Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2024-6788

Summary
Assigner-CERTVDE
Assigner Org ID-270ccfa6-a436-4e77-922e-914ec3a9685c
Published At-13 Aug, 2024 | 13:15
Updated At-22 Aug, 2025 | 10:24
Rejected At-
Credits

Phoenix Contact: update feature from CHARX controller can be used to reset a low privilege user password

A remote unauthenticated attacker can use the firmware update feature on the LAN interface of the device to reset the password for the predefined, low-privileged user “user-app” to the default password.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:CERTVDE
Assigner Org ID:270ccfa6-a436-4e77-922e-914ec3a9685c
Published At:13 Aug, 2024 | 13:15
Updated At:22 Aug, 2025 | 10:24
Rejected At:
▼CVE Numbering Authority (CNA)
Phoenix Contact: update feature from CHARX controller can be used to reset a low privilege user password

A remote unauthenticated attacker can use the firmware update feature on the LAN interface of the device to reset the password for the predefined, low-privileged user “user-app” to the default password.

Affected Products
Vendor
Phoenix Contact GmbH & Co. KGPHOENIX CONTACT
Product
CHARX SEC-3000
Default Status
unaffected
Versions
Affected
  • From 0 before 1.6.3 (semver)
Vendor
Phoenix Contact GmbH & Co. KGPHOENIX CONTACT
Product
CHARX SEC-3050
Default Status
unaffected
Versions
Affected
  • From 0 before 1.6.3 (semver)
Vendor
Phoenix Contact GmbH & Co. KGPHOENIX CONTACT
Product
CHARX SEC-3100
Default Status
unaffected
Versions
Affected
  • From 0 before 1.6.3 (semver)
Vendor
Phoenix Contact GmbH & Co. KGPHOENIX CONTACT
Product
CHARX SEC-3150
Default Status
unaffected
Versions
Affected
  • From 0 before 1.6.3 (semver)
Problem Types
TypeCWE IDDescription
CWECWE-1392CWE-1392 Use of Default Credentials
Type: CWE
CWE ID: CWE-1392
Description: CWE-1392 Use of Default Credentials
Metrics
VersionBase scoreBase severityVector
3.18.6HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
Version: 3.1
Base score: 8.6
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

finder
McCaulay Hudson
finder
Alexander Plaskett
reporter
NCC Group
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://cert.vde.com/en/advisories/VDE-2024-022
N/A
Hyperlink: https://cert.vde.com/en/advisories/VDE-2024-022
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Vendor
Phoenix Contact GmbH & Co. KGphoenixcontact
Product
charx_sec_3150
CPEs
  • cpe:2.3:a:phoenixcontact:charx_sec_3000:*:*:*:*:*:*:*:*
  • cpe:2.3:a:phoenixcontact:charx_sec_3050:*:*:*:*:*:*:*:*
  • cpe:2.3:a:phoenixcontact:charx_sec_3100:*:*:*:*:*:*:*:*
  • cpe:2.3:a:phoenixcontact:charx_sec_3150:*:*:*:*:*:*:*:*
Default Status
unaffected
Versions
Affected
  • From 0 before 1.6.3 (custom)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:info@cert.vde.com
Published At:13 Aug, 2024 | 14:15
Updated At:22 Aug, 2025 | 11:15

A remote unauthenticated attacker can use the firmware update feature on the LAN interface of the device to reset the password for the predefined, low-privileged user “user-app” to the default password.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.18.6HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
Primary3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 8.6
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
Type: Primary
Version: 3.1
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CPE Matches

