CVE-2009-0216

GE Fanuc iFIX 5.0 and earlier relies on client-side authentication involving a weakly encrypted local password file, which allows remote attackers to bypass intended access restrictions and start privileged server login sessions by recovering a password or by using a modified program module.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:ge_fanuc:ifix:*:*:*:*:*:*:*:*
cpe:2.3:a:ge_fanuc:ifix:2.0:*:*:*:*:*:*:*
cpe:2.3:a:ge_fanuc:ifix:2.2:*:*:*:*:*:*:*
cpe:2.3:a:ge_fanuc:ifix:2.5:*:*:*:*:*:*:*
cpe:2.3:a:ge_fanuc:ifix:2.6:*:*:*:*:*:*:*
cpe:2.3:a:ge_fanuc:ifix:2.21:*:*:*:*:*:*:*
cpe:2.3:a:ge_fanuc:ifix:3.0:*:*:*:*:*:*:*
cpe:2.3:a:ge_fanuc:ifix:3.5:*:*:*:*:*:*:*
cpe:2.3:a:ge_fanuc:ifix:4.0:*:*:*:*:*:*:*
cpe:2.3:a:ge_fanuc:ifix:4.5:*:*:*:*:*:*:*

History

No history.

Information

Published : 2009-02-13 17:30

Updated : 2024-02-04 17:33


NVD link : CVE-2009-0216

Mitre link : CVE-2009-0216

CVE.ORG link : CVE-2009-0216


JSON object : View

Products Affected

ge_fanuc

  • ifix
CWE
CWE-255

Credentials Management Errors