← Back to CVEs
CVE-2023-6448
CRITICALCISA KEV9.8
Description
Unitronics VisiLogic before version 9.9.00, used in Vision and Samba PLCs and HMIs, uses a default administrative password. An unauthenticated attacker with network access can take administrative control of a vulnerable system.
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published12/5/2023
Last Modified2/26/2026
Sourcekev
Honeypot Sightings0
CISA KEV
VendorUnitronics
ProductVision PLC and HMI
Vulnerability NameUnitronics Vision PLC and HMI Insecure Default Password Vulnerability
KEV Date Added2023-12-11
Remediation Due Date2023-12-18
Ransomware UseUnknown
Affected Products
unitronics:samba_3.5unitronics:samba_3.5_firmwareunitronics:samba_4.3unitronics:samba_4.3_firmwareunitronics:samba_7unitronics:samba_7_firmwareunitronics:visilogicunitronics:vision1040unitronics:vision1040_firmwareunitronics:vision120unitronics:vision120_firmwareunitronics:vision1210unitronics:vision1210_firmwareunitronics:vision130unitronics:vision130_firmwareunitronics:vision230unitronics:vision230_firmwareunitronics:vision280unitronics:vision280_firmwareunitronics:vision290unitronics:vision290_firmwareunitronics:vision350unitronics:vision350_firmwareunitronics:vision430unitronics:vision430_firmwareunitronics:vision530unitronics:vision530_firmwareunitronics:vision560unitronics:vision560_firmwareunitronics:vision570unitronics:vision570_firmwareunitronics:vision700unitronics:vision700_firmware
Weaknesses (CWE)
CWE-1188CWE-798
References
https://downloads.unitronicsplc.com/Sites/plc/Technical_Library/Unitronics-Cybersecurity-Advisory-2023-001-CVE-2023-6448.pdf(9119a7d8-5eab-497f-8521-727c672e3725)
https://downloads.unitronicsplc.com/Sites/plc/Visilogic/Version_Changes-Bug_Reports/VisiLogic%209.9.00%20Version%20changes.pdf(9119a7d8-5eab-497f-8521-727c672e3725)
https://www.cisa.gov/news-events/alerts/2023/11/28/exploitation-unitronics-plcs-used-water-and-wastewater-systems(9119a7d8-5eab-497f-8521-727c672e3725)
https://www.unitronicsplc.com/cyber_security_vision-samba/(9119a7d8-5eab-497f-8521-727c672e3725)
https://downloads.unitronicsplc.com/Sites/plc/Technical_Library/Unitronics-Cybersecurity-Advisory-2023-001-CVE-2023-6448.pdf(af854a3a-2127-422b-91ae-364da2661108)
https://downloads.unitronicsplc.com/Sites/plc/Visilogic/Version_Changes-Bug_Reports/VisiLogic%209.9.00%20Version%20changes.pdf(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/news-events/alerts/2023/11/28/exploitation-unitronics-plcs-used-water-and-wastewater-systems(af854a3a-2127-422b-91ae-364da2661108)
https://www.unitronicsplc.com/cyber_security_vision-samba/(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-6448(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.