Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2024-43698

Summary
Assigner-icscert
Assigner Org ID-7d14cffa-0d7d-4270-9dc0-52cabd5a23a6
Published At-22 Oct, 2024 | 21:23
Updated At-23 Oct, 2024 | 14:42
Rejected At-
Credits

Kieback&Peter DDC4000 Series Use of Weak Credentials

Kieback & Peter's DDC4000 series uses weak credentials, which may allow an unauthenticated attacker to get full admin rights on the system.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:icscert
Assigner Org ID:7d14cffa-0d7d-4270-9dc0-52cabd5a23a6
Published At:22 Oct, 2024 | 21:23
Updated At:23 Oct, 2024 | 14:42
Rejected At:
▼CVE Numbering Authority (CNA)
Kieback&Peter DDC4000 Series Use of Weak Credentials

Kieback & Peter's DDC4000 series uses weak credentials, which may allow an unauthenticated attacker to get full admin rights on the system.

Affected Products
Vendor
Kieback&Peter
Product
DDC4040e
Default Status
unaffected
Versions
Affected
  • From 0 through 1.17.6 (custom)
Vendor
Kieback&Peter
Product
DDC4020e
Default Status
unaffected
Versions
Affected
  • From 0 through 1.17.6 (custom)
Vendor
Kieback&Peter
Product
DDC4400e
Default Status
unaffected
Versions
Affected
  • From 0 through 1.17.6 (custom)
Vendor
Kieback&Peter
Product
DDC4200e
Default Status
unaffected
Versions
Affected
  • From 0 through 1.17.6 (custom)
Vendor
Kieback&Peter
Product
DDC4002e
Default Status
unaffected
Versions
Affected
  • From 0 through 1.17.6 (custom)
Vendor
Kieback&Peter
Product
DDC4400
Default Status
unaffected
Versions
Affected
  • From 0 through 1.12.14 (custom)
Vendor
Kieback&Peter
Product
DDC4200-L
Default Status
unaffected
Versions
Affected
  • From 0 through 1.12.14 (custom)
Vendor
Kieback&Peter
Product
DDC4200
Default Status
unaffected
Versions
Affected
  • From 0 through 1.12.14 (custom)
Vendor
Kieback&Peter
Product
DDC4100
Default Status
unaffected
Versions
Affected
  • From 0 through 1.7.4 (custom)
Vendor
Kieback&Peter
Product
DDC4002
Default Status
unaffected
Versions
Affected
  • From 0 through 1.12.14 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-1391CWE-1391 Use of Weak Credentials
Type: CWE
CWE ID: CWE-1391
Description: CWE-1391 Use of Weak Credentials
Metrics
VersionBase scoreBase severityVector
4.09.3CRITICAL
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Version: 4.0
Base score: 9.3
Base severity: CRITICAL
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Version: 3.1
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Kieback&Peter DDC4002, DDC4100, DDC4200, DDC4200-L and DDC4400 controllers are considered End-of-Life (EOL) and are no longer supported. Users operating these controllers should ensure they are operated in a strictly separate OT environment and consider updating to a supported controller. Kieback&Peter recommends users update to DDC4002e, DDC4200e, DDC4400e, DDC4020e and DDC4040e controllers. Kieback&Peter recommends all affected users contact their local Kieback&Peter office to update the firmware of the supported DDC systems to v1.21.0 or later.

