CVE Vulnerabilities

CVE-2022-41648

Initialization of a Resource with an Insecure Default

Published: Oct 28, 2022 | Modified: Oct 13, 2025
CVSS 3.x
9.8
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

The HEIDENHAIN Controller TNC 640 NC software Version 340590 07 SP5, is vulnerable to improper authentication in its DNC communication for CNC machines. Authentication is not enabled by default for DNC communication. This vulnerability may allow an attacker to deny service on the production line, steal sensitive data from the production line, and alter any products created by the production line. Note: CNC machines running the TNC 640 controller require DNC to be enabled for DNC communication to be present.

Weakness

The product initializes or sets a resource with a default that is intended to be changed by the administrator, but the default is not secure.

Affected Software

Name Vendor Start Version End Version
Tnc_640_programming_station Heidenhain 340590_07-sp5 (including) 340590_07-sp5 (including)
Heros Heidenhain 5.08.3 (including) 5.08.3 (including)

Extended Description

Developers often choose default values that leave the product as open and easy to use as possible out-of-the-box, under the assumption that the administrator can (or should) change the default value. However, this ease-of-use comes at a cost when the default is insecure and the administrator does not change it.

References