Phoenix Contact GmbH & Co. KG
phoenixcontact
>>charx_sec-3000_firmware>>Versions before 1.6.3(exclusive)
cpe:2.3:o:phoenixcontact:charx_sec-3000_firmware:*:*:*:*:*:*:*:*
Phoenix Contact GmbH & Co. KG
phoenixcontact
>>charx_sec-3000>>-
cpe:2.3:h:phoenixcontact:charx_sec-3000:-:*:*:*:*:*:*:*
Phoenix Contact GmbH & Co. KG
phoenixcontact
>>charx_sec-3050_firmware>>Versions before 1.6.3(exclusive)
cpe:2.3:o:phoenixcontact:charx_sec-3050_firmware:*:*:*:*:*:*:*:*
Phoenix Contact GmbH & Co. KG
phoenixcontact
>>charx_sec-3050>>-
cpe:2.3:h:phoenixcontact:charx_sec-3050:-:*:*:*:*:*:*:*
Phoenix Contact GmbH & Co. KG
phoenixcontact
>>charx_sec-3100_firmware>>Versions before 1.6.3(exclusive)
cpe:2.3:o:phoenixcontact:charx_sec-3100_firmware:*:*:*:*:*:*:*:*
Phoenix Contact GmbH & Co. KG
phoenixcontact
>>charx_sec-3100>>-
cpe:2.3:h:phoenixcontact:charx_sec-3100:-:*:*:*:*:*:*:*
Phoenix Contact GmbH & Co. KG
phoenixcontact
>>charx_sec-3150_firmware>>Versions before 1.6.3(exclusive)
cpe:2.3:o:phoenixcontact:charx_sec-3150_firmware:*:*:*:*:*:*:*:*
Phoenix Contact GmbH & Co. KG
phoenixcontact
>>charx_sec-3150>>-
cpe:2.3:h:phoenixcontact:charx_sec-3150:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-1392Primaryinfo@cert.vde.com
CWE ID: CWE-1392
Type: Primary
Source: info@cert.vde.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://cert.vde.com/en/advisories/VDE-2024-022info@cert.vde.com
Third Party Advisory
Hyperlink: https://cert.vde.com/en/advisories/VDE-2024-022
Source: info@cert.vde.com
Resource:
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

26Records found

CVE-2024-25996
Matching Score-8
Assigner-CERT@VDE
ShareView Details
Matching Score-8
Assigner-CERT@VDE
CVSS Score-5.3||MEDIUM
EPSS-0.62% / 69.04%
||
7 Day CHG~0.00%
Published-12 Mar, 2024 | 08:11
Updated-23 Jan, 2025 | 18:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
PHOENIX CONTACT: Remote code execution due to an origin validation error in CHARX Series

An unauthenticated remote attacker can perform a remote code execution due to an origin validation error. The access is limited to the service user.

Action-Not Available
Vendor-Phoenix Contact GmbH & Co. KG
Product-charx_sec-3150_firmwarecharx_sec-3050charx_sec-3000_firmwarecharx_sec-3100_firmwarecharx_sec-3100charx_sec-3000charx_sec-3150charx_sec-3050_firmwareCHARX SEC-3050CHARX SEC-3000CHARX SEC-3150CHARX SEC-3100charx_sec_3150charx_sec_3050charx_sec_3100charx_sec_3000
CWE ID-CWE-346
Origin Validation Error
CVE-2024-25995
Matching Score-8
Assigner-CERT@VDE
ShareView Details
Matching Score-8
Assigner-CERT@VDE
CVSS Score-9.8||CRITICAL
EPSS-2.37% / 84.33%
||
7 Day CHG+0.48%
Published-12 Mar, 2024 | 08:10
Updated-30 Jan, 2025 | 11:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
PHOENIX CONTACT: Remote code execution in CHARX Series

An unauthenticated remote attacker can modify configurations to perform a remote code execution, gain root rights or perform an DoS due to improper input validation.

