Client-side JavaScript controls may be bypassed by directly running a JS function to reboot the PLC (e.g., from the browser console) or by loading the corresponding, browser accessible PHP script
Advisories
Source ID Title
EUVD EUVD EUVD-2022-24953 Client-side JavaScript controls may be bypassed by directly running a JS function to reboot the PLC (e.g., from the browser console) or by loading the corresponding, browser accessible PHP script
Fixes

Solution

Secheron recommends updating its software to the latest version: SEPCOS Single Package firmware (1.23.xx feature level): Update to 1.23.22 or higher version SEPCOS Single Package firmware (1.24.xx feature level): Update to 1.24.8 or higher version SEPCOS Single Package firmware (1.25.xx feature level): Update to 1.25.3 or higher version


Workaround

Additional workarounds are suggested to help reduce the risk: Configure the network such that PLC communications are strictly limited to only the devices required to perform its functions. Limit remote access and close Ports 80 and 443 at the switch level. Only use approved devices to connect to the PLCs. Do not connect personal peripherals (USB sticks, hotspots) to approved devices. Check device logs during periodic maintenance for unauthorized changes or access.

History

Wed, 16 Apr 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-04-16T16:16:23.607Z

Reserved: 2022-05-10T00:00:00.000Z

Link: CVE-2022-1667

cve-icon Vulnrichment

Updated: 2024-08-03T00:10:03.859Z

cve-icon NVD

Status : Modified

Published: 2022-06-24T15:15:09.557

Modified: 2024-11-21T06:41:12.887

Link: CVE-2022-1667

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.