{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-06T06:55:05.458","vulnerabilities":[{"cve":{"id":"CVE-2024-39922","sourceIdentifier":"productcert@siemens.com","published":"2024-08-13T08:15:11.567","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability has been identified in LOGO! 12/24RCE (6ED1052-1MD08-0BA1) (All versions), LOGO! 12/24RCEo (6ED1052-2MD08-0BA1) (All versions), LOGO! 230RCE (6ED1052-1FB08-0BA1) (All versions), LOGO! 230RCEo (6ED1052-2FB08-0BA1) (All versions), LOGO! 24CE (6ED1052-1CC08-0BA1) (All versions), LOGO! 24CEo (6ED1052-2CC08-0BA1) (All versions), LOGO! 24RCE (6ED1052-1HB08-0BA1) (All versions), LOGO! 24RCEo (6ED1052-2HB08-0BA1) (All versions), SIPLUS LOGO! 12/24RCE (6AG1052-1MD08-7BA1) (All versions), SIPLUS LOGO! 12/24RCEo (6AG1052-2MD08-7BA1) (All versions), SIPLUS LOGO! 230RCE (6AG1052-1FB08-7BA1) (All versions), SIPLUS LOGO! 230RCEo (6AG1052-2FB08-7BA1) (All versions), SIPLUS LOGO! 24CE (6AG1052-1CC08-7BA1) (All versions), SIPLUS LOGO! 24CEo (6AG1052-2CC08-7BA1) (All versions), SIPLUS LOGO! 24RCE (6AG1052-1HB08-7BA1) (All versions), SIPLUS LOGO! 24RCEo (6AG1052-2HB08-7BA1) (All versions). Affected devices store user passwords in plaintext without proper protection. This could allow a physical attacker to retrieve them from the embedded storage ICs."},{"lang":"es","value":"Se ha identificado una vulnerabilidad en LOGO! 12/24RCE (6ED1052-1MD08-0BA1) (Todas las versiones), LOGO! 12/24RCEO (6ED1052-2MD08-0BA1) (Todas las versiones), LOGO! 230RCE (6ED1052-1FB08-0BA1) (Todas las versiones), LOGO! 230RCEO (6ED1052-2FB08-0BA1) (todas las versiones), LOGO! 24CE (6ED1052-1CC08-0BA1) (Todas las versiones), LOGO! 24CEo (6ED1052-2CC08-0BA1) (Todas las versiones), LOGO! 24RCE (6ED1052-1HB08-0BA1) (Todas las versiones), LOGO! 24RCEo (6ED1052-2HB08-0BA1) (Todas las versiones), SIPLUS LOGO! 12/24RCE (6AG1052-1MD08-7BA1) (Todas las versiones), SIPLUS LOGO! 12/24RCEO (6AG1052-2MD08-7BA1) (Todas las versiones), SIPLUS LOGO! 230RCE (6AG1052-1FB08-7BA1) (Todas las versiones), SIPLUS LOGO! 230RCEo (6AG1052-2FB08-7BA1) (Todas las versiones), SIPLUS LOGO! 24CE (6AG1052-1CC08-7BA1) (Todas las versiones), SIPLUS LOGO! 24CEo (6AG1052-2CC08-7BA1) (Todas las versiones), SIPLUS LOGO! 24RCE (6AG1052-1HB08-7BA1) (Todas las versiones), SIPLUS LOGO! 24RCEO (6AG1052-2HB08-7BA1) (Todas las versiones). Los dispositivos afectados almacenan las contraseñas de los usuarios en texto plano sin la protección adecuada. Esto podría permitir que un atacante físico los recupere de los circuitos integrados de almacenamiento integrados."}],"metrics":{"cvssMetricV40":[{"source":"productcert@siemens.com","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":5.1,"baseSeverity":"MEDIUM","attackVector":"PHYSICAL","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"NONE","vulnAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"NOT_DEFINED","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}}],"cvssMetricV31":[{"source":"productcert@siemens.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":4.6,"baseSeverity":"MEDIUM","attackVector":"PHYSICAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":0.9,"impactScore":3.6}]},"weaknesses":[{"source":"productcert@siemens.com","type":"Secondary","description":[{"lang":"en","value":"CWE-256"}]}],"references":[{"url":"https://cert-portal.siemens.com/productcert/html/ssa-921449.html","source":"productcert@siemens.com"}]}}]}