CVE-2023-6448
Unitronics VisiLogic uses a default administrative password
Basic Information
- CVE State
- PUBLISHED
- Reserved Date
- November 30, 2023
- Published Date
- December 05, 2023
- Last Updated
- August 29, 2024
- Vendor
- Unitronics
- Product
- VisiLogic
- Description
- Unitronics VisiLogic before version 9.9.00, used in Vision and Samba PLCs and HMIs, uses a default administrative password. An unauthenticated attacker with network access can take administrative control of a vulnerable system.
CVSS Scores
CVSS v3.1
9.8 - CRITICAL
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
SSVC Information
- Exploitation
- Active
- Automatable
- Yes
- Technical Impact
- Total
Exploit Status
- Exploited in the Wild
- Yes (added 2023-12-11 00:00:00 UTC) Source
References
https://www.cisa.gov/news-events/alerts/2023/11/28/exploitation-unitronics-plcs-used-water-and-wastewater-systems
https://www.unitronicsplc.com/cyber_security_vision-samba/
https://downloads.unitronicsplc.com/Sites/plc/Visilogic/Version_Changes-Bug_Reports/VisiLogic%209.9.00%20Version%20changes.pdf
https://downloads.unitronicsplc.com/Sites/plc/Technical_Library/Unitronics-Cybersecurity-Advisory-2023-001-CVE-2023-6448.pdf
Known Exploited Vulnerability Information
Source | Added Date |
---|---|
CISA | 2023-12-11 00:00:00 UTC |