An attacker with weak credentials could access the TCP port via an open FTP port, allowing an attacker to read sensitive files and write to remotely executable directories.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-34391 An attacker with weak credentials could access the TCP port via an open FTP port, allowing an attacker to read sensitive files and write to remotely executable directories.
Fixes

Solution

Secheron recommends updating its software to the latest version: SEPCOS Single Package firmware (1.23.xx feature level): Update to 1.23.22 or higher version SEPCOS Single Package firmware (1.24.xx feature level): Update to 1.24.8 or higher version SEPCOS Single Package firmware (1.25.xx feature level): Update to 1.25.3 or higher version


Workaround

Additional workarounds are suggested to help reduce the risk: Configure the network such that PLC communications are strictly limited to only the devices required to perform its functions. Limit remote access and close Ports 80 and 443 at the switch level. Only use approved devices to connect to the PLCs. Do not connect personal peripherals (USB sticks, hotspots) to approved devices. Check device logs during periodic maintenance for unauthorized changes or access.

History

Wed, 16 Apr 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-04-16T16:16:38.589Z

Reserved: 2022-06-16T00:00:00.000Z

Link: CVE-2022-2103

cve-icon Vulnrichment

Updated: 2024-08-03T00:24:44.356Z

cve-icon NVD

Status : Modified

Published: 2022-06-24T15:15:10.510

Modified: 2024-11-21T07:00:19.470

Link: CVE-2022-2103

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.