Action-Not Available
Vendor-Phoenix Contact GmbH & Co. KG
Product-charx_sec-3050_firmwarecharx_sec-3000charx_sec-3150_firmwarecharx_sec-3050charx_sec-3100charx_sec-3150charx_sec-3000_firmwarecharx_sec-3100_firmwareCHARX SEC-3050CHARX SEC-3100CHARX SEC-3150CHARX SEC-3000charx_sec_3100charx_sec_3000charx_sec_3150charx_sec_3050
CWE ID-CWE-20
Improper Input Validation
CVE-2024-26001
Matching Score-8
Assigner-CERT@VDE
ShareView Details
Matching Score-8
Assigner-CERT@VDE
CVSS Score-7.4||HIGH
EPSS-0.73% / 71.70%
||
7 Day CHG~0.00%
Published-12 Mar, 2024 | 08:12
Updated-24 Jan, 2025 | 07:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
PHOENIX CONTACT: Out of bounds write only memory access

An unauthenticated remote attacker can write memory out of bounds due to improper input validation in the MQTT stack. The brute force attack is not always successful because of memory randomization.

Action-Not Available
Vendor-Phoenix Contact GmbH & Co. KG
Product-charx_sec-3000_firmwarecharx_sec-3000charx_sec-3150_firmwarecharx_sec-3150charx_sec-3050charx_sec-3100_firmwarecharx_sec-3050_firmwarecharx_sec-3100CHARX SEC-3000CHARX SEC-3050CHARX SEC-3150CHARX SEC-3100charx_sec_3100charx_sec_3150charx_sec_3050charx_sec_3000
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-0757
Matching Score-8
Assigner-CERT@VDE
ShareView Details
Matching Score-8
Assigner-CERT@VDE
CVSS Score-9.8||CRITICAL
EPSS-0.81% / 73.28%
||
7 Day CHG~0.00%
Published-14 Dec, 2023 | 14:04
Updated-02 Aug, 2024 | 05:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Phoenix Contact ProConOS prone to Incorrect Permission Assignment for Critical Resource

Incorrect Permission Assignment for Critical Resource vulnerability in PHOENIX CONTACT MULTIPROG, PHOENIX CONTACT ProConOS eCLR (SDK) allows an unauthenticated remote attacker to upload arbitrary malicious code and gain full access on the affected device.

Action-Not Available
Vendor-Phoenix Contact GmbH & Co. KG
Product-multiprogproconos_eclrMULTIPROGProConOS eCLR (SDK)
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2020-12519
Matching Score-8
Assigner-CERT@VDE
ShareView Details
Matching Score-8
Assigner-CERT@VDE
CVSS Score-8.8||HIGH
EPSS-0.15% / 36.48%
||
7 Day CHG~0.00%
Published-17 Dec, 2020 | 22:43
Updated-17 Sep, 2024 | 01:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Phoenix Contact PLCnext Control Devices versions before 2021.0 LTS: An attacker can use this vulnerability i.e. to open a reverse shell with root privileges.

On Phoenix Contact PLCnext Control Devices versions before 2021.0 LTS an attacker can use this vulnerability i.e. to open a reverse shell with root privileges.

Action-Not Available
Vendor-Phoenix Contact GmbH & Co. KG
Product-axc_f_2152axc_f_2152_starterkitaxc_f_1152rfc_4072saxc_f_3152plcnext_firmwareplcnext_technology_starterkitPLCnext Technology Starterkit (1188165)AXC F 1152 (1151412)AXC F 2152 (2404267)RFC 4072S (1051328AXC F 3152 (1069208)AXC F 2152 Starterkit (1046568)
CWE ID-CWE-269
Improper Privilege Management
CVE-2019-9201
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-2.01% / 82.96%
||
7 Day CHG~0.00%
Published-26 Feb, 2019 | 23:00
Updated-16 Sep, 2024 | 18:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple Phoenix Contact devices allow remote attackers to establish TCP sessions to port 1962 and obtain sensitive information or make changes, as demonstrated by using the Create Backup feature to traverse all directories.

