CVE-2023-6448

CVE Published 2023-12-05
Related CWE(s) CWE-798: Use of Hard-coded Credentials, CWE-1188: Initialization of a Resource with an Insecure Default
Related Vendor(s) unitronics
Related Product(s) visilogic, vision120_firmware, vision130_firmware, vision350_firmware, vision1040_firmware, vision530_firmware, vision1210_firmware, vision700_firmware, vision560_firmware, samba_7_firmware, vision230_firmware, vision430_firmware, vision570_firmware, vision280_firmware, vision290_firmware, samba_4.3_firmware, samba_3.5_firmware
Exploitation Reported (CISA KEV) 2023-12-11
CVSS 3 Base Score 9.8 (CRITICAL)
CVSS 3 Attack Complexity LOW
CVSS 3 Attack Vector NETWORK

Unitronics VisiLogic before version 9.9.00, used in Vision and Samba PLCs and HMIs, uses a default administrative password. An unauthenticated attacker with network access can take administrative control of a vulnerable system.

Cyber Threat Graph Context

Explore how this CVE relates to the wider threat graph

Threat Reports Related to CVE-2023-6448

Report

IRGC-Affiliated Cyber Actors Exploit PLCs in Multiple Sectors, Including U.S. Water and Wastewater Systems Facilities

This advisory from CISA and partners describes activity by IRGC-affiliated cyber actors "CyberAv3ngers". According to the advisory, the ...

Associated CAPEC Patterns

References