cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2022-36360,https://securityvulnerability.io/vulnerability/CVE-2022-36360,Firmware Manipulation Vulnerability in LOGO! 8 BM by Siemens,"A vulnerability exists in LOGO! 8 BM and its SIPLUS variants that allows for the loading of firmware updates without proper authentication checks. The integrity of the firmware, which is unencrypted, is only validated through a basic, non-cryptographic method. This deficiency enables attackers to potentially manipulate and upload malicious firmware updates to the device, leading to unauthorized control and possible disruption of services.",Siemens,Logo! 8 Bm (incl. Siplus Variants),7.5,HIGH,0.0007300000288523734,false,,false,false,false,,false,false,2022-10-11T00:00:00.000Z,0 CVE-2020-25235,https://securityvulnerability.io/vulnerability/CVE-2020-25235,,A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (All versions < V8.3). The password used for authentication for the LOGO! Website and the LOGO! Access Tool is sent in a recoverable format. An attacker with access to the network traffic could derive valid logins.,Siemens,Logo! 8 Bm (incl. Siplus Variants),7.5,HIGH,0.001290000043809414,false,,false,false,false,,false,false,2020-12-14T21:05:19.000Z,0 CVE-2020-25234,https://securityvulnerability.io/vulnerability/CVE-2020-25234,,"A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (All versions < V8.3), LOGO! Soft Comfort (All versions < V8.3). The LOGO! program files generated and used by the affected components offer the possibility to save user-defined functions (UDF) in a password protected way. This protection is implemented in the software that displays the information. An attacker could reverse engineer the UDFs directly from stored program files.",Siemens,"Logo! 8 Bm (incl. Siplus Variants),Logo! Soft Comfort",7.7,HIGH,0.0006099999882280827,false,,false,false,false,,false,false,2020-12-14T21:05:19.000Z,0 CVE-2020-25232,https://securityvulnerability.io/vulnerability/CVE-2020-25232,,"A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (All versions < V8.3). Due to the usage of an insecure random number generation function and a deprecated cryptographic function, an attacker could extract the key that is used when communicating with an affected device on port 8080/tcp.",Siemens,Logo! 8 Bm (incl. Siplus Variants),7.5,HIGH,0.001290000043809414,false,,false,false,false,,false,false,2020-12-14T21:05:19.000Z,0 CVE-2020-25233,https://securityvulnerability.io/vulnerability/CVE-2020-25233,,A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (All versions < V8.3). The firmware update of affected devices contains the private RSA key that is used as a basis for encryption of communication with the device.,Siemens,Logo! 8 Bm (incl. Siplus Variants),5.5,MEDIUM,0.0004400000034365803,false,,false,false,false,,false,false,2020-12-14T21:05:19.000Z,0 CVE-2020-25231,https://securityvulnerability.io/vulnerability/CVE-2020-25231,,"A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (All versions < V8.3), LOGO! Soft Comfort (All versions < V8.3). The encryption of program data for the affected devices uses a static key. An attacker could use this key to extract confidential information from protected program files.",Siemens,"Logo! 8 Bm (incl. Siplus Variants),Logo! Soft Comfort",5.5,MEDIUM,0.0004400000034365803,false,,false,false,false,,false,false,2020-12-14T21:05:18.000Z,0 CVE-2020-25228,https://securityvulnerability.io/vulnerability/CVE-2020-25228,,"A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (All versions < V8.3). A service available on port 10005/tcp of the affected devices could allow complete access to all services without authorization. An attacker could gain full control over an affected device, if he has access to this service. The system manual recommends to protect access to this port.",Siemens,Logo! 8 Bm (incl. Siplus Variants),9.8,CRITICAL,0.0017000000225380063,false,,false,false,false,,false,false,2020-12-14T21:05:18.000Z,0 CVE-2020-25229,https://securityvulnerability.io/vulnerability/CVE-2020-25229,,A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (All versions < V8.3). The implemented encryption for communication with affected devices is prone to replay attacks due to the usage of a static key. An attacker could change the password or change the configuration on any affected device if using prepared messages that were generated for another device.,Siemens,Logo! 8 Bm (incl. Siplus Variants),7.5,HIGH,0.0007800000021234155,false,,false,false,false,,false,false,2020-12-14T21:05:18.000Z,0 CVE-2020-25230,https://securityvulnerability.io/vulnerability/CVE-2020-25230,,"A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (All versions < V8.3). Due to the usage of an outdated cipher mode on port 10005/tcp, an attacker could extract the encryption key from a captured communication with the device.",Siemens,Logo! 8 Bm (incl. Siplus