Predictable Salt Vulnerability in Modicon M221 Product by Schneider Electric
CVE-2020-28214
5.5MEDIUM
Summary
A vulnerability has been identified in the Modicon M221 product by Schneider Electric, stemming from the use of a predictable salt in its one-way hash implementation. This weakness facilitates attackers in pre-computing hash values through dictionary attack methods, such as rainbow tables. As a result, the effectiveness of the hash’s unpredictability is compromised, making the system susceptible to unauthorized access and data breaches.
Affected Version(s)
Modicon M221 (all references, all ) Modicon M221 (all references, all versions)
References
CVSS V3.1
Score:
5.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved