The web server in Phoenix Contact ILC PLCs can be accessed without authenticating even if the authentication mechanism is enabled.
This weakness has been deprecated because it covered redundant concepts already described in CWE-287.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Link | Tags |
---|---|
https://ics-cert.us-cert.gov/advisories/ICSA-313-01 | third party advisory us government resource |
https://www.exploit-db.com/exploits/45590/ | exploit |
http://www.securityfocus.com/bid/94163 | third party advisory vdb entry |