Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2025-35452

Summary
Assigner-cisa-cg
Assigner Org ID-9119a7d8-5eab-497f-8521-727c672e3725
Published At-05 Sep, 2025 | 17:49
Updated At-08 Sep, 2025 | 18:07
Rejected At-
Credits

Pan-Tilt-Zoom cameras default administrative credentials for web interface

PTZOptics and possibly other ValueHD-based pan-tilt-zoom cameras use default, shared credentials for the administrative web interface.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:cisa-cg
Assigner Org ID:9119a7d8-5eab-497f-8521-727c672e3725
Published At:05 Sep, 2025 | 17:49
Updated At:08 Sep, 2025 | 18:07
Rejected At:
▼CVE Numbering Authority (CNA)
Pan-Tilt-Zoom cameras default administrative credentials for web interface

PTZOptics and possibly other ValueHD-based pan-tilt-zoom cameras use default, shared credentials for the administrative web interface.

Affected Products
Vendor
PTZOpticsPTZOptics
Product
PT12X-SE-xx-G3
Default Status
unknown
Versions
Affected
  • From 0 before 9.1.43 (custom)
Unaffected
  • 9.1.43
Vendor
PTZOpticsPTZOptics
Product
PT12X-LINK-4K-xx
Default Status
unknown
Versions
Affected
  • From 0 before 0.0.63 (custom)
Unaffected
  • 0.0.63
Vendor
PTZOpticsPTZOptics
Product
PT20X-SE-xx-G3
Default Status
unknown
Versions
Affected
  • From 0 before 9.1.32 (custom)
Unaffected
  • 9.1.32
Vendor
PTZOpticsPTZOptics
Product
PT20X-LINK-4K-xx
Default Status
unknown
Versions
Affected
  • From 0 before 0.0.89 (custom)
Unaffected
  • 0.0.89
Vendor
PTZOpticsPTZOptics
Product
PT30X-SE-xx-G3
Default Status
unknown
Versions
Affected
  • From 0 before 9.1.33 (custom)
Unaffected
  • 9.1.33
Vendor
PTZOpticsPTZOptics
Product
PT30X-LINK-4K-xx
Default Status
unknown
Versions
Affected
  • From 0 before 2.0.71 (custom)
Unaffected
  • 2.0.71
Vendor
PTZOpticsPTZOptics
Product
PT-STUDIOPRO
Default Status
unknown
Versions
Affected
  • From 0 before 9.0.41 (custom)
Unaffected
  • 9.0.41
Vendor
PTZOpticsPTZOptics
Product
PT12X-STUDIO-4K-xx-G3
Default Status
unknown
Versions
Affected
  • From 0 before 8.1.90 (custom)
Unaffected
  • 8.1.90
Vendor
PTZOpticsPTZOptics
Product
PT20X-STUDIO-4K-xx-G3
Default Status
unknown
Versions
Affected
  • From 0 before 8.1.90 (custom)
Unaffected
  • 8.1.90
Vendor
PTZOpticsPTZOptics
Product
PT12X-SDI/NDI-xx
Default Status
unknown
Versions
Affected
  • From 0 before 6.3.70 (custom)
Unaffected
  • 6.3.70
Vendor
PTZOpticsPTZOptics
Product
PT12X-USB-xx
Default Status
unknown
Versions
Affected
  • From 0 before 6.2.88 (custom)
Unaffected
  • 6.2.88
Vendor
PTZOpticsPTZOptics
Product
PT20X-SDI/NDI-xx
Default Status
unknown
Versions
Affected
  • From 0 before 6.3.27 (custom)
Unaffected
  • 6.3.27
Vendor
SMTAV
Product
Pan-Tilt-Zoom Cameras
Default Status
unknown
Versions
Affected
  • *
Vendor
PTZOpticsPTZOptics
Product
PT30X-SDI/NDI-xx
Default Status
unknown
Versions
Affected
  • From 0 before 6.3.43 (custom)
Unaffected
  • 6.3.43
Vendor
multiCAM Systems
Product
Pan-Tilt-Zoom Cameras
Default Status
unknown
Versions
Affected
  • *
Vendor
PTZOpticsPTZOptics
Product
VL Fixed Camera/NDI Fixed Camera
Default Status
unknown
Versions
Affected
  • From 0 before 7.2.94 (custom)
Unaffected
  • 7.2.94
Vendor
PTZOpticsPTZOptics
Product
12x Fixed Camera/NDI Fixed Camera
Default Status
unknown
Versions
Affected
  • From 0 before 7.2.85 (custom)
Unaffected
  • 7.2.85
Vendor
PTZOpticsPTZOptics
Product
20x Fixed Camera/NDI Fixed Camera
Default Status
unknown
Versions
Affected
  • From 0 before 7.2.94 (custom)
Unaffected
  • 7.2.94
Vendor
PTZOpticsPTZOptics
Product
EPTZ Fixed Camera/NDI Fixed Camera
Default Status
unknown
Versions
Affected
  • From 0 before 8.1.89 (custom)
Unaffected
  • 8.1.89
Vendor
PTZOpticsPTZOptics
Product
HC-EPTZ-NDI
Default Status
unknown
Versions
Affected
  • From 0 before 8.2.14 (custom)
Unaffected
  • 8.2.14
Vendor
PTZOpticsPTZOptics
Product
PT12X-4K-xx-G3
Default Status
unknown
Versions
Affected
  • From 0 before 0.0.58 (custom)
Unaffected
  • 0.0.58
Vendor
PTZOpticsPTZOptics
Product
PT20X-4K-xx-G3
Default Status
unknown
Versions
Affected
  • From 0 before 0.0.85 (custom)
Unaffected
  • 0.0.85
Vendor
PTZOpticsPTZOptics
Product
PT30X-4K-xx-G3
Default Status
unknown
Versions
Affected
  • From 0 before 2.0.64 (custom)
Unaffected
  • 2.0.64
Vendor
PTZOpticsPTZOptics
Product
PT20X-USB-xx
Default Status
unknown
Versions
Affected
  • From 0 before 6.2.81 (custom)
Unaffected
  • 6.2.81
Vendor
ValueHD
Product
Pan-Tilt-Zoom Cameras
Default Status
unknown
Versions
Affected
  • *
Problem Types
TypeCWE IDDescription
CWECWE-798CWE-798 Use of Hard-coded Credentials
CWECWE-1392CWE-1392 Use of Default Credentials
Type: CWE
CWE ID: CWE-798
Description: CWE-798 Use of Hard-coded Credentials
Type: CWE
CWE ID: CWE-1392
Description: CWE-1392 Use of Default Credentials
Metrics
VersionBase scoreBase severityVector
3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
4.09.2CRITICAL
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Version: 3.1
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Version: 4.0
Base score: 9.2
Base severity: CRITICAL
Vector:
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.cisa.gov/news-events/ics-advisories/icsa-25-162-10
N/A
https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2025/icsa-25-162-10.json
N/A
https://www.cve.org/CVERecord?id=CVE-2025-35452
N/A
https://www.labs.greynoise.io/grimoire/2024-10-31-sift-0-day-rce/
N/A
https://www.greynoise.io/blog/greynoise-intelligence-discovers-zero-day-vulnerabilities-in-live-streaming-cameras-with-the-help-of-ai
N/A
Hyperlink: https://www.cisa.gov/news-events/ics-advisories/icsa-25-162-10
Resource: N/A
Hyperlink: https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2025/icsa-25-162-10.json
Resource: N/A
Hyperlink: https://www.cve.org/CVERecord?id=CVE-2025-35452
Resource: N/A
Hyperlink: https://www.labs.greynoise.io/grimoire/2024-10-31-sift-0-day-rce/
Resource: N/A
Hyperlink: https://www.greynoise.io/blog/greynoise-intelligence-discovers-zero-day-vulnerabilities-in-live-streaming-cameras-with-the-help-of-ai
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:9119a7d8-5eab-497f-8521-727c672e3725
Published At:05 Sep, 2025 | 18:15
Updated At:23 Dec, 2025 | 17:08