Action-Not Available
Vendor-n/aPhoenix Contact GmbH & Co. KG
Product-ilc_151_eth\/xc_firmwareilc_171_eth_2tx_firmwareilc_171_eth_2txilc_151_eth\/xcilc_131_eth\/xc_firmwareilc_131_eth\/xcilc_191_me\/anilc_191_eth_2txilc_191_eth_2tx_firmwareaxc_1050ilc_191_me\/an_firmwareilc_131_eth_firmwareilc_131_ethilc_151_eth_firmwareaxc_1050_firmwareilc_151_ethn/a
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2023-46141
Matching Score-8
Assigner-CERT@VDE
ShareView Details
Matching Score-8
Assigner-CERT@VDE
CVSS Score-9.8||CRITICAL
EPSS-0.81% / 73.28%
||
7 Day CHG~0.00%
Published-14 Dec, 2023 | 14:05
Updated-02 Aug, 2024 | 20:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Phoenix Contact: Automation Worx and classic line controllers prone to Incorrect Permission Assignment for Critical Resource

Incorrect Permission Assignment for Critical Resource vulnerability in multiple products of the PHOENIX CONTACT classic line allow an remote unauthenticated attacker to gain full access of the affected device.

Action-Not Available
Vendor-Phoenix Contact GmbH & Co. KG
Product-rfc_470s_pn_3tx_firmwareconfig\+pc_worx_rt_basic_firmwareilc1x1rfc_470s_pn_3txpc_worx_rt_basicpc_worx_srtrfc_460r_pn_3txautomationworx_software_suitepc_worxpc_worx_expressaxc_1050_xc_firmwareilc1x0ilc_3xx_firmwarerfc_430_eth-ibfc_350_pci_ethaxc_3050_firmwareilc1x1_firmwareilc_3xxrfc_480s_pn_4txaxc_1050_xcrfc_460r_pn_3tx_firmwareaxc_1050rfc_430_eth-ib_firmwareilc1x0_firmwarerfc_450_eth-ib_firmwarerfc_450_eth-ibrfc_480s_pn_4tx_firmwareaxc_3050axc_1050_firmwarefc_350_pci_eth_firmwareRFC 480S PN 4TXILC1x0Automation Worx Software SuiteAXC 3050PC WORX SRTPC Worx ExpressRFC 450 ETH-IBRFC 470S PN 3TXPC WorxRFC 430 ETH-IBAXC 1050PC WORX RT BASICILC 3xxFC 350 PCI ETHILC1x1Config+RFC 460R PN 3TXAXC 1050 XC
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2017-5159
Matching Score-8
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-8
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.8||CRITICAL
EPSS-0.74% / 72.00%
||
7 Day CHG~0.00%
Published-13 Feb, 2017 | 21:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on Phoenix Contact mGuard devices that have been updated to Version 8.4.0. When updating an mGuard device to Version 8.4.0 via the update-upload facility, the update will succeed, but it will reset the password of the admin user to its default value.

Action-Not Available
Vendor-n/aPhoenix Contact GmbH & Co. KG
Product-mguard_firmwarePhoenix Contact mGuard 8.4.0
CWE ID-CWE-99
Improper Control of Resource Identifiers ('Resource Injection')
CVE-2025-25270
Matching Score-8
Assigner-CERT@VDE
ShareView Details
Matching Score-8
Assigner-CERT@VDE
CVSS Score-9.8||CRITICAL
EPSS-0.25% / 48.48%
||
7 Day CHG~0.00%
Published-08 Jul, 2025 | 07:00
Updated-11 Jul, 2025 | 14:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Remote Code Execution via Unauthenticated Configuration Manipulation

An unauthenticated remote attacker can alter the device configuration in a way to get remote code execution as root with specific configurations.