Configurations

Workarounds

Exploits

Credits

finder
Raphael Ruf of terreActive AG reported these vulnerabilities to CISA.
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.cisa.gov/news-events/ics-advisories/icsa-24-291-05
N/A
Hyperlink: https://www.cisa.gov/news-events/ics-advisories/icsa-24-291-05
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Vendor
kieback\&peter
Product
ddc4400_firmware
CPEs
  • cpe:2.3:o:kieback\&peter:ddc4400_firmware:*:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through 1.12.14 (custom)
Vendor
kieback\&peter
Product
ddc4002e_firmware
CPEs
  • cpe:2.3:o:kieback\&peter:ddc4002e_firmware:*:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through 1.17.6 (custom)
Vendor
kieback\&peter
Product
ddc4200e_firmware
CPEs
  • cpe:2.3:o:kieback\&peter:ddc4200e_firmware:*:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through 1.17.6 (custom)
Vendor
kieback\&peter
Product
ddc4002_firmware
CPEs
  • cpe:2.3:o:kieback\&peter:ddc4002_firmware:*:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through 1.12.14 (custom)
Vendor
kieback\&peter
Product
ddc4100_firmware
CPEs
  • cpe:2.3:o:kieback\&peter:ddc4100_firmware:*:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through 1.7.4 (custom)
Vendor
kieback\&peter
Product
ddc4200_firmware
CPEs
  • cpe:2.3:o:kieback\&peter:ddc4200_firmware:*:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through 1.12.14 (custom)
Vendor
kieback\&peter
Product
ddc4200-l_firmware
CPEs
  • cpe:2.3:o:kieback\&peter:ddc4200-l_firmware:*:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through 1.12.14 (custom)
Vendor
kieback\&peter
Product
ddc4400e_firmware
CPEs
  • cpe:2.3:o:kieback\&peter:ddc4400e_firmware:*:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through 1.17.6 (custom)
Vendor
kieback\&peter
Product
ddc4020e_firmware
CPEs
  • cpe:2.3:o:kieback\&peter:ddc4020e_firmware:*:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through 1.17.6 (custom)
Vendor
kieback\&peter
Product
ddc4040e_firmware
CPEs
  • cpe:2.3:o:kieback\&peter:ddc4040e_firmware:*:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through 1.17.6 (custom)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:ics-cert@hq.dhs.gov
Published At:22 Oct, 2024 | 22:15
Updated At:23 Oct, 2024 | 15:12

Kieback & Peter's DDC4000 series uses weak credentials, which may allow an unauthenticated attacker to get full admin rights on the system.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.09.3CRITICAL
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Secondary3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 4.0
Base score: 9.3
Base severity: CRITICAL
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Secondary
Version: 3.1
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-1391Primaryics-cert@hq.dhs.gov
CWE ID: CWE-1391
Type: Primary
Source: ics-cert@hq.dhs.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.cisa.gov/news-events/ics-advisories/icsa-24-291-05ics-cert@hq.dhs.gov
N/A
Hyperlink: https://www.cisa.gov/news-events/ics-advisories/icsa-24-291-05
Source: ics-cert@hq.dhs.gov
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

8Records found

CVE-2024-41717
Matching Score-8
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-8
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.3||CRITICAL
EPSS-0.61% / 69.48%
||
7 Day CHG~0.00%
Published-22 Oct, 2024 | 21:13
Updated-23 Oct, 2024 | 15:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Kieback&Peter DDC4000 Series Path Traversal

Kieback & Peter's DDC4000 series is vulnerable to a path traversal vulnerability, which may allow an unauthenticated attacker to read files on the system.

Action-Not Available
Vendor-Kieback&PeterKieback & Peterkieback\&peter
Product-DDC4400eDDC4002DDC4100DDC4400DDC4200-LDDC4040eDDC4020eDDC4200eDDC4200DDC4002eddc4200e_firmwareddc4002e_firmwareddc4100_firmwareddc4400e_firmwareddc4200_firmwareddc4400_firmwareddc4040e_firmwareddc4002_firmwareddc4020e_firmwareddc4200-l_firmware
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2026-22886
Matching Score-4
Assigner-Eclipse Foundation
ShareView Details
Matching Score-4
Assigner-Eclipse Foundation
CVSS Score-9.8||CRITICAL
EPSS-Not Assigned
Published-03 Mar, 2026 | 09:18
Updated-03 Mar, 2026 | 14:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

OpenMQ exposes a TCP-based management service (imqbrokerd) that by default requires authentication. However, the product ships with a default administrative account (admin/ admin) and does not enforce a mandatory password change on first use. After the first successful login, the server continues to accept the default password indefinitely without warning or enforcement. In real-world deployments, this service is often left enabled without changing the default credentials. As a result, a remote attacker with access to the service port could authenticate as an administrator and gain full control of the protocol’s administrative features.