PTZOptics and possibly other ValueHD-based pan-tilt-zoom cameras use default, shared credentials for the administrative web interface.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.09.2CRITICAL
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Secondary3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 4.0
Base score: 9.2
Base severity: CRITICAL
Vector:
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Secondary
Version: 3.1
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CPE Matches

PTZOptics
ptzoptics
>>pt12x-sdi-xx-g2_firmware>>-
cpe:2.3:o:ptzoptics:pt12x-sdi-xx-g2_firmware:-:*:*:*:*:*:*:*
PTZOptics
ptzoptics
>>pt12x-sdi-xx-g2>>-
cpe:2.3:h:ptzoptics:pt12x-sdi-xx-g2:-:*:*:*:*:*:*:*
PTZOptics
ptzoptics
>>pt12x-ndi-xx_firmware>>-
cpe:2.3:o:ptzoptics:pt12x-ndi-xx_firmware:-:*:*:*:*:*:*:*
PTZOptics
ptzoptics
>>pt12x-ndi-xx>>-
cpe:2.3:h:ptzoptics:pt12x-ndi-xx:-:*:*:*:*:*:*:*
PTZOptics
ptzoptics
>>pt12x-usb-xx-g2_firmware>>-
cpe:2.3:o:ptzoptics:pt12x-usb-xx-g2_firmware:-:*:*:*:*:*:*:*
PTZOptics
ptzoptics
>>pt12x-usb-xx-g2>>-
cpe:2.3:h:ptzoptics:pt12x-usb-xx-g2:-:*:*:*:*:*:*:*
PTZOptics
ptzoptics
>>pt20x-sdi-xx-g2_firmware>>-
cpe:2.3:o:ptzoptics:pt20x-sdi-xx-g2_firmware:-:*:*:*:*:*:*:*
PTZOptics
ptzoptics
>>pt20x-sdi-xx-g2>>-
cpe:2.3:h:ptzoptics:pt20x-sdi-xx-g2:-:*:*:*:*:*:*:*
PTZOptics
ptzoptics
>>t20x-ndi-xx_firmware>>-
cpe:2.3:o:ptzoptics:t20x-ndi-xx_firmware:-:*:*:*:*:*:*:*
PTZOptics
ptzoptics
>>t20x-ndi-xx>>-
cpe:2.3:h:ptzoptics:t20x-ndi-xx:-:*:*:*:*:*:*:*
PTZOptics
ptzoptics
>>pt20x-usb-xx-g2_firmware>>-
cpe:2.3:o:ptzoptics:pt20x-usb-xx-g2_firmware:-:*:*:*:*:*:*:*
PTZOptics
ptzoptics
>>pt20x-usb-xx-g2>>-
cpe:2.3:h:ptzoptics:pt20x-usb-xx-g2:-:*:*:*:*:*:*:*
PTZOptics
ptzoptics
>>pt30x-sdi-xx-g2_firmware>>-
cpe:2.3:o:ptzoptics:pt30x-sdi-xx-g2_firmware:-:*:*:*:*:*:*:*
PTZOptics
ptzoptics
>>pt30x-sdi-xx-g2>>-
cpe:2.3:h:ptzoptics:pt30x-sdi-xx-g2:-:*:*:*:*:*:*:*
PTZOptics
ptzoptics
>>pt30x-ndi-xx_firmware>>-
cpe:2.3:o:ptzoptics:pt30x-ndi-xx_firmware:-:*:*:*:*:*:*:*
PTZOptics
ptzoptics
>>pt30x-ndi-xx>>-
cpe:2.3:h:ptzoptics:pt30x-ndi-xx:-:*:*:*:*:*:*:*
PTZOptics
ptzoptics
>>pt12x-zcam_firmware>>-
cpe:2.3:o:ptzoptics:pt12x-zcam_firmware:-:*:*:*:*:*:*:*
PTZOptics
ptzoptics
>>pt12x-zcam>>-
cpe:2.3:h:ptzoptics:pt12x-zcam:-:*:*:*:*:*:*:*
PTZOptics
ptzoptics
>>pt20x-zcam_firmware>>-
cpe:2.3:o:ptzoptics:pt20x-zcam_firmware:-:*:*:*:*:*:*:*
PTZOptics
ptzoptics
>>pt20x-zcam>>-
cpe:2.3:h:ptzoptics:pt20x-zcam:-:*:*:*:*:*:*:*
PTZOptics
ptzoptics
>>ptvl-zcam_firmware>>-
cpe:2.3:o:ptzoptics:ptvl-zcam_firmware:-:*:*:*:*:*:*:*
PTZOptics
ptzoptics
>>ptvl-zcam>>-
cpe:2.3:h:ptzoptics:ptvl-zcam:-:*:*:*:*:*:*:*
PTZOptics
ptzoptics
>>pteptz-zcam-g2_firmware>>-
cpe:2.3:o:ptzoptics:pteptz-zcam-g2_firmware:-:*:*:*:*:*:*:*
PTZOptics
ptzoptics
>>pteptz-zcam-g2>>-
cpe:2.3:h:ptzoptics:pteptz-zcam-g2:-:*:*:*:*:*:*:*
PTZOptics
ptzoptics
>>pteptz-ndi-zcam-g2>>-
cpe:2.3:o:ptzoptics:pteptz-ndi-zcam-g2:-:*:*:*:*:*:*:*
PTZOptics
ptzoptics
>>pteptz-ndi-zcam-g2>>-
cpe:2.3:h:ptzoptics:pteptz-ndi-zcam-g2:-:*:*:*:*:*:*:*
PTZOptics
ptzoptics
>>pt12x-4k-xx-g3_firmware>>Versions up to 0.0.58(inclusive)
cpe:2.3:o:ptzoptics:pt12x-4k-xx-g3_firmware:*:*:*:*:*:*:*:*
PTZOptics
ptzoptics
>>pt12x-4k-xx-g3>>-
cpe:2.3:h:ptzoptics:pt12x-4k-xx-g3:-:*:*:*:*:*:*:*
PTZOptics
ptzoptics
>>pt20x-4k-xx-g3_firmware>>Versions up to 0.0.85(inclusive)
cpe:2.3:o:ptzoptics:pt20x-4k-xx-g3_firmware:*:*:*:*:*:*:*:*
PTZOptics
ptzoptics
>>pt20x-4k-xx-g3>>-
cpe:2.3:h:ptzoptics:pt20x-4k-xx-g3:-:*:*:*:*:*:*:*
PTZOptics
ptzoptics
>>pt30x-4k-xx-g3_firmware>>Versions up to 2.0.64(inclusive)
cpe:2.3:o:ptzoptics:pt30x-4k-xx-g3_firmware:*:*:*:*:*:*:*:*
PTZOptics
ptzoptics
>>pt30x-4k-xx-g3>>-
cpe:2.3:h:ptzoptics:pt30x-4k-xx-g3:-:*:*:*:*:*:*:*
PTZOptics
ptzoptics
>>pt12x-link-4k-xx_firmware>>Versions up to 0.0.63(inclusive)
cpe:2.3:o:ptzoptics:pt12x-link-4k-xx_firmware:*:*:*:*:*:*:*:*
