cve/2020/CVE-2020-25236.md

33 lines
2.7 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2020-25236](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25236)
![](https://img.shields.io/static/v1?label=Product&message=LOGO!%2012%2F24RCE&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=LOGO!%2012%2F24RCEo&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=LOGO!%20230RCE&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=LOGO!%20230RCEo&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=LOGO!%2024CE&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=LOGO!%2024CEo&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=LOGO!%2024RCE&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=LOGO!%2024RCEo&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SIPLUS%20LOGO!%2012%2F24RCE&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SIPLUS%20LOGO!%2012%2F24RCEo&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SIPLUS%20LOGO!%20230RCE&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SIPLUS%20LOGO!%20230RCEo&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SIPLUS%20LOGO!%2024CE&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SIPLUS%20LOGO!%2024CEo&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SIPLUS%20LOGO!%2024RCE&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SIPLUS%20LOGO!%2024RCEo&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20All%20versions%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-755%3A%20Improper%20Handling%20of%20Exceptional%20Conditions&color=brighgreen)
### Description
A vulnerability has been identified in LOGO! 12/24RCE (All versions), LOGO! 12/24RCEo (All versions), LOGO! 230RCE (All versions), LOGO! 230RCEo (All versions), LOGO! 24CE (All versions), LOGO! 24CEo (All versions), LOGO! 24RCE (All versions), LOGO! 24RCEo (All versions), SIPLUS LOGO! 12/24RCE (All versions), SIPLUS LOGO! 12/24RCEo (All versions), SIPLUS LOGO! 230RCE (All versions), SIPLUS LOGO! 230RCEo (All versions), SIPLUS LOGO! 24CE (All versions), SIPLUS LOGO! 24CEo (All versions), SIPLUS LOGO! 24RCE (All versions), SIPLUS LOGO! 24RCEo (All versions). The control logic (CL) the LOGO! 8 executes could be manipulated in a way that could cause the deviceexecuting the CL to improperly handle the manipulation and crash. After successful execution of the attack, the device needs to be manually reset.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds