CVE-2022-41648

The HEIDENHAIN Controller TNC 640 NC software Version 340590 07 SP5, is vulnerable to improper authentication in its DNC communication for CNC machines. Authentication is not enabled by default for DNC communication. This vulnerability may allow an attacker to deny service on the production line, steal sensitive data from the production line, and alter any products created by the production line. Note: CNC machines running the TNC 640 controller require DNC to be enabled for DNC communication to be present.
References
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:heidenhain:tnc_640_programming_station:340590_07:sp5:*:*:*:*:*:*
cpe:2.3:o:heidenhain:heros:5.08.3:*:*:*:*:*:*:*
cpe:2.3:h:heidenhain:tnc_640:-:*:*:*:*:*:*:*

History

13 Oct 2025, 13:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 8.1
v2 : unknown
v3 : 9.8
CWE CWE-1188
Summary (en) The HEIDENHAIN Controller TNC 640, version 340590 07 SP5, running HEROS 5.08.3 controlling the HARTFORD 5A-65E CNC machine is vulnerable to improper authentication, which may allow an attacker to deny service to the production line, steal sensitive data from the production line, and alter any products created by the production line. (en) The HEIDENHAIN Controller TNC 640 NC software Version 340590 07 SP5, is vulnerable to improper authentication in its DNC communication for CNC machines. Authentication is not enabled by default for DNC communication. This vulnerability may allow an attacker to deny service on the production line, steal sensitive data from the production line, and alter any products created by the production line. Note: CNC machines running the TNC 640 controller require DNC to be enabled for DNC communication to be present.
References
  • () https://www.cisa.gov/news-events/ics-advisories/icsa-22-298-02 -

21 Nov 2024, 07:23

Type Values Removed Values Added
References () https://www.cisa.gov/uscert/ics/advisories/icsa-22-298-02 - Mitigation, Third Party Advisory, US Government Resource () https://www.cisa.gov/uscert/ics/advisories/icsa-22-298-02 - Mitigation, Third Party Advisory, US Government Resource
CVSS v2 : unknown
v3 : 9.8
v2 : unknown
v3 : 8.1

03 Nov 2022, 14:02

Type Values Removed Values Added
CPE cpe:2.3:o:heidenhain:heros:5.08.3:*:*:*:*:*:*:*
cpe:2.3:a:heidenhain:tnc_640_programming_station:340590_07:sp5:*:*:*:*:*:*
cpe:2.3:h:heidenhain:tnc_640:-:*:*:*:*:*:*:*
CWE CWE-287
References (MISC) https://www.cisa.gov/uscert/ics/advisories/icsa-22-298-02 - (MISC) https://www.cisa.gov/uscert/ics/advisories/icsa-22-298-02 - Mitigation, Third Party Advisory, US Government Resource
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

28 Oct 2022, 18:22

Type Values Removed Values Added
New CVE

Information

Published : 2022-10-28 18:15

Updated : 2025-10-13 13:15


NVD link : CVE-2022-41648

Mitre link : CVE-2022-41648

CVE.ORG link : CVE-2022-41648


JSON object : View

Products Affected

heidenhain

  • heros
  • tnc_640_programming_station
  • tnc_640
CWE
CWE-1188

Insecure Default Initialization of Resource

CWE-287

Improper Authentication