PTZOptics
ptzoptics
>>pt12x-link-4k-xx>>-
cpe:2.3:h:ptzoptics:pt12x-link-4k-xx:-:*:*:*:*:*:*:*
PTZOptics
ptzoptics
>>pt20x-link-4k-xx_firmware>>Versions up to 0.0.89(inclusive)
cpe:2.3:o:ptzoptics:pt20x-link-4k-xx_firmware:*:*:*:*:*:*:*:*
PTZOptics
ptzoptics
>>pt20x-link-4k-xx>>-
cpe:2.3:h:ptzoptics:pt20x-link-4k-xx:-:*:*:*:*:*:*:*
PTZOptics
ptzoptics
>>pt30x-link-4k-xx_firmware>>Versions up to 2.0.71(inclusive)
cpe:2.3:o:ptzoptics:pt30x-link-4k-xx_firmware:*:*:*:*:*:*:*:*
PTZOptics
ptzoptics
>>pt30x-link-4k-xx>>-
cpe:2.3:h:ptzoptics:pt30x-link-4k-xx:-:*:*:*:*:*:*:*
PTZOptics
ptzoptics
>>pt12x-se-xx-g3_firmware>>Versions up to 9.1.43(inclusive)
cpe:2.3:o:ptzoptics:pt12x-se-xx-g3_firmware:*:*:*:*:*:*:*:*
PTZOptics
ptzoptics
>>pt12x-se-xx-g3>>-
cpe:2.3:h:ptzoptics:pt12x-se-xx-g3:-:*:*:*:*:*:*:*
PTZOptics
ptzoptics
>>pt20x-se-xx-g3_firmware>>Versions up to 9.1.32(inclusive)
cpe:2.3:o:ptzoptics:pt20x-se-xx-g3_firmware:*:*:*:*:*:*:*:*
PTZOptics
ptzoptics
>>pt20x-se-xx-g3>>-
cpe:2.3:h:ptzoptics:pt20x-se-xx-g3:-:*:*:*:*:*:*:*
PTZOptics
ptzoptics
>>pt30x-se-xx-g3_firmware>>Versions up to 9.1.33(inclusive)
cpe:2.3:o:ptzoptics:pt30x-se-xx-g3_firmware:*:*:*:*:*:*:*:*
PTZOptics
ptzoptics
>>pt30x-se-xx-g3>>-
cpe:2.3:h:ptzoptics:pt30x-se-xx-g3:-:*:*:*:*:*:*:*
PTZOptics
ptzoptics
>>pt-studiopro_firmware>>Versions up to 9.0.41(inclusive)
cpe:2.3:o:ptzoptics:pt-studiopro_firmware:*:*:*:*:*:*:*:*
PTZOptics
ptzoptics
>>pt-studiopro>>-
cpe:2.3:h:ptzoptics:pt-studiopro:-:*:*:*:*:*:*:*
PTZOptics
ptzoptics
>>vl_fixed_camera_firmware>>Versions up to 7.2.94(inclusive)
cpe:2.3:o:ptzoptics:vl_fixed_camera_firmware:*:*:*:*:*:*:*:*
PTZOptics
ptzoptics
>>vl_fixed_camera>>-
cpe:2.3:h:ptzoptics:vl_fixed_camera:-:*:*:*:*:*:*:*
PTZOptics
ptzoptics
>>ndi_fixed_camera_firmware>>Versions up to 7.2.94(inclusive)
cpe:2.3:o:ptzoptics:ndi_fixed_camera_firmware:*:*:*:*:*:*:*:*
PTZOptics
ptzoptics
>>ndi_fixed_camera>>-
cpe:2.3:h:ptzoptics:ndi_fixed_camera:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-798Secondary9119a7d8-5eab-497f-8521-727c672e3725
CWE-1392Secondary9119a7d8-5eab-497f-8521-727c672e3725
CWE ID: CWE-798
Type: Secondary
Source: 9119a7d8-5eab-497f-8521-727c672e3725
CWE ID: CWE-1392
Type: Secondary
Source: 9119a7d8-5eab-497f-8521-727c672e3725
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2025/icsa-25-162-10.json9119a7d8-5eab-497f-8521-727c672e3725
Patch
https://www.cisa.gov/news-events/ics-advisories/icsa-25-162-109119a7d8-5eab-497f-8521-727c672e3725
Third Party Advisory
US Government Resource
https://www.cve.org/CVERecord?id=CVE-2025-354529119a7d8-5eab-497f-8521-727c672e3725
Third Party Advisory
https://www.greynoise.io/blog/greynoise-intelligence-discovers-zero-day-vulnerabilities-in-live-streaming-cameras-with-the-help-of-ai9119a7d8-5eab-497f-8521-727c672e3725
Third Party Advisory
https://www.labs.greynoise.io/grimoire/2024-10-31-sift-0-day-rce/9119a7d8-5eab-497f-8521-727c672e3725
Exploit
Third Party Advisory
Hyperlink: https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2025/icsa-25-162-10.json
Source: 9119a7d8-5eab-497f-8521-727c672e3725
Resource:
Patch
Hyperlink: https://www.cisa.gov/news-events/ics-advisories/icsa-25-162-10
Source: 9119a7d8-5eab-497f-8521-727c672e3725
Resource:
Third Party Advisory
US Government Resource
Hyperlink: https://www.cve.org/CVERecord?id=CVE-2025-35452
Source: 9119a7d8-5eab-497f-8521-727c672e3725
Resource:
Third Party Advisory
Hyperlink: https://www.greynoise.io/blog/greynoise-intelligence-discovers-zero-day-vulnerabilities-in-live-streaming-cameras-with-the-help-of-ai
Source: 9119a7d8-5eab-497f-8521-727c672e3725
Resource:
Third Party Advisory
Hyperlink: https://www.labs.greynoise.io/grimoire/2024-10-31-sift-0-day-rce/
Source: 9119a7d8-5eab-497f-8521-727c672e3725
Resource:
Exploit
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

