First published: Fri Feb 13 2009(Updated: )
GE Fanuc iFIX 5.0 and earlier relies on client-side authentication involving a weakly encrypted local password file, which allows remote attackers to bypass intended access restrictions and start privileged server login sessions by recovering a password or by using a modified program module.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
GE Digital Proficy iFIX 2022 | <=5.0 | |
GE Digital Proficy iFIX 2022 | =2.0 | |
GE Digital Proficy iFIX 2022 | =2.2 | |
GE Digital Proficy iFIX 2022 | =2.5 | |
GE Digital Proficy iFIX 2022 | =2.6 | |
GE Digital Proficy iFIX 2022 | =2.21 | |
GE Digital Proficy iFIX 2022 | =3.0 | |
GE Digital Proficy iFIX 2022 | =3.5 | |
GE Digital Proficy iFIX 2022 | =4.0 | |
GE Digital Proficy iFIX 2022 | =4.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0216 is considered a high severity vulnerability due to its potential for remote exploitation.
To fix CVE-2009-0216, ensure that you update to the latest version of GE Fanuc iFIX that does not rely on weakly encrypted passwords.
CVE-2009-0216 affects GE Fanuc iFIX versions up to and including 5.0.
CVE-2009-0216 is a security vulnerability that involves weak client-side authentication mechanisms.
CVE-2009-0216 can be exploited by remote attackers who can recover or bypass the authentication due to weak encryption.