Action-Not Available
Vendor-Eclipse Foundation AISBL
Product-Eclipse OpenMQ
CWE ID-CWE-1391
Use of Weak Credentials
CWE ID-CWE-1392
Use of Default Credentials
CWE ID-CWE-1393
Use of Default Password
CVE-2024-51978
Matching Score-4
Assigner-Rapid7, Inc.
ShareView Details
Matching Score-4
Assigner-Rapid7, Inc.
CVSS Score-9.8||CRITICAL
EPSS-48.34% / 97.69%
||
7 Day CHG~0.00%
Published-25 Jun, 2025 | 07:17
Updated-25 Jul, 2025 | 16:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Authentication bypass via default password generation affecting multiple models from Brother Industries, Ltd, Toshiba Tec, and Konica Minolta, Inc.

An unauthenticated attacker who knows the target device's serial number, can generate the default administrator password for the device. An unauthenticated attacker can first discover the target device's serial number via CVE-2024-51977 over HTTP/HTTPS/IPP, or via a PJL request, or via an SNMP request.

Action-Not Available
Vendor-Konica Minolta, Inc.Brother Industries, LtdToshiba Tec
Product-HL-L2865DWHL-L2360DNDCP-L2531DWDCP-J4543NHL-1210WRHL-L2400DWEDCP-B7578DWHL-L1232WMFC-L2717DWDCP-L6600DWMFC-7895DWMFC-J6580CDWMFC-J3930DWHL-L3240CDWDCP-T230HL-1218WMFC-L5802DWDCP-L2605DWMFC-J1170DWADS-3300Wbizhub 5020iMFC-L8690CDWMFC-J5340DWMFC-J5345DWHL-L2371DNPT-E550W (for Russia)MFC-B7810DWBMFC-L9570CDW(for Japan)DCP-L2540DWHL-L2340DWMFC-J3940DWHL-L2375DWRQL-1115NWBMFC-J1215WMFC-L6800DWDCP-L1632WDCP-L2640DWMFC-J1205W(XL)MFC-L5700DWHL-L6410DNDCP-L3560CDWDCP-L2520DWDCP-L5510DNDCP-L5500DNDCP-J982N-W/BDCP-T420WDCP-J4143NHL-L2350DWMFC-L2800DWMFC-J6730DWMFC-L2710DWRDCP-T435WDCP-L2627DWHL-L3300CDWHL-L2461DNMFC-L2860DWHL-B2150WMFC-L2860DWEMFC-J5845DW(XL)PT-P750WMFC-L6810DWPT-E550W (for Vietnum)MFC-J4345DW XLMFC-L5717DWDCP-L2627DWXLMFC-L2880DWDCP-L3555CDWHL-L3215CWMFC-9150CDNMFC-L6702DWDCP-C1210NHL-L6200DWMFC-J6955DWRJ-3150AiDCP-L3510CDWMFC-L2751DWDCP-B7640DWBDCP-L3551CDWHL-L2357DWTD-2350DDCP-T530DWHL-L6210DWSP-1 (for Japan)HL-L6412DWDCP-L2627DWEMFC-J1605DNDCP-1623WRDCP-9030CDNDCP-L2647DWMFC-L5800DWHL-L6400DWGMFC-L5850DWMFC-J4340DW(XL)HL-L2366DWDCP-T226DCP-1610WEMFC-J4443NMFC-L5715DNMFC-J939DNTJ-4121TNRPT-D800WHL-L6300DWMFC-J5335DWMFC-T810W(for China)DCP-1610WDCP-T825DWHL-L2465DWMFC-L8610CDW(for