the interface to the products firmware.

This Security Advisory is only relevant for the following use cases:

• the user management has been activated on the machine controller (is deactivated by default)

• the OPC-UA Server is used

• Data are transferred via a symbol configuration (is not available by default)

Impact

The exploitation of the missing critical step in authentication may result in unauthorized use of the OPC-UA interface.

Affected Product(s)

Model no. Product name Affected versions
cabinet c520 Firmware V01.07.00.2757<V01.08.01.3021
cabinet c550 Firmware V01.07.00.2757<V01.08.01.3021
cabinet c750 Firmware V01.07.00.2757<V01.08.01.3021

Vulnerabilities

Expand / Collapse all

Published
09/22/2025 14:57
Weakness
Improper Authentication (CWE-287)
Summary

Multiple Lenze products of the cabinet series skip the password verification upon second login. After a user has been logged on to the device once, a remote attacker can get full access without knowledge of the password.

References

Mitigation

As part of a security strategy, Lenze SE recommends the following general defense measures to reduce the risk of exploits:

• Only use the products in a protected and controlled environment to minimize network impact and to ensure that they are inaccessible from outside.

• Use external firewalls to protect the automation system network and to separate it from other networks. Remark: One Measure should be to block port 4840 via the external firewall and open this port for authenticated access only.

• Use Virtual Private Networks (VPN) tunnels when remote access is required.

• Use IDS (Intrusion Detection Systems) where possible to detect anomalies in the network.

• Activate and use user administration and password functions.

• Use encrypted communication links.

• Restrict access to both the development tools and their projects and the products of the automation system by physical means, operating system functions, etc.

• Protect the development tool by using the latest virus detection solutions.

• Use of certificate-based communication via the message security modes Sign or Sign&Encrypt and trust of the corresponding client certificates on the machine controller by the OPC-UA server. This can reduce the risk of exploiting this vulnerability.

Remediation

Install version V01.08.01.3021, which solves the identified security vulnerability.

Revision History

Version Date Summary
1 07/11/2022 12:00 Initial revision.