Back to overview

ifm: Vulnerabilities in ifm AC14 firmware

VDE-2024-012
Last update
08/27/2025 12:00
Published at
07/09/2024 09:00
Vendor(s)
ifm electronic GmbH
External ID
VDE-2024-012
CSAF Document

Summary

In ifm Smart PLC firmware up to version 4.3.17 for Smart PLC controllers AC14xx and AC4xxS, an attacker can access the configuration by using the hardcoded credentials. The endpoint hosts a scripts capable of executing various commands.

Impact

Please see the CVE description.

Affected Product(s)

Model no. Product name Affected versions
Smart PLC AC14xx Firmware Firmware <=V4.3.17
Smart PLC AC4xxS Firmware Firmware <=V4.3.17

Vulnerabilities

Expand / Collapse all

Published
09/22/2025 14:58
Weakness
Use of Hard-coded Credentials (CWE-798)
Summary

An unauthenticated remote attacker can use the hard-coded credentials to access the SmartSPS devices with high privileges.

References

Published
09/22/2025 14:58
Weakness
Use of Hard-coded Credentials (CWE-798)
Summary

An high privileged remote attacker can enable telnet access that accepts hardcoded credentials. 

References

Published
09/22/2025 14:58
Weakness
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') (CWE-78)
Summary

A remote attacker with high privileges may use a reading file function to inject OS commands.

References

Published
09/22/2025 14:58
Weakness
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') (CWE-78)
Summary

A remote attacker with high privileges may use a writing file function to inject OS commands.

References

Published
09/22/2025 14:58
Weakness
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') (CWE-78)
Summary

A remote attacker with high privileges may use a deleting file function to inject OS commands.

References

Mitigation

When using automation components, make sure that no unauthorized access can take place. Addition measures should be taken to ensure that the components do not have direct access to Internet resources and that they cannot be accessed from insecure networks. Use available security measures such as authentication and authorization groups.

Remediation

Update to Firmware Version 6.1.8 or later.

Revision History

Version Date Summary
1.0.0 07/09/2024 09:00 Initial revision.
1.1.0 08/27/2025 12:00 Update: CWE from CVE-2024-28751, Revision History