Learn about CVE-2023-22804 affecting LS Electric XBC-DN32U with OS 01.80. High severity flaw allows unauthorized account creation, leading to device compromise.
This CVE record was published on February 15, 2023, and is related to LS Electric XBC-DN32U with operating system version 01.80. The vulnerability was reported by HeeA Go of Dankook University.
Understanding CVE-2023-22804
This section will cover details about the vulnerability, its impact, technical aspects, and mitigation steps.
What is CVE-2023-22804?
The CVE-2023-22804 vulnerability involves LS ELECTRIC XBC-DN32U with operating system version 01.80 lacking authentication to create users on the PLC. This flaw could potentially enable an attacker to create and utilize an account with elevated privileges, ultimately gaining control of the device.
The Impact of CVE-2023-22804
With a base severity score of 9.1 and a critical rating, the impact of CVE-2023-22804 is significant. It poses a high availability impact and high integrity impact, indicating the potential for severe consequences if exploited.
Technical Details of CVE-2023-22804
This section delves into the specifics of the vulnerability, including its description, affected systems and versions, and exploitation mechanism.
Vulnerability Description
The vulnerability in LS Electric XBC-DN32U with operating system version 01.80 allows unauthorized users to create accounts without proper authentication, leading to the potential takeover of the device.
Affected Systems and Versions
LS Electric XBC-DN32U with operating system version 01.80 is affected by this vulnerability. Other versions may not be impacted.
Exploitation Mechanism
The lack of authentication on the PLC in LS Electric XBC-DN32U with operating system version 01.80 provides an opportunity for malicious actors to create user accounts with elevated privileges, compromising device security.
Mitigation and Prevention
This section focuses on steps to mitigate the risks associated with CVE-2023-22804 and prevent exploitation in the long term.
Immediate Steps to Take
Users are advised to restrict communication to the PLC to only trusted IP addresses and devices. Enabling the "Host Table" option in the configuration window of the PLC can help reduce the risk of exploitation.
Long-Term Security Practices
In the long term, organizations should prioritize implementing strong authentication mechanisms, continuously monitoring for unauthorized access, and keeping systems up to date with the latest security patches.
Patching and Updates
LS Electric is actively working on developing mitigations for CVE-2023-22804, with an expected release by the end of 2023. Users are encouraged to stay informed about these updates and promptly apply patches to address the vulnerability.