Japan)MFC-L5900DWHL-L9310CDWDCP-B7620DWADS-1250WMFC-L5715DWMFC-L8395CDWHL-L2385DWMFC-J1012DWQL-810WHL-L6415DWTJ-4020TNDCP-1618WHL-L5210DWTHL-L2390DWMFC-L6912DWNFC-EX670HL-L3220CWDCP-L1848WMFC-L2817DWTD-4750TNWBRTJ-4021TNMFC-L5702DWHL-B2158WDCP-L2551DWNFC-J903NMFC-J497DWDCP-B7658DWPT-E550W (for US, EU)HL-L6402DWPT-P950NWMFC-J904NMFC-J939DWNDCP-L5652DNMFC-L8900CDWMFC-L2900DWXLMFC-L8340CDWMFC-7889DWDCP-1616NWDCP-J572NHL-L2360DWRJ-3150HL-L2351DWDCP-J981NDCP-J988NHL-L2350DWRTD-2350DFSAHL-3190CDWHL-L6217DWHL-L6450DWMFC-L2802DNMFC-L5750DWDCP-L5518DNHL-L2425DWTD-2125NQL-1110NWBcDCP-B7620DWBMFC-L9635CDNDCP-J572DWDCP-1612WDCP-L3550CDWMFC-J2730DWMFC-L2820DWXLMFC-L5700DNMFC-J738DWNDCP-L2552DNMFC-L6700DWTD-2310DHL-L5228DWDCP-L2665DWDCP-T220MFC-L5728DWDCP-L8410CDWMFC-1915WDCP-L2550DWQL-810WcMFC-L2900DWDCP-L5600DNMFC-J7100CDWHL-J6000DWMFC-J995DW XLDCP-L3520CDWMFC-L3735CDNDCP-J1140DWHL-L2386DWMFC-L2827DWXLHL-L1230WMFC-J4540NDCP-L2535DWRJ-4250WBMFC-L8610CDWHL-J6000CDWHL-L1808WDCP-J914NMFC-J690DWMFC-L2805DWHL-L8360CDWADS-2400NRJ-3035BMFC-J815DW XLHL-L2460DWXLDCP-L5610DNHL-5595DNHMFC-L2732DWMFC-L8390CDWMFC-J491DWRJ-2050TD-2120NMFC-L2713DWDCP-L2620DWHL-L2440DWDCP-J1200WEDCP-L1638WMFC-L9577CDWMFC-1910WDCP-T536DWHL-L9430CDNMFC-EX670WPT-E850TKW (for Asia pacific, EU, US)MFC-L2750DWRDCP-B7638DNDCP-L2520DWRDCP-J577NTD-2130NDCP-L3515CDWDCP-B7648DWHL-L2480DWMFC-L2685DWMFC-1916NWMFC-L2886DWMFC-L2707DWHL-EX415DWDCP-J972NHL-L8245CDWRJ-2150MFC-J6930DWHL-L6300DWTHL-L2375DWMFC-T910DWbizhub 5000iMFC-L6902DWPT-E550W (for Thailand)MFC-L2861DWMFC-L2720DWRMFC-8540DNTJ-4422TNDCP-1610WRHL-1222WEDCP-T439WQL-1110NWBHL-L2447DWMFC-L9630CDNDCP-L2625DWPT-E850TKW (for UAE)HL-L3220CWEHL-L5102DWMFC-J890DWTD-4520DNPT-P900WcHL-L6415DNHL-L9470CDNMFC-J905NDCP-7090DWMFC-J893NDCP-7190DNDCP-7195DWHL-L2400DWPT-E850TKW (for China)MFC-J5930DWDCP-7189DWHL-L6202DWMFC-B7800DNMFC-J1300DWHL-L6210DWTDCP-L2532DWTJ-4121TNMFC-J6945DWDCP-T525WMFC-J4540DW(XL)DCP-L2550DNMFC-J4440NMFC-L5718DNDCP-L2640DNHL-2560DNHL-EX470WMFC-L2730DNMFC-L3780CDWDCP-T735DWHL-L2360DNRHL-L6400DWTMFC-L5912DWHL-5590DNHL-L2370DNRDCP-J987N-BMFC-T4500DWHL-B2100DPT-E850TKW (for Koria)MFC-J739DNHL-L2340DWRMFC-L2730DWMFC-J6959DWMFC-L6710DWMFC-L6970DWMFC-L5710DWDCP-J4140Nbizhub 