First published: Fri Jun 10 2016(Updated: )
ABB PCM600 before 2.7 uses an improper hash algorithm for the main application password, which makes it easier for local users to obtain sensitive cleartext information by leveraging read access to the ACTConfig configuration file.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
ABB PCM600 | <=2.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-4511 has a medium severity level due to the improper hash algorithm used for the application password.
CVE-2016-4511 allows local users to obtain sensitive cleartext information by accessing the ACTConfig configuration file.
CVE-2016-4511 affects ABB PCM600 versions prior to 2.7, including all versions up to and including 2.6.
To fix CVE-2016-4511, upgrade ABB PCM600 to version 2.7 or later, which uses a secure hash algorithm.
Yes, read access to the ACTConfig file can potentially expose sensitive information due to the vulnerability in CVE-2016-4511.