CVE-2023-6448
CVE Published | 2023-12-05 |
---|---|
Related CWE(s) | CWE-798: Use of Hard-coded Credentials, CWE-1188: Initialization of a Resource with an Insecure Default |
Related Vendor(s) | unitronics |
Related Product(s) | visilogic, vision120_firmware, vision130_firmware, vision350_firmware, vision1040_firmware, vision530_firmware, vision1210_firmware, vision700_firmware, vision560_firmware, samba_7_firmware, vision230_firmware, vision430_firmware, vision570_firmware, vision280_firmware, vision290_firmware, samba_4.3_firmware, samba_3.5_firmware |
Exploitation Reported (CISA KEV) | 2023-12-11 |
CVSS 3 Base Score | 9.8 (CRITICAL) |
CVSS 3 Attack Complexity | LOW |
CVSS 3 Attack Vector | NETWORK |
Unitronics VisiLogic before version 9.9.00, used in Vision and Samba PLCs and HMIs, uses a default administrative password. An unauthenticated attacker with network access can take administrative control of a vulnerable system.
Cyber Threat Graph Context
Explore how this CVE relates to the wider threat graph
Threat Reports Related to CVE-2023-6448
Report
IRGC-Affiliated Cyber Actors Exploit PLCs in Multiple Sectors, Including U.S. Water and Wastewater Systems Facilities
This advisory from CISA and partners describes activity by IRGC-affiliated cyber actors "CyberAv3ngers". According to the advisory, the ...