4000iHL-L2467DWVC-500WDCP-B7558WMFC-J2330DWHL-L3290CDWADS-4700WHL-2569DWMFC-L2827DWMFC-L6900DWMFC-J1500NMFC-J805DWHL-L3270CDWHL-1223WEMFC-1919NWDCP-J528NMFC-J4335DW(XL)MFC-L2770DWHL-L5210DNMFC-T925DWDCP-T820DWTJ-4021TNRHL-L6200DWTTD-4420DNZMFC-L2802DWDCP-B7608WDCP-L2540DNDCP-L2537DWTJ-4005DNMFC-J6555DW XLDCP-J928N-WBMFC-L2690DWHL-L2325DWMFC-L2771DWDCP-B7535DWDCP-L2550DNRMFC-1911WMFC-J6555DWMFC-L3740CDWMFC-L3740CDWEMFC-L2880DWXLTD-4650TNWBRPT-E550W (for China)MFC-J6983CDWMFC-L6915DNMFC-L6950DWHL-J7010CDWHL-L5200DWTHL-1212WRHL-1212WEMFC-J5730DWDCP-T238MFC-1912WRDCP-L5510DWHL-L2460DWHL-L2380DWMFC-J6530DWHL-L2352DWMFC-7880DNTD-2320DSADCP-L2660DWDCP-J772DWHL-L2315DWHL-2590DNMFC-J6540DWEMFC-L2710DNMFC-B7715DWMFC-L3730CDNTD-2135NRJ-2035BMFC-L2980DWDCP-B7530DNDCP-L2551DNDCP-T830DWQL-820NWBHL-B2100DBDCP-B7600DBDCP-B7548WDCP-C421WMFC-L5710DNMFC-L2885DWMFC-L2705DWRJ-3050HL-B2080DWMFC-1910WEHL-L3280CDWMFC-L5755DWMFC-J6940DWDCP-L2540DNRMFC-J998DWNDCP-1615NWMFC-B7810DWTD-4550DNWBHL-L6400DWHL-T4000DWMFC-B7811DWADS-3600WHL-L3295CDWDCP-T710W(for China)DCP-L2560DWRDCP-L2622DWHL-L5212DWTJ-4420TNMFC-L2806DWDCP-J1200W(XL)MFC-T810WDCP-T520WHL-JF1MFC-L6910DNMFC-J895DWMFC-L2701DWTJ-4520TNHL-L3230CDNMFC-J5945DWMFC-L2715DWDCP-J1200NPT-E850TKW (for Vietnum)MFC-J738DNDCP-L2530DWHL-L2405WMFC-J5330DWHL-B2181DWDCP-T225DCP-J1203NADS-4900WHL-L2372DNMFC-L2700DNHL-L8240CDWHL-L8260CDNMFC-J5955DWDCP-L5650DNMFC-J6997CDWMFC-L2710DWHL-L6250DNDCP-7190DWPJ-773MFC-L2740DWDCP-T730DWFAX-L2710DNMFC-J5855DWMFC-J1800DWMFC-L2716DWHL-L5215DNMFC-T935DWADS-2800WHL-L5100DNTMFC-L6900DWGDCP-L3568CDWDCP-B7650DWDCP-L2600DWTJ-4010TNMFC-J4940DNMFC-L2862DWHL-L2464DWMFC-L3710CDWMFC-J6999CDWHL-L2475DWHL-1211WHL-L2370DWXLTD-2350DFMFC-7890DNDCP-T436WMFC-T920DWHL-L8260CDWTD-4420TNDCP-L3520CDWETD-4420DNHL-L2395DWHL-L6418DWHL-L5202DWMFC-J5800CDWHL-L2365DWMFC-T930DWHL-L2365DWRDCP-1617NWMFC-J6947DWQL-820NWBcHL-L8360CDWTMFC-L2922DWDCP-L3517CDWADS-1700WMFC-J6995CDWMFC-L2750DWDCP-L2648DWMFC-L3770CDWMFC-L2700DW(ASA)DCP-T428WHL-1223WRDCP-J973N-W/BFAX-L2800DWMFC-J5630CDWMFC-L3760CDWMFC-L6915DN CSPHL-L2420DWMFC-L2700DWRMFC-L3720CDWMFC-8530DNRJ-3050AiMFC-J739DWNMFC-L9610CDNDCP-J987N-WDCP-L1630WHL-L8230CDWDCP-T510W(for China)DCP-J1800NHL-L2460DNMFC-L2700DWMFC-J1010DWMFC-J7600CDWDCP-L5602DNDCP-T535DWDCP-L2518DWHL-L1238WMFC-J805DW