Learn about CVE-2020-28390, a vulnerability in Siemens Opcenter Execution Core software versions 8.2 and 8.3. Discover the impact, affected systems, exploitation details, and mitigation steps.
A vulnerability has been identified in Opcenter Execution Core (V8.2) and Opcenter Execution Core (V8.3) that could lead to information leakage and password disclosure.
Understanding CVE-2020-28390
This CVE involves an information leakage vulnerability in the handling of web client sessions in Siemens' Opcenter Execution Core software.
What is CVE-2020-28390?
The vulnerability allows a local attacker with access to the Web Client Session Storage to potentially reveal the passwords of currently logged-in users.
The Impact of CVE-2020-28390
The exploitation of this vulnerability could result in unauthorized access to sensitive information, compromising the security and confidentiality of user passwords.
Technical Details of CVE-2020-28390
This section provides more technical insights into the vulnerability.
Vulnerability Description
The vulnerability in Opcenter Execution Core versions 8.2 and 8.3 stems from inadequate protection of credentials, allowing unauthorized disclosure of user passwords.
Affected Systems and Versions
Exploitation Mechanism
The vulnerability can be exploited by a local attacker who gains access to the Web Client Session Storage, enabling them to extract passwords of logged-in users.
Mitigation and Prevention
It is crucial to take immediate steps to address and prevent the exploitation of this vulnerability.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Siemens has released patches to address the vulnerability in Opcenter Execution Core versions 8.2 and 8.3. Users are advised to update their software to the latest patched versions to enhance security.