Description
A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (All versions < V8.3), LOGO! Soft Comfort (All versions < V8.3). The LOGO! program files generated and used by the affected components offer the possibility to save user-defined functions (UDF) in a password protected way. This protection is implemented in the software that displays the information. An attacker could reverse engineer the UDFs directly from stored program files.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-17924 | A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (All versions < V8.3), LOGO! Soft Comfort (All versions < V8.3). The LOGO! program files generated and used by the affected components offer the possibility to save user-defined functions (UDF) in a password protected way. This protection is implemented in the software that displays the information. An attacker could reverse engineer the UDFs directly from stored program files. |
References
History
No history.
Status: PUBLISHED
Assigner: siemens
Published:
Updated: 2024-08-04T15:33:05.332Z
Reserved: 2020-09-10T00:00:00.000Z
Link: CVE-2020-25234
No data.
Status : Modified
Published: 2020-12-14T21:15:20.130
Modified: 2024-11-21T05:17:43.450
Link: CVE-2020-25234
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD