Client-side JavaScript controls may be bypassed to change user credentials and permissions without authentication, including a “root” user level meant only for the vendor. Web server root level access allows for changing of safety critical parameters.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-34393 Client-side JavaScript controls may be bypassed to change user credentials and permissions without authentication, including a “root” user level meant only for the vendor. Web server root level access allows for changing of safety critical parameters.
Fixes

Solution

Secheron recommends updating its software to the latest version: SEPCOS Single Package firmware (1.23.xx feature level): Update to 1.23.22 or higher version SEPCOS Single Package firmware (1.24.xx feature level): Update to 1.24.8 or higher version SEPCOS Single Package firmware (1.25.xx feature level): Update to 1.25.3 or higher version


Workaround

Additional workarounds are suggested to help reduce the risk: Configure the network such that PLC communications are strictly limited to only the devices required to perform its functions. Limit remote access and close Ports 80 and 443 at the switch level. Only use approved devices to connect to the PLCs. Do not connect personal peripherals (USB sticks, hotspots) to approved devices. Check device logs during periodic maintenance for unauthorized changes or access.

History

Wed, 16 Apr 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-04-16T16:16:16.151Z

Reserved: 2022-06-16T00:00:00.000Z

Link: CVE-2022-2105

cve-icon Vulnrichment

Updated: 2024-08-03T00:24:44.189Z

cve-icon NVD

Status : Modified

Published: 2022-06-24T15:15:10.630

Modified: 2024-11-21T07:00:19.710

Link: CVE-2022-2105

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.