592Records found

CVE-2025-35451
Matching Score-10
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) U.S. Civilian Government
ShareView Details
Matching Score-10
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) U.S. Civilian Government
CVSS Score-9.3||CRITICAL
EPSS-0.17% / 37.45%
||
7 Day CHG~0.00%
Published-05 Sep, 2025 | 17:43
Updated-14 Jan, 2026 | 15:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Pan-Tilt-Zoom cameras hard-coded default passwords with SSH and telnet enabled

PTZOptics and possibly other ValueHD-based pan-tilt-zoom cameras use hard-coded, default administrative credentials. The passwords can readily be cracked. Many cameras have SSH or telnet listening on all interfaces. The passwords cannot be changed by the user, nor can the SSH or telnet service be disabled by the user.

Action-Not Available
Vendor-smtavvaluehdmulticam-systemsValueHDSMTAVmultiCAM SystemsPTZOptics
Product-v60xlvx800i2ptvl-zcamba20s_firmwarebx20uhd_firmwarevl_fixed_camera_firmwaremcamii_ptz_firmwarebx20uhd-n_firmwarept20x-ndi-xx_firmwarebv20sbv30spt12x-ndi-xx_firmwarevx60alpt20x-ndi-xxpteptz-ndi-zcam-g2vx60al_firmwareba30s_firmwarev63xlvx90ba12-nvx60asl_firmwareba12svx752a_firmwarevx71uvs_firmwarevx800i2_firmwarevx61baslba20-nvx61basl_firmwarept20x-zcambv30s_firmwarept30x-sdi-xx-g2_firmwareba12-n_firmwarevx630alba12s_firmwarevx751bapt12x-sdi-xx-g2ndi_fixed_camerapt12x-zcampt20x-zcam_firmwarev71uvshd17h-n_firmwarevx61aslpt20x-usb-xx-g2bx20nvx630al_firmwarehd17hv63xl_firmwareba20-n_firmwarept20x-sdi-xx-g2bx20uhd-nv61w_firmwarevx61asl_firmwareba20sbx20n_firmwarept30x-ndi-xxvx752ag_firmwarevx70uvs_firmwarept20x-sdi-xx-g2_firmwarendi_fixed_camera_firmwarept12x-zcam_firmwarev61wpt30x-ndi-xx_firmwarevx70uvsvx752avx720lba30smcamii_ptzvx701ta_firmwarevx752agvl_fixed_camerapt12x-usb-xx-g2_firmwarevx701ra_firmwarepteptz-ndi-zcam-g2_firmwarev71uvs_firmwarept12x-ndi-xxbv20s_firmwarepteptz-zcam-g2bx20uhdbx20s-sh_firmwarebx20s-shvx90_firmwarevx751ba_firmwarept12x-usb-xx-g2ba30-nvx60aslvx71uvsv60xl_firmwarebx30sptvl-zcam_firmwarept20x-usb-xx-g2_firmwarevx61alba30-n_firmwarept12x-sdi-xx-g2_firmwarepteptz-zcam-g2_firmwarevx61al_firmwarevx701rapt30x-sdi-xx-g2vx720l_firmwarehd17h_firmwarevx701tahd17h-nbx30s_firmwarePT30X-4K-xx-G3PT-STUDIOPROPT20X-SDI/NDI-xxPT30X-LINK-4K-xxPT20X-USB-xxPT12X-STUDIO-4K-xx-G3PT12X-SDI/NDI-xxVL Fixed Camera/NDI Fixed CameraHC-EPTZ-NDIPT20X-STUDIO-4K-xx-G3PT12X-USB-xxPT30X-SE-xx-G3PT20X-4K-xx-G3PT20X-SE-xx-G3PT20X-LINK-4K-xxPT30X-SDI/NDI-xx20x Fixed Camera/NDI Fixed CameraEPTZ Fixed Camera/NDI Fixed CameraPan-Tilt-Zoom CamerasPT12X-SE-xx-G312x Fixed Camera/NDI Fixed CameraPT12X-LINK-4K-xxPT12X-4K-xx-G3
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2025-40938
Matching Score-4
Assigner-Siemens
ShareView Details
Matching Score-4
Assigner-Siemens
CVSS Score-9.2||CRITICAL
EPSS-0.08% / 24.30%
||
7 Day CHG~0.00%
Published-09 Dec, 2025 | 10:44
Updated-10 Dec, 2025 | 21:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SIMATIC CN 4100 (All versions < V4.0.1). The affected device stores sensitive information in the firmware. This could allow an attacker to access and misuse this information, potentially impacting the device’s confidentiality, integrity, and availability.