XLRJ-3250WBMFC-L2715DW(for Tiwan, Koria)TJ-4620TNHL-L3220CDWMFC-L2820DWHL-L5215DWDS-740DMFC-1911NWHL-L2376DWDCP-1622WEADS-4300NMFC-J6583CDWDCP-J1050DWHL-1212WHL-L9410CDNMFC-J6935DWDCP-T430WMFC-L3750CDWMFC-J7700CDWDCP-J1800DWDCP-T236MFC-J6535DWMFC-L3745CDWPT-E550W (for Koria)HL-L5050DNMFC-L3768CDWHL-L3230CDWTJ-4120TNMFC-L2835DWMFC-L9570CDWMFC-L2920DWADS-2700WeMFC-L6915DWHL-L5218DNMFC-L2720DNMFC-L3765CDWHL-B2180DWBDCP-B7520DWPT-E800WHL-3160CDWMFC-L2765DWMFC-J5830DWDCP-T510WMFC-L5915DWHL-1210WMFC-L2710DNRMFC-L2740DWRDCP-T720DWMFC-J5855DW XLDCP-L2560DWTD-4650TNWBHL-J6100DWMFC-L2680WDCP-L5502DNDCP-7180DNbizhub 4020iMFC-4340DWETD-2320DFMFC-EX915DWDCP-1623WEMFC-J6540DWMFC-L2703DWPJ-883HL-L2445DWADS-1350WMFC-J998DNHL-L6415DWTMFC-L2760DWADS-2700WDS/MDS-940DWHL-L5210DWPT-E550W (for Tiwan, Hongkong)HL-J6010DWHL-L5212DNDCP-L2508DWDCP-L2628DWMFC-L2720DWHL-L5100DNDCP-J915NMFC-L2750DWXLHL-L2370DWMFC-J3540DWDCP-L5662DNTJ-TJ-4522TNTD-2320DDCP-L2541DWe-STUDIO302DNFMFC-J3530DWMFC-J898NHL-5595DNPT-E850TKW (for Tiwan)HL-L3228CDWMFC-L2712DWDCP-T426WDCP-J582NHL-1210WEHL-B2188DWMFC-J4535DW(XL)DCP-L5660DNMFC-L2712DNMFC-L3755CDWMFC-J6740DWMFC-L2960DWMFC-J5740DWMFC-L2807DWDCP-J526NMFC-L2730DWRHL-L2370DNHL-B2180DWHL-L3288CDWMFC-J2740DWPT-E850TKW (for Thailand)HL-L6310DWRJ-2140MFC-EX910DCP-B7600DHL-2595DWMFC-L5902DWMFC-J4440DWFAX-L2700DNMFC-J6980CDWHL-L3210CWMFC-J995DWMFC-L6820DWMFC-J7300CDWDCP-B7640DWMFC-J7500CDWMFC-J5340DWEDCP-L3528CDWDCP-1612WRDCP-L2548DWMFC-J2340DWMFC-9350CDWMFC-J926N-WBe-STUDIO301DNDCP-J978N-W/BHL-L6415DN CSPDCP-L2680DWTD-4750TNWBDCP-J587NHL-L6250DWTD-4520TNDCP-L2600DHL-B2050DNSP-1MFC-L6750DWDCP-J1700DWADS-1800WDCP-T725DWTD-2350DSAMFC-L9670CDNDCP-B7628DWDCP-J774DWHL-L5200DWMFC-B7720DNDCP-L5512DNDCP-T425WDCP-T710WDCP-1612WEHL-L2305WMFC-L6720DWDCP-T835DWDCP-L2530DWRADS-3000NMFC-J6957DWPT-P900WADS-4500WDCP-L2550DW(TWN)DCP-J1100DW
CWE ID-CWE-1391
Use of Weak Credentials
CVE-2025-6077
Matching Score-4
Assigner-CERT/CC
ShareView Details
Matching Score-4
Assigner-CERT/CC
CVSS Score-9.8||CRITICAL
EPSS-0.06% / 19.57%
||
7 Day CHG+0.01%
Published-02 Aug, 2025 | 02:15
Updated-03 Nov, 2025 | 20:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CVE-2025-6077

