{"containers":{"cna":{"affected":[{"product":"CODESYS OPC DA Server","vendor":"CODESYS","versions":[{"lessThanOrEqual":"V3.5.18.20","status":"affected","version":"V3","versionType":"custom"}]}],"datePublic":"2022-07-06T00:00:00.000Z","descriptions":[{"lang":"en","value":"The CODESYS OPC DA Server prior V3.5.18.20 stores PLC passwords as plain text in its configuration file so that it is visible to all authorized Microsoft Windows users of the system."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"NONE","baseScore":5.5,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-256","description":"CWE-256 Unprotected Storage of Credentials","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-07-11T10:40:27.000Z","orgId":"270ccfa6-a436-4e77-922e-914ec3a9685c","shortName":"CERTVDE"},"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17129&token=1c1485c4a700c04f2069699f5be7558d276ca117&download="}],"source":{"discovery":"UNKNOWN"},"title":"Plaintext Storage of a password in CODESYS V3 OPC DA Server","x_generator":{"engine":"Vulnogram 0.0.9"},"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"info@cert.vde.com","DATE_PUBLIC":"2022-07-06T13:08:00.000Z","ID":"CVE-2022-1794","STATE":"PUBLIC","TITLE":"Plaintext Storage of a password in CODESYS V3 OPC DA Server"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"CODESYS OPC DA Server","version":{"version_data":[{"version_affected":"<=","version_name":"V3","version_value":"V3.5.18.20"}]}}]},"vendor_name":"CODESYS"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The CODESYS OPC DA Server prior V3.5.18.20 stores PLC passwords as plain text in its configuration file so that it is visible to all authorized Microsoft Windows users of the system."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"NONE","baseScore":5.5,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-256 Unprotected Storage of Credentials"}]}]},"references":{"reference_data":[{"name":"https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17129&token=1c1485c4a700c04f2069699f5be7558d276ca117&download=","refsource":"CONFIRM","url":"https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17129&token=1c1485c4a700c04f2069699f5be7558d276ca117&download="}]},"source":{"discovery":"UNKNOWN"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T00:16:59.853Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17129&token=1c1485c4a700c04f2069699f5be7558d276ca117&download="}]}]},"cveMetadata":{"assignerOrgId":"270ccfa6-a436-4e77-922e-914ec3a9685c","assignerShortName":"CERTVDE","cveId":"CVE-2022-1794","datePublished":"2022-07-11T10:40:27.897Z","dateReserved":"2022-05-18T00:00:00.000Z","dateUpdated":"2024-09-16T20:38:06.332Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}