Action-Not Available
Vendor-Siemens AG
Product-simatic_cn_4100_firmwaresimatic_cn_4100SIMATIC CN 4100
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2018-17558
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-2.54% / 85.54%
||
7 Day CHG~0.00%
Published-26 Oct, 2023 | 00:00
Updated-11 Sep, 2024 | 20:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Hardcoded manufacturer credentials and an OS command injection vulnerability in the /cgi-bin/mft/ directory on ABUS TVIP TVIP20050 LM.1.6.18, TVIP10051 LM.1.6.18, TVIP11050 MG.1.6.03.05, TVIP20550 LM.1.6.18, TVIP10050 LM.1.6.18, TVIP11550 MG.1.6.03, TVIP21050 MG.1.6.03, and TVIP51550 MG.1.6.03 cameras allow remote attackers to execute code as root.

Action-Not Available
Vendor-abusn/aabus
Product-tvip_11552tvip_20050_firmwaretvip_10051tvip_21551_firmwaretvip_31500tvip_11502_firmwaretvip_51550tvip_21501_firmwaretvip_31550_firmwaretvip_51500_firmwaretvip_10050_firmwaretvip_20500tvip_10001_firmwaretvip_22500tvip_21502tvip_21000tvip_51550_firmwaretvip_21552tvip_10055b_firmwaretvip_32500_firmwaretvip_71550_firmwaretvip_21502_firmwaretvip_20550tvip_31501tvip_10005btvip_10000_firmwaretvip_20050tvip_72500_firmwaretvip_10500_firmwaretvip_71550tvip_10050tvip_10055atvip_11550_firmwaretvip_20550_firmwaretvip_11551_firmwaretvip_71551_firmwaretvip_71500_firmwaretvip_11552_firmwaretvip_31501_firmwaretvip_72500tvip_51500tvip_10005a_firmwaretvip_31000_firmwaretvip_31551tvip_10000tvip_20500_firmwaretvip_11502tvip_71501_firmwaretvip_11501tvip_10550tvip_31001tvip_31050tvip_11050tvip_71501tvip_21500_firmwaretvip_10051_firmwaretvip_11050_firmwaretvip_10055btvip_10500tvip_22500_firmwaretvip_31550tvip_11500_firmwaretvip_21552_firmwaretvip_11000tvip_11550tvip_20000_firmwaretvip_31050_firmwaretvip_11551tvip_10005atvip_31000tvip_32500tvip_21550tvip_10005_firmwaretvip_21551tvip_21050tvip_10005b_firmwaretvip_10001tvip_10550_firmwaretvip_21501tvip_31001_firmwaretvip_31551_firmwaretvip_71551tvip_21000_firmwaretvip_21550_firmwaretvip_20000tvip_11000_firmwaretvip_31500_firmwaretvip_10055a_firmwaretvip_11500tvip_11501_firmwaretvip_71500tvip_10005tvip_21500tvip_21050_firmwaren/atvip_72500_firmware
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2026-42373
Matching Score-4
Assigner-Securin
ShareView Details
Matching Score-4
Assigner-Securin
CVSS Score-9.8||CRITICAL
EPSS-0.06% / 18.84%
||
7 Day CHG~0.00%
Published-04 May, 2026 | 15:57
Updated-06 May, 2026 | 12:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
D-Link DIR-605L B2 Hardcoded Telnet Backdoor Credentials

D-Link DIR-605L Hardware Revision B2 (End-of-Life, EOL) contains a hardcoded telnet backdoor. The device starts a telnet daemon at boot via /bin/telnetd.sh with the username "Alphanetworks" and the static password "wrgn76_dlwbr_dir605L" read from /etc/alpha_config/image_sign. The custom telnetd binary accepts a -u user:password flag, and the custom login binary uses strcmp() to validate credentials. Successful authentication grants an unauthenticated attacker on the local network a root shell with full administrative control. The device has reached End-of-Life (EOL) and will not receive patches.

