The product transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.
N/A
Threat Mapped score: 0.0
Industry: Finiancial
Threat priority: Unclassified
CVE: CVE-2022-29519
Programmable Logic Controller (PLC) sends sensitive information in plaintext, including passwords and session tokens.
CVE: CVE-2022-30312
Building Controller uses a protocol that transmits authentication credentials in plaintext.
CVE: CVE-2022-31204
Programmable Logic Controller (PLC) sends password in plaintext.
CVE: CVE-2002-1949
Passwords transmitted in cleartext.
CVE: CVE-2008-4122
Chain: Use of HTTPS cookie without "secure" flag causes it to be transmitted across unencrypted HTTP.
CVE: CVE-2008-3289
Product sends password hash in cleartext in violation of intended policy.
CVE: CVE-2008-4390
Remote management feature sends sensitive information including passwords in cleartext.
CVE: CVE-2007-5626
Backup routine sends password in cleartext in email.
CVE: CVE-2004-1852
Product transmits Blowfish encryption key in cleartext.
CVE: CVE-2008-0374
Printer sends configuration information, including administrative password, in cleartext.
CVE: CVE-2007-4961
Chain: cleartext transmission of the MD5 hash of password enables attacks against a server that is susceptible to replay (CWE-294).
CVE: CVE-2007-4786
Product sends passwords in cleartext to a log server.
CVE: CVE-2005-3140
Product sends file with cleartext passwords in e-mail message intended for diagnostic purposes.
Phase | Note |
---|---|
Architecture and Design | OMISSION: This weakness is caused by missing a security tactic during the architecture and design phase. |
Architecture and Design | For hardware, this may be introduced when design does not plan for an attacker having physical access while a legitimate user is remotely operating the device. |
Operation | N/A |
System Configuration | N/A |
Intro: The following code attempts to establish a connection to a site to communicate sensitive information.
Body: Though a connection is successfully made, the connection is unencrypted and it is possible that all sensitive data sent to or received from the server will be read by unintended actors.
try { URL u = new URL("http://www.secret.example.org/"); HttpURLConnection hu = (HttpURLConnection) u.openConnection(); hu.setRequestMethod("PUT"); hu.connect(); OutputStream os = hu.getOutputStream(); hu.disconnect(); } catch (IOException e) { //... }
Intro: In 2022, the OT:ICEFALL study examined products by 10 different Operational Technology (OT) vendors. The researchers reported 56 vulnerabilities and said that the products were "insecure by design" [REF-1283]. If exploited, these vulnerabilities often allowed adversaries to change how the products operated, ranging from denial of service to changing the code that the products executed. Since these products were often used in industries such as power, electrical, water, and others, there could even be safety implications.
Body: Multiple vendors used cleartext transmission of sensitive information in their OT products.
Intro: A TAP accessible register is read/written by a JTAG based tool, for internal use by authorized users. However, an adversary can connect a probing device and collect the values from the unencrypted channel connecting the JTAG interface to the authorized user, if no additional protections are employed.
Intro: The following Azure CLI command lists the properties of a particular storage account:
Body: The JSON result might be:
az storage account show -g {ResourceGroupName} -n {StorageAccountName}