CVE-2019-16672

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to intercept sensitive credentials transmitted in cleartext on affected Weidmueller industrial switches. Attackers on the same network can capture authentication data, potentially gaining unauthorized access to network infrastructure. Organizations using Weidmueller IE-SW-VL05M, IE-SW-VL08MT, or IE-SW-PL10M devices with specific firmware versions are affected.

💻 Affected Systems

Products:
  • Weidmueller IE-SW-VL05M
  • Weidmueller IE-SW-VL08MT
  • Weidmueller IE-SW-PL10M
Versions: IE-SW-VL05M 3.6.6 Build 16102415, IE-SW-VL08MT 3.5.2 Build 16102415, IE-SW-PL10M 3.3.16 Build 16102416
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices with these specific firmware versions transmit credentials in cleartext by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative access to industrial switches, enabling network disruption, traffic interception, or lateral movement to critical industrial control systems.

🟠

Likely Case

Attackers capture credentials and gain unauthorized access to network devices, potentially modifying configurations or monitoring traffic.

🟢

If Mitigated

With proper network segmentation and monitoring, impact is limited to credential exposure requiring additional steps for exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access but no authentication. Attackers can use standard network sniffing tools.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Contact Weidmueller for updated firmware

Vendor Advisory: https://cert.vde.com/en-us/advisories/vde-2019-018

Restart Required: Yes

Instructions:

1. Contact Weidmueller support for updated firmware. 2. Backup current configuration. 3. Apply firmware update following vendor instructions. 4. Verify encryption is enabled for credential transmission.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate affected switches in separate VLANs with strict access controls

Encrypted Management Channel

all

Use SSH or HTTPS for management instead of HTTP/Telnet

🧯 If You Can't Patch

  • Implement strict network segmentation to limit access to management interfaces
  • Deploy network monitoring to detect credential sniffing attempts

🔍 How to Verify

Check if Vulnerable:

Use network analyzer (Wireshark) to capture traffic to device management interface and check for cleartext credentials

Check Version:

Check device web interface or CLI for firmware version

Verify Fix Applied:

Verify credentials are no longer visible in cleartext during authentication using network analysis

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authentication attempts
  • Unusual login times/locations

Network Indicators:

  • Cleartext authentication traffic to switch management IPs
  • ARP spoofing or network sniffing activity

SIEM Query:

source_ip IN (switch_management_ips) AND protocol IN (http, telnet) AND payload CONTAINS 'password'

🔗 References

📤 Share & Export