Action-Not Available
Vendor-D-Link Corporation
Product-dir-605l_firmwaredir-605lDIR-605L Firmware
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2026-42374
Matching Score-4
Assigner-Securin
ShareView Details
Matching Score-4
Assigner-Securin
CVSS Score-9.8||CRITICAL
EPSS-0.08% / 23.69%
||
7 Day CHG~0.00%
Published-04 May, 2026 | 16:00
Updated-06 May, 2026 | 12:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
D-Link DIR-600L B1 Hardcoded Telnet Backdoor Credentials

D-Link DIR-600L Hardware Revision B1 (End-of-Life) contains a hardcoded telnet backdoor. The device starts a telnet daemon at boot via /bin/telnetd.sh with the username "Alphanetworks" and the static password "wrgn61_dlwbr_dir600L" read from /etc/alpha_config/image_sign. The custom telnetd binary accepts a -u user:password flag, and the custom login binary uses strcmp() to validate credentials. Successful authentication grants an unauthenticated attacker on the local network a root shell with full administrative control.  The device has reached End-of-Life (EOL) and will not receive patches.

Action-Not Available
Vendor-D-Link Corporation
Product-dir-600l_firmwaredir-600lDIR-600L Firmware
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2026-42375
Matching Score-4
Assigner-Securin
ShareView Details
Matching Score-4
Assigner-Securin
CVSS Score-9.8||CRITICAL
EPSS-0.06% / 18.84%
||
7 Day CHG~0.00%
Published-04 May, 2026 | 16:02
Updated-06 May, 2026 | 12:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
D-Link DIR-600L A1 Hardcoded Telnet Backdoor Credentials

D-Link DIR-600L Hardware Revision A1 (End-of-Life) contains a hardcoded telnet backdoor. The device starts a telnet daemon at boot via /bin/telnetd.sh with the username "Alphanetworks" and the static password "wrgn35_dlwbr_dir600l" read from /etc/alpha_config/image_sign. The custom telnetd binary accepts a -u user:password flag, and the custom login binary uses strcmp() to validate credentials. Successful authentication grants an unauthenticated attacker on the local network a root shell with full administrative control. The device has reached End-of-Life (EOL) and will not receive patches.

Action-Not Available
Vendor-D-Link Corporation
Product-dir-600l_firmwaredir-600lDIR-600L Firmware
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2024-1344
Matching Score-4
Assigner-Spanish National Cybersecurity Institute, S.A. (INCIBE)
ShareView Details
Matching Score-4
Assigner-Spanish National Cybersecurity Institute, S.A. (INCIBE)
CVSS Score-6.8||MEDIUM
EPSS-0.06% / 16.79%
||
7 Day CHG~0.00%
Published-19 Feb, 2024 | 11:19
Updated-24 Mar, 2025 | 17:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Encrypted database credentials in LaborOfficeFree

Encrypted database credentials in LaborOfficeFree affecting version 19.10. This vulnerability allows an attacker to read and extract the username and password from the database of 'LOF_service.exe' and 'LaborOfficeFree.exe' located in the '%programfiles(x86)%\LaborOfficeFree\' directory. This user can log in remotely and has root-like privileges.

Action-Not Available
Vendor-laborofficefreeLaborOfficeFreeprgtec
Product-laborofficefreeLaborOfficeFree laborofficefree
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2020-4177
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-6.8||MEDIUM
EPSS-0.08% / 23.35%
||
7 Day CHG~0.00%
Published-03 Jun, 2020 | 14:30
Updated-16 Sep, 2024 | 18:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM Security Guardium 11.1 contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. IBM X-Force ID: 174732.

Action-Not Available
Vendor-IBM Corporation
Product-security_guardiumSecurity Guardium
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2020-4854
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.23% / 46.15%
||
7 Day CHG~0.00%
Published-23 Nov, 2020 | 16:55
Updated-16 Sep, 2024 | 22:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM Spectrum Protect Plus 10.1.0 thorugh 10.1.6 contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. IBM X-Force ID: 190454.

Action-Not Available
Vendor-IBM CorporationLinux Kernel Organization, Inc
Product-linux_kernelspectrum_protect_plusSpectrum Protect Plus
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2022-31210
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.45% / 63.71%
||
7 Day CHG~0.00%
Published-17 Jul, 2022 | 22:40
Updated-03 Aug, 2024 | 07:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Infiray IRAY-A8Z3 1.0.957. The binary file /usr/local/sbin/webproject/set_param.cgi contains hardcoded credentials to the web application. Because these accounts cannot be deactivated or have their passwords changed, they are considered to be backdoor accounts.

Action-Not Available
Vendor-infirayn/a
Product-iray-a8z3_firmwareiray-a8z3n/a
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2025-3831
Matching Score-4
Assigner-Check Point Software Ltd.
ShareView Details
Matching Score-4
Assigner-Check Point Software Ltd.
CVSS Score-8.1||HIGH
EPSS-0.07% / 20.70%
||
7 Day CHG~0.00%
Published-12 Aug, 2025 | 14:48
Updated-03 Sep, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Exposed SFTP server

Log files uploaded during troubleshooting by the Harmony SASE agent may have been accessible to unauthorized parties.

