← Zuruck zu CVEs
CVE-2023-6448
CRITICALCISA KEV9.8
Beschreibung
Unitronics VisiLogic before version 9.9.00, used in Vision and Samba PLCs and HMIs, uses a default administrative password. An unauthenticated attacker with network access can take administrative control of a vulnerable system.
CVE Details
CVSS v3.1 Bewertung9.8
SchweregradCRITICAL
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht12/5/2023
Zuletzt geandert2/26/2026
Quellekev
Honeypot-Sichtungen0
CISA KEV
HerstellerUnitronics
ProduktVision PLC and HMI
SchwachstellennameUnitronics Vision PLC and HMI Insecure Default Password Vulnerability
KEV Aufnahmedatum2023-12-11
Behebungsfrist2023-12-18
Ransomware-NutzungUnknown
Betroffene Produkte
unitronics:samba_3.5unitronics:samba_3.5_firmwareunitronics:samba_4.3unitronics:samba_4.3_firmwareunitronics:samba_7unitronics:samba_7_firmwareunitronics:visilogicunitronics:vision1040unitronics:vision1040_firmwareunitronics:vision120unitronics:vision120_firmwareunitronics:vision1210unitronics:vision1210_firmwareunitronics:vision130unitronics:vision130_firmwareunitronics:vision230unitronics:vision230_firmwareunitronics:vision280unitronics:vision280_firmwareunitronics:vision290unitronics:vision290_firmwareunitronics:vision350unitronics:vision350_firmwareunitronics:vision430unitronics:vision430_firmwareunitronics:vision530unitronics:vision530_firmwareunitronics:vision560unitronics:vision560_firmwareunitronics:vision570unitronics:vision570_firmwareunitronics:vision700unitronics:vision700_firmware
Schwachen (CWE)
CWE-1188CWE-798
Referenzen
https://downloads.unitronicsplc.com/Sites/plc/Technical_Library/Unitronics-Cybersecurity-Advisory-2023-001-CVE-2023-6448.pdf(9119a7d8-5eab-497f-8521-727c672e3725)
https://downloads.unitronicsplc.com/Sites/plc/Visilogic/Version_Changes-Bug_Reports/VisiLogic%209.9.00%20Version%20changes.pdf(9119a7d8-5eab-497f-8521-727c672e3725)
https://www.cisa.gov/news-events/alerts/2023/11/28/exploitation-unitronics-plcs-used-water-and-wastewater-systems(9119a7d8-5eab-497f-8521-727c672e3725)
https://www.unitronicsplc.com/cyber_security_vision-samba/(9119a7d8-5eab-497f-8521-727c672e3725)
https://downloads.unitronicsplc.com/Sites/plc/Technical_Library/Unitronics-Cybersecurity-Advisory-2023-001-CVE-2023-6448.pdf(af854a3a-2127-422b-91ae-364da2661108)
https://downloads.unitronicsplc.com/Sites/plc/Visilogic/Version_Changes-Bug_Reports/VisiLogic%209.9.00%20Version%20changes.pdf(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/news-events/alerts/2023/11/28/exploitation-unitronics-plcs-used-water-and-wastewater-systems(af854a3a-2127-422b-91ae-364da2661108)
https://www.unitronicsplc.com/cyber_security_vision-samba/(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-6448(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.