Partner Software's Partner Software Product and corresponding Partner Web application use the same default username and password for the administrator account across all versions.

Action-Not Available
Vendor-Partner Software
Product-Partner Web
CWE ID-CWE-1391
Use of Weak Credentials
CVE-2023-0635
Matching Score-4
Assigner-Asea Brown Boveri Ltd. (ABB)
ShareView Details
Matching Score-4
Assigner-Asea Brown Boveri Ltd. (ABB)
CVSS Score-7.8||HIGH
EPSS-0.14% / 34.72%
||
7 Day CHG+0.03%
Published-05 Jun, 2023 | 03:42
Updated-08 Jan, 2025 | 16:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Privilege escalation to root

Improper Privilege Management vulnerability in ABB Ltd. ASPECT®-Enterprise on ASPECT®-Enterprise, Linux (2CQG103201S3021, 2CQG103202S3021, 2CQG103203S3021, 2CQG103204S3021 modules), ABB Ltd. NEXUS Series on NEXUS Series, Linux (2CQG100102R2021, 2CQG100104R2021, 2CQG100105R2021, 2CQG100106R2021, 2CQG100110R2021, 2CQG100112R2021, 2CQG100103R2021, 2CQG100107R2021, 2CQG100108R2021, 2CQG100109R2021, 2CQG100111R2021, 2CQG100113R2021 modules), ABB Ltd. MATRIX Series on MATRIX Series, Linux (2CQG100102R1021, 2CQG100103R1021, 2CQG100104R1021, 2CQG100105R1021, 2CQG100106R1021 modules) allows Privilege Escalation.This issue affects ASPECT®-Enterprise: from 3.0;0 before 3.07.01; NEXUS Series: from 3.0;0 before 3.07.01; MATRIX Series: from 3.0;0 before 3.07.01.

Action-Not Available
Vendor-ABB
Product-nexus-264-amatrix-11_firmwarematrix-264_firmwarematrix-232nexus-2128-g_firmwarenexus-264nexus-2128-aaspect-ent-96nexus-2128-gnexus-264_firmwarenexus-2128_firmwarenexus-2128-fnexus-264-a_firmwarenexus-2128-a_firmwarematrix-216matrix-296_firmwarematrix-216_firmwareaspect-ent-256nexus-3-264_firmwareaspect-ent-12aspect-ent-256_firmwarematrix-11nexus-264-faspect-ent-2_firmwarenexus-264-g_firmwarenexus-264-f_firmwarenexus-2128nexus-3-2128nexus-3-2128_firmwarematrix-232_firmwarenexus-264-gaspect-ent-12_firmwarematrix-296aspect-ent-2nexus-2128-f_firmwarenexus-3-264aspect-ent-96_firmwarematrix-264MATRIX SeriesNEXUS SeriesASPECT®-Enterprise
CWE ID-CWE-1391
Use of Weak Credentials
CVE-2025-30519
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.3||CRITICAL
EPSS-0.06% / 18.42%
||
7 Day CHG+0.01%
Published-18 Sep, 2025 | 20:46
Updated-19 Sep, 2025 | 16:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Dover Fueling Solutions ProGauge MagLink LX4 Devices Use of Weak Credentials

Dover Fueling Solutions ProGauge MagLink LX4 Devices have default root credentials that cannot be changed through standard administrative means. An attacker with network access to the device can gain administrative access to the system.

Action-Not Available
Vendor-Dover Fueling Solutions
Product-ProGauge MagLink LX PlusProGauge MagLink LX 4ProGauge MagLink LX Ultimate
CWE ID-CWE-1391
Use of Weak Credentials
CVE-2024-12728
Matching Score-4
Assigner-Sophos Limited
ShareView Details
Matching Score-4
Assigner-Sophos Limited
CVSS Score-9.8||CRITICAL
EPSS-0.22% / 44.53%
||
7 Day CHG~0.00%
Published-19 Dec, 2024 | 20:48
Updated-12 Nov, 2025 | 19:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A weak credentials vulnerability potentially allows privileged system access via SSH to Sophos Firewall older than version 20.0 MR3 (20.0.3).

Action-Not Available
Vendor-Sophos Ltd.
Product-firewallfirewall_firmwareSophos Firewall
CWE ID-CWE-1391
Use of Weak Credentials
CVE-2023-31240
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-8.3||HIGH
EPSS-0.07% / 21.16%
||
7 Day CHG~0.00%
Published-22 May, 2023 | 19:58
Updated-16 Jan, 2025 | 21:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Snap One OvrC Pro versions prior to 7.2 have their own locally running web server accessible both from the local network and remotely. OvrC cloud contains a hidden superuser account accessible through hard-coded credentials.

Action-Not Available
Vendor-snaponeSnap One
Product-orvcOvrC Cloud
CWE ID-CWE-1391
Use of Weak Credentials
Details not found