Action-Not Available
Vendor-Check Point Software Technologies Ltd.
Product-harmony_saseCheck Point Harmony SASE
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2020-4429
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-10||CRITICAL
EPSS-90.70% / 99.63%
||
7 Day CHG~0.00%
Published-07 May, 2020 | 19:20
Updated-03 Nov, 2025 | 22:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM Data Risk Manager 2.0.1, 2.0.2, 2.0.3, 2.0.4, 2.0.5, and 2.0.6 contains a default password for an IDRM administrative account. A remote attacker could exploit this vulnerability to login and execute arbitrary code on the system with root privileges. IBM X-Force ID: 180534.

Action-Not Available
Vendor-IBM Corporation
Product-data_risk_managerData Risk Manager
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2020-4459
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-5.9||MEDIUM
EPSS-0.10% / 26.45%
||
7 Day CHG~0.00%
Published-04 Aug, 2020 | 16:00
Updated-16 Sep, 2024 | 20:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM Security Verify Access 10.7 contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. IBM X-Force ID: 181395.

Action-Not Available
Vendor-IBM Corporation
Product-security_secret_serverSecurity Secret Server
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2020-4385
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-6.8||MEDIUM
EPSS-0.08% / 23.35%
||
7 Day CHG~0.00%
Published-22 Jul, 2020 | 20:30
Updated-16 Sep, 2024 | 17:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM Verify Gateway (IVG) 1.0.0 and 1.0.1 contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. IBM X-Force ID: 179266.

Action-Not Available
Vendor-IBM Corporation
Product-verify_gatewayVerify Gateway (IVG)
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2020-4150
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-6.8||MEDIUM
EPSS-0.06% / 17.73%
||
7 Day CHG~0.00%
Published-11 Jul, 2022 | 17:05
Updated-16 Sep, 2024 | 19:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM SiteProtector Appliance 3.1.1 contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. IBM X-Force ID: 174142.

Action-Not Available
Vendor-IBM Corporation
Product-security_siteprotector_systemSecurity SiteProtector System
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2020-3928
Matching Score-4
Assigner-TWCERT/CC
ShareView Details
Matching Score-4
Assigner-TWCERT/CC
CVSS Score-6.2||MEDIUM
EPSS-0.10% / 26.70%
||
7 Day CHG~0.00%
Published-12 Jun, 2020 | 08:25
Updated-17 Sep, 2024 | 01:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
GeoVision Door Access Control Device - Hardcoded privileged password

GeoVision Door Access Control device family is hardcoded with a root password, which adopting an identical password in all devices.

Action-Not Available
Vendor-usavisionsysGeoVision
Product-geovision_gv-as1010geovision_gv-as1010_firmwaregeovision_gv-as410_firmwaregeovision_gv-gf192x_firmwaregeovision_gv-as210geovision_gv-as210_firmwaregeovision_gv-as810_firmwaregeovision_gv-as810geovision_gv-gf192xgeovision_gv-as410Door Access Control Device
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2022-30422
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-6.59% / 91.22%
||
7 Day CHG~0.00%
Published-17 Jun, 2022 | 16:11
Updated-03 Aug, 2024 | 06:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Proietti Tech srl Planet Time Enterprise 4.2.0.1,4.2.0.0,4.1.0.0,4.0.0.0,3.3.1.0,3.3.0.0 is vulnerable to Remote code execution via the Viewstate parameter.

Action-Not Available
Vendor-proiettin/a
Product-planet_time_enterprisen/a
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2025-34516
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-9.3||CRITICAL
EPSS-0.17% / 38.34%
||
7 Day CHG~0.00%
Published-16 Oct, 2025 | 17:52
Updated-23 Mar, 2026 | 15:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Ilevia EVE X1 Server 4.7.18.0.eden Use of Default Credentials

Ilevia EVE X1 Server firmware versions ≤ 4.7.18.0.eden contain a use of default credentials vulnerability that allows an unauthenticated attacker to obtain remote access. Ilevia has declined to service this vulnerability, and recommends that customers not expose port 8080 to the internet.

Action-Not Available
Vendor-ileviaIlevia Srl.
Product-eve_x1_servereve_x1_server_firmwareEVE X1 Server
CWE ID-CWE-1392
Use of Default Credentials
CVE-2025-34223
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-10||CRITICAL
EPSS-2.47% / 85.34%
||
7 Day CHG-0.85%
Published-29 Sep, 2025 | 20:38
Updated-17 Nov, 2025 | 23:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Vasion Print (formerly PrinterLogic) Insecure Installation Credentials

Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 22.0.1049 and Application prior to version 20.0.2786 (VA/SaaS deployments) contain a default admin account and an installation‑time endpoint at `/admin/query/update_database.php` that can be accessed without authentication. An attacker who can reach the installation web interface can POST arbitrary `root_user` and `root_password` values, causing the script to replace the default admin credentials with attacker‑controlled ones. The script also contains hard‑coded SHA‑512 and SHA‑1 hashes of the default password, allowing the attacker to bypass password‑policy validation. As a result, an unauthenticated remote attacker can obtain full administrative control of the system during the initial setup. This vulnerability has been identified by the vendor as: V-2024-022 — Insecure Installation Credentials.

Action-Not Available
Vendor-vasionVasion
Product-virtual_appliance_applicationvirtual_appliance_hostPrint Virtual Appliance HostPrint Application
CWE ID-CWE-306
Missing Authentication for Critical Function
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2023-6448
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) U.S. Civilian Government
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) U.S. Civilian Government
CVSS Score-9.8||CRITICAL
EPSS-13.29% / 94.19%
||
7 Day CHG~0.00%
Published-05 Dec, 2023 | 17:43
Updated-26 Feb, 2026 | 15:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2023-12-18||Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Unitronics VisiLogic uses a default administrative password

Unitronics VisiLogic before version 9.9.00, used in Vision and Samba PLCs and HMIs, uses a default administrative password. An unauthenticated attacker with network access can take administrative control of a vulnerable system.

