A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (All versions < V8.3), LOGO! Soft Comfort (All versions < V8.3). The LOGO! program files generated and used by the affected components offer the possibility to save user-defined functions (UDF) in a password protected way. This protection is implemented in the software that displays the information. An attacker could reverse engineer the UDFs directly from stored program files.
Advisories
Source ID Title
EUVD EUVD EUVD-2020-17924 A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (All versions < V8.3), LOGO! Soft Comfort (All versions < V8.3). The LOGO! program files generated and used by the affected components offer the possibility to save user-defined functions (UDF) in a password protected way. This protection is implemented in the software that displays the information. An attacker could reverse engineer the UDFs directly from stored program files.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: siemens

Published:

Updated: 2024-08-04T15:33:05.332Z

Reserved: 2020-09-10T00:00:00

Link: CVE-2020-25234

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-12-14T21:15:20.130

Modified: 2024-11-21T05:17:43.450

Link: CVE-2020-25234

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.