GE Fanuc iFIX 5.0 and earlier relies on client-side authentication involving a weakly encrypted local password file, which allows remote attackers to bypass intended access restrictions and start privileged server login sessions by recovering a password or by using a modified program module.
Weaknesses in this category are related to the management of credentials.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/33739 | vdb entry |
http://www.kb.cert.org/vuls/id/310355 | third party advisory us government resource |
http://www.mcgrewsecurity.com/2009/02/10/ge-fanuc-releases-info-on-ifix-vulnerabilities-vu-310355/ | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/48691 | vdb entry |
http://support.gefanuc.com/support/index?page=kbchannel&id=S:KB13253&actp=search | vendor advisory |