A vulnerability has been identified in SIMATIC IPC1047 (All versions), SIMATIC IPC1047E (All versions with maxView Storage Manager < 4.09.00.25611 on Windows), SIMATIC IPC647D (All versions), SIMATIC IPC647E (All versions with maxView Storage Manager < 4.09.00.25611 on Windows), SIMATIC IPC847D (All versions), SIMATIC IPC847E (All versions with maxView Storage Manager < 4.09.00.25611 on Windows). The Adaptec Maxview application on affected devices is using a non-unique TLS certificate across installations to protect the communication from the local browser to the local application.
A local attacker may use this key to decrypt intercepted local traffic between the browser and the application and could perform a man-in-the-middle attack in order to modify data in transit.

Project Subscriptions

Vendors Products
Microchip Subscribe
Maxview Storage Manager Subscribe
Siemens Subscribe
Simatic Ipc1047 Subscribe
Simatic Ipc1047 Firmware Subscribe
Simatic Ipc1047e Subscribe
Simatic Ipc647d Subscribe
Simatic Ipc647d Firmware Subscribe
Simatic Ipc647e Subscribe
Simatic Ipc847d Subscribe
Simatic Ipc847d Firmware Subscribe
Simatic Ipc847e Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2023-27688 A vulnerability has been identified in SIMATIC IPC1047 (All versions), SIMATIC IPC1047E (All versions with maxView Storage Manager < 4.09.00.25611 on Windows), SIMATIC IPC647D (All versions), SIMATIC IPC647E (All versions with maxView Storage Manager < 4.09.00.25611 on Windows), SIMATIC IPC847D (All versions), SIMATIC IPC847E (All versions with maxView Storage Manager < 4.09.00.25611 on Windows). The Adaptec Maxview application on affected devices is using a non-unique TLS certificate across installations to protect the communication from the local browser to the local application. A local attacker may use this key to decrypt intercepted local traffic between the browser and the application and could perform a man-in-the-middle attack in order to modify data in transit.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 15 Oct 2024 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: siemens

Published:

Updated: 2024-10-15T17:12:13.841Z

Reserved: 2023-01-13T14:55:01.563Z

Link: CVE-2023-23588

cve-icon Vulnrichment

Updated: 2024-08-02T10:35:33.386Z

cve-icon NVD

Status : Modified

Published: 2023-04-11T10:15:18.097

Modified: 2024-11-21T07:46:29.217

Link: CVE-2023-23588

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses