First published: Wed Jul 29 2020(Updated: )
Passwords are stored in plain text within the configuration of SICK Package Analytics software up to and including V04.1.1. An authorized attacker could access these stored plaintext credentials and gain access to the ftp service. Storing a password in plaintext allows attackers to easily gain access to systems, potentially compromising personal information or other sensitive information.
Credit: psirt@sick.de
Affected Software | Affected Version | How to fix |
---|---|---|
SICK Package Analytics | <=04.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-2078 has a high severity rating due to the risk of unauthorized access to sensitive credentials.
To fix CVE-2020-2078, you should upgrade to a version of SICK Package Analytics later than 04.1.1 that addresses the plaintext password storage.
CVE-2020-2078 specifically affects FTP service credentials that are stored in plaintext in the configuration files.
Organizations using SICK Package Analytics versions up to and including 04.1.1 are impacted by CVE-2020-2078.
Yes, an authorized attacker can exploit CVE-2020-2078 to gain access to the FTP service by retrieving the plaintext stored passwords.