{ "id": "CVE-2018-20025", "sourceIdentifier": "vulnerability@kaspersky.com", "published": "2019-02-19T21:29:00.243", "lastModified": "2019-04-02T15:29:00.323", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "Use of Insufficiently Random Values exists in CODESYS V3 products versions prior V3.5.14.0." }, { "lang": "es", "value": "Existen valores aleatorios utilizados de manera insuficiente en los productos de CODESYS, en sus versiones V3 anteriores a la V3.5.14.0." } ], "metrics": { "cvssMetricV30": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.0", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0 }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-330" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:*", "versionStartIncluding": "3.0", "versionEndExcluding": "3.5.14.0", "matchCriteriaId": "30E5A50D-470A-4C7D-A634-E97AE95B38B5" }, { "vulnerable": true, "criteria": "cpe:2.3:a:codesys:control_for_empc-a\\/imx6_sl:*:*:*:*:*:*:*:*", "versionStartIncluding": "3.0", "versionEndExcluding": "3.5.14.0", "matchCriteriaId": "455BEF47-4D2A-4314-AF1D-C5C46236B135" }, { "vulnerable": true, "criteria": "cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:*", "versionStartIncluding": "3.0", "versionEndExcluding": "3.5.14.0", "matchCriteriaId": "D2E52640-4AA9-40C1-A00E-374334F761C7" }, { "vulnerable": true, "criteria": "cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:*", "versionStartIncluding": "3.0", "versionEndExcluding": "3.5.14.0", "matchCriteriaId": "C87347FA-38EA-4299-A822-63FCF0E34577" }, { "vulnerable": true, "criteria": "cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:*", "versionStartIncluding": "3.0", "versionEndExcluding": "3.5.14.0", "matchCriteriaId": "8D3E05BC-83BC-49C8-91AD-64A1EE9D36BD" }, { "vulnerable": true, "criteria": "cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:*", "versionStartIncluding": "3.0", "versionEndExcluding": "3.5.14.0", "matchCriteriaId": "40D2875A-E1DF-4C7D-9DD7-7BE8D617EF3C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:*", "versionStartIncluding": "3.0", "versionEndExcluding": "3.5.14.0", "matchCriteriaId": "EE9699B0-CCE3-42AB-8208-492382D59582" }, { "vulnerable": true, "criteria": "cpe:2.3:a:codesys:control_rte_sl:*:*:*:*:*:*:*:*", "versionStartIncluding": "3.0", "versionEndExcluding": "3.5.14.0", "matchCriteriaId": "20CFD36A-208D-444C-A3C3-C2B11CAF65AC" }, { "vulnerable": true, "criteria": "cpe:2.3:a:codesys:control_rte_sl_\\(for_beckhoff_cx\\):*:*:*:*:*:*:*:*", "versionStartIncluding": "3.0", "versionEndExcluding": "3.5.14.0", "matchCriteriaId": "6368AFD2-D0F4-4E93-9D28-00D2DAF6F1BD" }, { "vulnerable": true, "criteria": "cpe:2.3:a:codesys:control_runtime_toolkit:*:*:*:*:*:*:*:*", "versionStartIncluding": "3.0", "versionEndExcluding": "3.5.14.0", "matchCriteriaId": "1E623E98-8040-43D2-81B5-D6B06B374472" }, { "vulnerable": true, "criteria": "cpe:2.3:a:codesys:control_win_sl:*:*:*:*:*:*:*:*", "versionStartIncluding": "3.0", "versionEndExcluding": "3.5.14.0", "matchCriteriaId": "AA6D880C-195D-4830-B0B5-7D7BC32182B4" }, { "vulnerable": true, "criteria": "cpe:2.3:a:codesys:development_system:*:*:*:*:*:*:*:*", "versionStartIncluding": "3.0", "versionEndExcluding": "3.5.14.0", "matchCriteriaId": "087FE9CF-7492-416A-9585-0E8C00ABB320" }, { "vulnerable": true, "criteria": "cpe:2.3:a:codesys:gateway:*:*:*:*:*:*:*:*", "versionStartIncluding": "3.0", "versionEndExcluding": "3.5.14.0", "matchCriteriaId": "498AB0A1-C9F2-40A5-BC72-9CC4F96D74DE" }, { "vulnerable": true, "criteria": "cpe:2.3:a:codesys:hmi_sl:*:*:*:*:*:*:*:*", "versionStartIncluding": "3.0", "versionEndExcluding": "3.5.14.0", "matchCriteriaId": "63F51840-0A93-43BD-B8D0-145C7C52C7B0" }, { "vulnerable": true, "criteria": "cpe:2.3:a:codesys:safety_sil2:*:*:*:*:*:*:*:*", "versionStartIncluding": "3.0", "versionEndExcluding": "3.5.14.0", "matchCriteriaId": "6C0A629A-E3CE-428A-81C1-25965A681B73" } ] } ] } ], "references": [ { "url": "http://www.securityfocus.com/bid/106251", "source": "vulnerability@kaspersky.com", "tags": [ "Third Party Advisory", "VDB Entry" ] }, { "url": "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-037-codesys-control-v3-use-of-insufficiently-random-values/", "source": "vulnerability@kaspersky.com", "tags": [ "Mitigation", "Third Party Advisory" ] }, { "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-352-04", "source": "vulnerability@kaspersky.com" } ] }