Article No° | Product Name | Affected Version(s) |
---|---|---|
Smart PLC AC14xx Firmware | <= V4.3.17 | |
Smart PLC AC4xxS Firmware | <= V4.3.17 |
In ifm Smart PLC firmware up to version 4.3.17 for Smart PLC controllers AC14xx and AC4xxS, an attacker can access the configuration by using the hardcoded credentials. The endpoint hosts a scripts capable of executing various commands.
An unauthenticated remote attacker can use the hard-coded credentials to access the SmartSPS devices with high privileges.
An high privileged remote attacker can enable telnet access that accepts hardcoded credentials.
A remote attacker with high privileges may use a deleting file function to inject OS commands.
A remote attacker with high privileges may use a writing file function to inject OS commands.
A remote attacker with high privileges may use a reading file function to inject OS commands.
Please see the CVE description.
Mitigation
When using automation components, make sure that no unauthorized access can take place. Addition measures should be taken to ensure that the components do not have direct access to Internet resources and that they cannot be accessed from insecure networks. Use available security measures such as authentication and authorization groups.
Remediation
Update to Firmware Version 6.1.8 or later.
CERT@VDE coordinated with ifm
The vulnerability was reported by Logan Carpenter from Dragos.