Action-Not Available
Vendor-Phoenix Contact GmbH & Co. KG
Product-charx_sec-3100charx_sec-3150charx_sec-3050_firmwarecharx_sec-3050charx_sec-3100_firmwarecharx_sec-3150_firmwarecharx_sec-3000_firmwarecharx_sec-3000CHARX SEC-3050CHARX SEC-3150CHARX SEC-3100CHARX SEC-3000
CWE ID-CWE-913
Improper Control of Dynamically-Managed Code Resources
CVE-2023-3935
Matching Score-8
Assigner-CERT@VDE
ShareView Details
Matching Score-8
Assigner-CERT@VDE
CVSS Score-9.8||CRITICAL
EPSS-0.22% / 44.47%
||
7 Day CHG~0.00%
Published-13 Sep, 2023 | 13:19
Updated-27 Aug, 2025 | 20:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Wibu: Buffer Overflow in CodeMeter Runtime

A heap buffer overflow vulnerability in Wibu CodeMeter Runtime network service up to version 7.60b allows an unauthenticated, remote attacker to achieve RCE and gain full access of the host system.

Action-Not Available
Vendor-trumpfwibuWibuPhoenix Contact GmbH & Co. KG
Product-programmingtubeplcnext_engineertrumpflicenseexpertmodule_type_package_designertubedesigntopscalculationtrutopsboostcodemeter_runtimeactivation_wizardtrutopsfab_storage_smallstoreoseontrutopsfabtrutopsweldtrutops_cell_classicteczonebende-mobility_charging_suitetrutopsiol-conftrutopsprintfl_network_managertops_unfoldtrutopsprintmultilaserassistanttrutops_cell_sw48trutops_mark_3dCodeMeter Runtime
CWE ID-CWE-787
Out-of-bounds Write
CVE-2022-31800
Matching Score-8
Assigner-CERT@VDE
ShareView Details
Matching Score-8
Assigner-CERT@VDE
CVSS Score-9.8||CRITICAL
EPSS-1.98% / 82.84%
||
7 Day CHG~0.00%
Published-21 Jun, 2022 | 08:00
Updated-16 Sep, 2024 | 16:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Insufficient Verification of Data Vulnerability in PHOENIX CONTACT classic line industrial controllers

An unauthenticated, remote attacker could upload malicious logic to devices based on ProConOS/ProConOS eCLR in order to gain full control over the device.

Action-Not Available
Vendor-Phoenix Contact GmbH & Co. KG
Product-rfc_470s_pn_3tx_firmwareilc1x1pc_worx_rt_basicpc_worx_srtrfc_460r_pn_3txrfc_470_pn_3tx_firmwareilc1x0rfc_460r_pn_3tx-srfc_430_eth-ibfc_350_pci_ethaxc_3050_firmwareilc1x1_firmwareilc_3xxrfc_480s_pn_4txaxc_1050_xcrfc_430_eth-ib_firmwarerfc_450_eth-ib_firmwareilc_1x1_gsm\/gprs_firmwareilc_1x1_gsm\/gprsaxc_1050_firmwarepc_worx_rt_basic_firmwarerfc_470s_pn_3txpc_worx_srt_firmwareaxc_1050_xc_firmwareilc_3xx_firmwarerfc_460r_pn_3tx-s_firmwarerfc_470_pn_3txrfc_460r_pn_3tx_firmwareaxc_1050ilc1x0_firmwarerfc_450_eth-ibrfc_480s_pn_4tx_firmwareaxc_3050fc_350_pci_eth_firmwareRFC 460R PN 3TX-SILC 1x1RFC 480S PN 4TXILC 1x0AXC 3050PC WORX SRTRFC 450 ETH-IBRFC 470S PN 3TXRFC 430 ETH-IBAXC 1050PC WORX RT BASICILC 3xxRFC 470 PN 3TXFC 350 PCI ETHRFC 460R PN 3TXILC 1x1 GSM/GPRSAXC 1050 XC
CWE ID-CWE-345
Insufficient Verification of Data Authenticity
CVE-2022-31801
Matching Score-8
Assigner-CERT@VDE
ShareView Details
Matching Score-8
Assigner-CERT@VDE
CVSS Score-9.8||CRITICAL
EPSS-0.68% / 70.64%
||
7 Day CHG~0.00%
Published-21 Jun, 2022 | 08:00
Updated-16 Sep, 2024 | 18:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Insufficient Verification of Data Vulnerability in ProConOS/ProConOS eCLR SDK and MULTIPROG Engineering tool

An unauthenticated, remote attacker could upload malicious logic to the devices based on ProConOS/ProConOS eCLR in order to gain full control over the device.

