Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2016-8366

Severity
7.3HIGH
EPSS
2.5%
top 14.68%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedApr 5
Latest updateMay 14

Description

Webvisit in Phoenix Contact ILC PLCs offers a password macro to protect HMI pages on the PLC against casual or coincidental opening of HMI pages by the user. The password macro can be configured in a way that the password is stored and transferred in clear text.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:LExploitability: 3.9 | Impact: 3.4

Affected Packages1 packages

CVEListV5phoenix_contact/phoenix_contact_ilc_plcsAll ILC 1xx PLCs

🔴Vulnerability Details

2
GHSA
GHSA-mfgp-7r52-jcjh: Webvisit in Phoenix Contact ILC PLCs offers a password macro to protect HMI pages on the PLC against casual or coincidental opening of HMI pages by th2022-05-14
CVEList
CVE-2016-8366: Webvisit in Phoenix Contact ILC PLCs offers a password macro to protect HMI pages on the PLC against casual or coincidental opening of HMI pages by th2018-04-05

💥Exploits & PoCs

1
Exploit-DB
Phoenix Contact WebVisit 6.40.00 - Password Disclosure2018-10-11
CVE-2016-8366 (HIGH CVSS 7.3) | Webvisit in Phoenix Contact ILC PLC | cvebase.io