Lucene search

K
vulnrichmentCisa-cgVULNRICHMENT:CVE-2023-6448
HistoryDec 05, 2023 - 5:43 p.m.

CVE-2023-6448 Unitronics VisiLogic uses a default administrative password

2023-12-0517:43:40
CWE-1188
cisa-cg
github.com
4
unitronics visilogic
default password
administrative control
vulnerability
plcs
hmis
network access
cve-2023-6448

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7

Confidence

Low

SSVC

Exploitation

Active

Automatable

Yes

Technical Impact

Total

Unitronics VisiLogic before version 9.9.00, used in Vision and Samba PLCs and HMIs, uses a default administrative password. An unauthenticated attacker with network access can take administrative control of a vulnerable system.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:unitronics:visilogic:*:*:*:*:*:*:*:*"
    ],
    "vendor": "unitronics",
    "product": "visilogic",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "9.9.00",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7

Confidence

Low

SSVC

Exploitation

Active

Automatable

Yes

Technical Impact

Total