cve/2023/CVE-2023-43776.md

20 lines
889 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-43776](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43776)
![](https://img.shields.io/static/v1?label=Product&message=easyE4&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-261%20Weak%20Encoding%20for%20Password&color=brighgreen)
### Description
Eaton easyE4 PLC offers a device password protection functionality to facilitate a secure connection and prevent unauthorized access. It was observed that the device password was stored with a weak encoding algorithm in the easyE4 program file when exported to SD card (*.PRG file ending).
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/SySS-Research/easy-password-recovery
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/nomi-sec/PoC-in-GitHub