Variants),7.5,HIGH,0.0009500000160187483,false,,false,false,false,,false,false,2020-12-14T21:05:18.000Z,0 CVE-2020-7593,https://securityvulnerability.io/vulnerability/CVE-2020-7593,,"A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (V1.81.01 - V1.81.03), LOGO! 8 BM (incl. SIPLUS variants) (V1.82.01), LOGO! 8 BM (incl. SIPLUS variants) (V1.82.02). A buffer overflow vulnerability exists in the Web Server functionality of the device. A remote unauthenticated attacker could send a specially crafted HTTP request to cause a memory corruption, potentially resulting in remote code execution.",Siemens,Logo! 8 Bm (incl. Siplus Variants),9.8,CRITICAL,0.0013099999632686377,false,,false,false,false,,false,false,2020-07-14T13:18:05.000Z,0 CVE-2020-7589,https://securityvulnerability.io/vulnerability/CVE-2020-7589,,"A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (All versions). The vulnerability could lead to an attacker reading and modifying the device configuration and obtain project files from affected devices. The security vulnerability could be exploited by an unauthenticated attacker with network access to port 135/tcp. No user interaction is required to exploit this security vulnerability. The vulnerability impacts confidentiality, integrity, and availability of the device. At the time of advisory publication no public exploitation of this security vulnerability was known.",Siemens,Logo! 8 Bm (incl. Siplus Variants),9.1,CRITICAL,0.0011699999449774623,false,,false,false,false,,false,false,2020-06-10T16:24:57.000Z,0 CVE-2019-10920,https://securityvulnerability.io/vulnerability/CVE-2019-10920,,"A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (All versions < V8.3). Project data stored on the device, which is accessible via port 10005/tcp, can be decrypted due to a hardcoded encryption key. The security vulnerability could be exploited by an unauthenticated attacker with network access to port 10005/tcp. No user interaction is required to exploit this security vulnerability. The vulnerability impacts confidentiality of the device. At the time of advisory publication no public exploitation of this security vulnerability was known.",Siemens,Logo! 8 Bm (incl. Siplus Variants),7.5,HIGH,0.0024300001095980406,false,,false,false,false,,false,false,2019-05-14T19:54:48.000Z,0 CVE-2019-10919,https://securityvulnerability.io/vulnerability/CVE-2019-10919,,"A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (All versions < V8.3). Attackers with access to port 10005/tcp could perform device reconfigurations and obtain project files from the devices. The system manual recommends to protect access to this port. The security vulnerability could be exploited by an unauthenticated attacker with network access to port 10005/tcp. No user interaction is required to exploit this security vulnerability. The vulnerability impacts confidentiality, integrity, and availability of the device. At the time of advisory publication no public exploitation of this security vulnerability was known.",Siemens,Logo! 8 Bm (incl. Siplus Variants),9.4,CRITICAL,0.00558000011369586,false,,false,false,false,,false,false,2019-05-14T19:54:48.000Z,0 CVE-2019-10921,https://securityvulnerability.io/vulnerability/CVE-2019-10921,,A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (All versions < V8.3). Unencrypted storage of passwords in the project could allow an attacker with access to port 10005/tcp to obtain passwords of the device. The security vulnerability could be exploited by an unauthenticated attacker with network access to port 10005/tcp. No user interaction is required to exploit this security vulnerability. The vulnerability impacts confidentiality of the device. At the time of advisory publication no public exploitation of this security vulnerability was known,Siemens,Logo! 8 Bm (incl. Siplus Variants),7.5,HIGH,0.004970000125467777,false,,false,false,false,,false,false,2019-05-14T19:54:48.000Z,0 CVE-2017-12734,https://securityvulnerability.io/vulnerability/CVE-2017-12734,,A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (All versions < V1.81.2). An attacker with network access to the integrated web server on port 80/tcp could obtain the session ID of an active user session. A user must be logged in to the web interface. Siemens recommends to use the integrated webserver on port 80/tcp only in trusted networks.,Siemens,Logo! 8 Bm (incl. Siplus Variants),7.5,HIGH,0.0009899999713525176,false,,false,false,false,,false,false,2017-08-30T19:00:00.000Z,0 CVE-2017-12735,https://securityvulnerability.io/vulnerability/CVE-2017-12735,,A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (All versions < V8.3). An attacker who performs a Man-in-the-Middle attack between the LOGO! BM and other devices could potentially decrypt and modify network traffic.,Siemens,Logo! 8 Bm (incl. Siplus Variants),7.4,HIGH,0.001180000021122396,false,,false,false,false,,false,false,2017-08-30T19:00:00.000Z,0