Action-Not Available
Vendor-Phoenix Contact GmbH & Co. KG
Product-multiprogproconosproconos_eclrMULTIPROGProConOSProConOS eCLR
CWE ID-CWE-345
Insufficient Verification of Data Authenticity
CVE-2024-39747
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-8.1||HIGH
EPSS-0.12% / 31.29%
||
7 Day CHG~0.00%
Published-31 Aug, 2024 | 01:01
Updated-16 Sep, 2024 | 17:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM Sterling Connect:Direct Web Services information disclosure

IBM Sterling Connect:Direct Web Services 6.0, 6.1, 6.2, and 6.3 uses default credentials for potentially critical functionality.

Action-Not Available
Vendor-IBM CorporationLinux Kernel Organization, IncMicrosoft Corporation
Product-aixsterling_connect_direct_web_serviceswindowslinux_kernelSterling Connect:Direct Web Services
CWE ID-CWE-1392
Use of Default Credentials
CVE-2024-29844
Matching Score-4
Assigner-DirectCyber
ShareView Details
Matching Score-4
Assigner-DirectCyber
CVSS Score-9.8||CRITICAL
EPSS-0.07% / 20.64%
||
7 Day CHG~0.00%
Published-14 Apr, 2024 | 23:48
Updated-25 Sep, 2024 | 23:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Default credentials on web interface of Evolution Controller Versions allows attackers to login and perform administrative functions

Default credentials on the Web Interface of Evolution Controller 2.x allows anyone to log in to the server directly to perform administrative functions. Upon installation or upon first login, the application does not ask the user to change the password. There is no warning or prompt to ask the user to change the default password.

Action-Not Available
Vendor-CS Technologies Australiacs_technologies
Product-Evolution Controllerevolution_controller
CWE ID-CWE-1392
Use of Default Credentials
CVE-2025-8731
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-9.3||CRITICAL
EPSS-0.05% / 16.24%
||
7 Day CHG~0.00%
Published-08 Aug, 2025 | 15:32
Updated-13 Aug, 2025 | 09:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
TRENDnet TI-G160i/TI-PG102i/TPL-430AP SSH Service default credentials

A vulnerability was identified in TRENDnet TI-G160i, TI-PG102i and TPL-430AP up to 20250724. This affects an unknown part of the component SSH Service. The manipulation leads to use of default credentials. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The vendor explains: "For product TI-PG102i and TI-G160i, by default, the product's remote management options are all disabled. The root account is for troubleshooting purpose and the password is encrypted. However, we will remove the root account from the next firmware release. For product TPL-430AP, the initial setup process requires user to set the password for the management GUI. Once that was done, the default password will be invalid."

Action-Not Available
Vendor-TRENDnet, Inc.
Product-TI-G160iTPL-430APTI-PG102i
CWE ID-CWE-1392
Use of Default Credentials
CVE-2024-12286
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.3||CRITICAL
EPSS-0.15% / 36.36%
||
7 Day CHG+0.01%
Published-10 Dec, 2024 | 17:40
Updated-11 Dec, 2024 | 14:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
MOBATIME Network Master Clock has a use of default credentials vulnerability

MOBATIME Network Master Clock - DTS 4801 allows attackers to use SSH to gain initial access using default credentials.

Action-Not Available
Vendor-MOBATIME
Product-Network Master Clock - DTS 4801
CWE ID-CWE-1392
Use of Default Credentials
CVE-2025-51536
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.05% / 16.91%
||
7 Day CHG~0.00%
Published-04 Aug, 2025 | 00:00
Updated-05 Aug, 2025 | 14:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Austrian Archaeological Institute (AI) OpenAtlas v8.11.0 as discovered to contain a hardcoded Administrator password.

