Share: Email | Twitter

ID

VDE-2025-043

Published

2025-06-25 12:00 (CEST)

Last update

2025-06-23 14:27 (CEST)

Vendor(s)

Lenze SE

Product(s)

Article No° Product Name Affected Version(s)
PLC Designer V4 = 4.0.0

Summary

A security vulnerability was discovered in the PLC Designer V4 in the version 4.0.0 where the programmer of a Controller can set a password for the connected device. Here it is possible in an interface of the PLC Designer V4 for the programmer to enter a password for the Device. There is a special constellation where the password entered appears in plain text. Only the display in the tool is affected and not the management of the password on the device. This vulnerability of PLC Designer V4 only occurs in combination with the devices c430 controller, c520 controller and c550 controller and not in combination with other devices, as this functionality is only used here. It is generally recommended that all users update to 4.0.1, but especially all users who operate PLC Designer V4 in combination with the controllers mentioned.


Last Update:

23. Mai 2025 11:28

Weakness

Cleartext Storage of Sensitive Information  (CWE-312) 

Summary

A local, low-privileged attacker can learn the password of the connected controller in PLC Designer V4 due to an incorrect implementation that results in the password being displayed in plain text under special conditions.


Impact

This vulnerability may lead to unintended exposure of passwords in plain text within the PLC Designer V4 interface, potentially allowing unauthorized individuals with access to the engineering workstation to view sensitive credentials. The issue is limited to versions 4.0.0 used with c430, c520, and c550 controllers, and does not affect password handling on the device itself.

Solution

Mitigation

The PLC Designer V4 tool is designed and developed for use in closed and protected security zones. Lenze therefore strongly recommends that this tool is only used in familiar areas. As this security vulnerability relates to a plain text display of an entered password and not to the password method saved afterwards, it is recommended as mitigation to protect the viewing area of the tool from strangers when entering it in order to prevent the shoulder surfing attack method.

Remediation

This vulnerability has been fixed in the new version. All users are strongly recommended to use the new version 4.0.1.

General Recommendations

The cyber security documentation currently describes some of the implemented functions and is thus intended to provide clarity in the functions described here.

Reported by

CERT@VDE coordinated with Lenze SE