Action-Not Available
Vendor-n/a
Product-n/a
CWE ID-CWE-1392
Use of Default Credentials
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2023-49621
Matching Score-4
Assigner-Siemens
ShareView Details
Matching Score-4
Assigner-Siemens
CVSS Score-9.8||CRITICAL
EPSS-0.15% / 36.37%
||
7 Day CHG~0.00%
Published-09 Jan, 2024 | 10:00
Updated-17 Jun, 2025 | 20:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SIMATIC CN 4100 (All versions < V2.7). The "intermediate installation" system state of the affected application uses default credential with admin privileges. An attacker could use the credentials to gain complete control of the affected device.

Action-Not Available
Vendor-Siemens AG
Product-simatic_cn_4100SIMATIC CN 4100
CWE ID-CWE-1392
Use of Default Credentials
CVE-2025-30139
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.08% / 24.69%
||
7 Day CHG+0.01%
Published-18 Mar, 2025 | 00:00
Updated-01 Jul, 2025 | 21:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on G-Net Dashcam BB GONX devices. Default credentials for SSID cannot be changed. It broadcasts a fixed SSID with default credentials that cannot be changed. This allows any nearby attacker to connect to the dashcam's network without restriction. Once connected, an attacker can sniff on connected devices such as the user's smartphone. The SSID is also always broadcasted.

Action-Not Available
Vendor-gnetsystemn/a
Product-g-onx_firmwareg-onxn/a
CWE ID-CWE-1392
Use of Default Credentials
CVE-2023-3703
Matching Score-4
Assigner-Israel National Cyber Directorate (INCD)
ShareView Details
Matching Score-4
Assigner-Israel National Cyber Directorate (INCD)
CVSS Score-10||CRITICAL
EPSS-0.08% / 23.47%
||
7 Day CHG~0.00%
Published-03 Sep, 2023 | 14:19
Updated-30 Sep, 2024 | 20:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Proscend Advice ICR Series routers fw version 1.76

Proscend Advice ICR Series routers FW version 1.76 - CWE-1392: Use of Default Credentials

Action-Not Available
Vendor-proscendProscend Adviceproscend
Product-a510-f1m360-pm350-6m350-w6_firmwarem301-g_firmwarem560-5g_firmwarem350-6_firmwarem330-wa520i-f1_firmwarem357-5gm331_firmwarem350-5g_firmwarem330-w5m301-gm357-ai_firmwarem301-gwm357-5g_firmwarem331m301-gw_firmwarea551i-f1a551i-f1_firmwarea510-l1_firmwarea543i-l1_firmwarem350-5gm330-w5_firmwarem560-5ga520i-f1a552i-f1_firmwarea552i-f1m357-aia551i-f4m350-w5g_firmwarea551i-f4_firmwarem350-w5gm330-w_firmwarea510-l1m360-p_firmwarem350-w6a510-f1_firmwarea543i-l1ICR Series routers FWicr_series_routers_fw
CWE ID-CWE-1392
Use of Default Credentials
CVE-2023-40704
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-5.7||MEDIUM
EPSS-0.06% / 17.09%
||
7 Day CHG+0.01%
Published-18 Jul, 2024 | 16:33
Updated-27 Aug, 2025 | 20:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Philips Vue PACS Use of Default Credentials

The product does not require unique and complex passwords to be created during installation. Using Philips's default password could jeopardize the PACS system if the password was hacked or leaked. An attacker could gain access to the database impacting system availability and data integrity.

Action-Not Available
Vendor-Philips
Product-vue_pacsVue PACSvue_pacs
CWE ID-CWE-1392
Use of Default Credentials
CVE-2023-30603
Matching Score-4
Assigner-TWCERT/CC
ShareView Details
Matching Score-4
Assigner-TWCERT/CC
CVSS Score-9.8||CRITICAL
EPSS-0.85% / 73.98%
||
7 Day CHG~0.00%
Published-02 Jun, 2023 | 00:00
Updated-08 Jan, 2025 | 20:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Hitron Technologies Inc. CODA-5310 - Using default credentials

Hitron Technologies CODA-5310 Telnet function with the default account and password, and there is no warning or prompt to ask users to change the default password and account. An unauthenticated remote attackers can exploit this vulnerability to obtain the administrator’s privilege, resulting in performing arbitrary system operation or disrupt service.

Action-Not Available
Vendor-hitrontechHitron Technologies Inc.
Product-coda-5310_firmwarecoda-5310Hitron CODA-5310
CWE ID-CWE-1392
Use of Default Credentials
CVE-2023-30801
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-9.8||CRITICAL
EPSS-0.37% / 58.22%
||
7 Day CHG~0.00%
Published-10 Oct, 2023 | 13:46
Updated-13 Feb, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
qBittorrent Web UI Default Credentials Lead to RCE

All versions of the qBittorrent client through 4.5.5 use default credentials when the web user interface is enabled. The administrator is not forced to change the default credentials. As of 4.5.5, this issue has not been fixed. A remote attacker can use the default credentials to authenticate and execute arbitrary operating system commands using the "external program" feature in the web user interface. This was reportedly exploited in the wild in March 2023.

Action-Not Available
Vendor-qbittorrentqBittorrent
Product-qbittorrentqBittorrent client
CWE ID-CWE-1392
Use of Default Credentials
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2025-1160
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-6.9||MEDIUM
EPSS-0.07% / 22.81%
||
7 Day CHG~0.00%
Published-10 Feb, 2025 | 22:31
Updated-03 Mar, 2025 | 16:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SourceCodester Employee Management System index.php default credentials

A vulnerability was found in SourceCodester Employee Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file index.php. The manipulation of the argument username/password leads to use of default credentials. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

Action-Not Available
Vendor-remyandradeSourceCodester
Product-employee_management_systemEmployee Management System
CWE ID-CWE-1392
Use of Default Credentials
CVE-2024-7898
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-6.9||MEDIUM
EPSS-0.24% / 46.70%
||
7 Day CHG~0.00%
Published-17 Aug, 2024 | 18:00
Updated-27 Sep, 2024 | 00:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Tosei Online Store Management System ネット店舗管理システム Backend default credentials

A vulnerability classified as critical was found in Tosei Online Store Management System ネット店舗管理システム 4.02/4.03/4.04. This vulnerability affects unknown code of the component Backend. The manipulation leads to use of default credentials. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-tosei-corporationToseitosei
Product-online_store_management_systemOnline Store Management System ネット店舗管理システムonline_store_management_system
CWE ID-CWE-1392
Use of Default Credentials
CVE-2024-7746
Matching Score-4
Assigner-Automotive Security Research Group (ASRG)
ShareView Details
Matching Score-4
Assigner-Automotive Security Research Group (ASRG)
CVSS Score-9.5||CRITICAL
EPSS-0.17% / 39.02%
||
7 Day CHG~0.00%
Published-13 Aug, 2024 | 15:14
Updated-22 Aug, 2024 | 14:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use of default credentials at Traccar fleet management solution

Use of Default Credentials vulnerability in Tananaev Solutions Traccar Server on Administrator Panel modules allows Authentication Abuse.This issue affects the privileged transactions implemented by the Traccar solution that should otherwise be protected by the authentication mechanism.  These transactions could have an impact on any sensitive aspect of the platform, including Confidentiality, Integrity and Availability.

Action-Not Available
Vendor-traccarTraccartraccar
Product-traccarServerserver
CWE ID-CWE-1392
Use of Default Credentials
CWE ID-CWE-287
Improper Authentication
Details not found