Action-Not Available
Vendor-Unitronics PLC
Product-vision430vision120_firmwaresamba_4.3samba_3.5_firmwarevision280vision570vision430_firmwarevision280_firmwarevision700vision350vision230_firmwaresamba_7_firmwarevision130vision700_firmwarevision1040_firmwarevision130_firmwarevisilogicvision1210vision230samba_3.5vision560vision1040vision290vision1210_firmwarevision570_firmwarevision530_firmwaresamba_7vision530vision560_firmwaresamba_4.3_firmwarevision120vision290_firmwarevision350_firmwareVisiLogicvisilogicVision PLC and HMI
CWE ID-CWE-1188
Initialization of a Resource with an Insecure Default
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2020-36911
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-9.3||CRITICAL
EPSS-0.86% / 75.06%
||
7 Day CHG~0.00%
Published-13 Jan, 2026 | 22:51
Updated-05 Mar, 2026 | 01:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Covenant 0.5 - Remote Code Execution (RCE)

Covenant 0.1.3 - 0.5 contains a remote code execution vulnerability that allows attackers to craft malicious JWT tokens with administrative privileges. Attackers can generate forged tokens with admin roles and upload custom DLL payloads to execute arbitrary commands on the target system.

Action-Not Available
Vendor-cobbrCobbr
Product-covenantCovenant
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2025-34198
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-9.3||CRITICAL
EPSS-0.23% / 45.16%
||
7 Day CHG~0.00%
Published-19 Sep, 2025 | 18:40
Updated-17 Nov, 2025 | 23:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Vasion Print (formerly PrinterLogic) Shared / Hardcoded SSH Host Private Keys in Appliance Image

Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 22.0.951 and Application prior to 20.0.2368 (VA and SaaS deployments) contain shared, hardcoded SSH host private keys in the appliance image. The same private host keys (RSA, ECDSA, and ED25519) are present across installations, rather than being uniquely generated per appliance. An attacker who obtains these private keys (for example from one compromised appliance image or another installation) can impersonate the appliance, decrypt or intercept SSH connections to appliances that use the same keys, and perform man-in-the-middle or impersonation attacks against administrative SSH sessions. This vulnerability has been identified by the vendor as: V-2024-011 — Hardcoded SSH Host Key.

Action-Not Available
Vendor-vasionVasion
Product-virtual_appliance_applicationvirtual_appliance_hostPrint Virtual Appliance HostPrint Application
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2025-33089
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.05% / 16.51%
||
7 Day CHG~0.00%
Published-17 Feb, 2026 | 18:59
Updated-06 Mar, 2026 | 15:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Multiple Vulnerabilities in IBM Concert Software.

IBM Concert 1.0.0 through 2.1.0 could allow a remote attacker to obtain sensitive information or perform unauthorized actions due to the use of hard coded user credentials.

Action-Not Available
Vendor-IBM Corporation
Product-concertConcert
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2023-5456
Matching Score-4
Assigner-Nozomi Networks Inc.
ShareView Details
Matching Score-4
Assigner-Nozomi Networks Inc.
CVSS Score-8.1||HIGH
EPSS-0.60% / 69.46%
||
7 Day CHG~0.00%
Published-05 Mar, 2024 | 11:10
Updated-10 Apr, 2025 | 20:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A CWE-798 “Use of Hard-coded Credentials” vulnerability in the MariaDB database of the web application allows a remote unauthenticated attacker to access the database service and all included data with the same privileges of the web application. This issue affects: AiLux imx6 bundle below version imx6_1.0.7-2.

Action-Not Available
Vendor-ailuxAiLuxailux
Product-imx6imx6 bundleimx6_bundle
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2023-53983
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-9.3||CRITICAL
EPSS-0.67% / 71.46%
||
7 Day CHG+0.09%
Published-30 Dec, 2025 | 22:41
Updated-16 Jan, 2026 | 19:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Anevia Flamingo XL/XS 3.6.20 Default Credentials Authentication Bypass

Anevia Flamingo XL/XS 3.6.20 contains a critical vulnerability with weak default administrative credentials that can be easily guessed. Attackers can leverage these hard-coded credentials to gain full remote system control without complex authentication mechanisms.

Action-Not Available
Vendor-atemeAteme
Product-soapsystemflamingo_xs_firmwareflamingo_xl_firmwareflamingo_xlflamingo_xssoapliveSoapSystemSoapLiveAnevia Flamingo XL/XS
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2008-0961
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-2.28% / 84.75%
||
7 Day CHG~0.00%
Published-14 Apr, 2008 | 16:00
Updated-23 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

EMV DiskXtender 6.20.060 has a hard-coded login and password, which allows remote attackers to bypass authentication via the RPC interface.

Action-Not Available
Vendor-n/aELAN Microelectronics Corporation
Product-diskxtendern/a
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2022-3214
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.8||CRITICAL
EPSS-4.85% / 89.58%
||
7 Day CHG~0.00%
Published-16 Sep, 2022 | 18:05
Updated-25 Feb, 2026 | 16:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Delta Electronics DIAEnergy Use of Hard-coded Credentials

Delta Industrial Automation's DIAEnergy, an industrial energy management system, is vulnerable to CWE-798, Use of Hard-coded Credentials. Versions prior to  1.9.03.009 have this vulnerability. Executable files could be uploaded to certain directories using hard-coded bearer authorization, allowing remote code execution.

Action-Not Available
Vendor-Delta Electronics, Inc.
Product-diaenergieDIAEnergy
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2022-3089
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-6.3||MEDIUM
EPSS-0.07% / 22.23%
||
7 Day CHG~0.00%
Published-13 Feb, 2023 | 16:28
Updated-07 Nov, 2023 | 03:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
EnOcean SmartServer Hard-coded credentials

Echelon SmartServer 2.2 with i.LON Vision 2.2 stores cleartext credentials in a file, which could allow an attacker to obtain cleartext usernames and passwords of the SmartServer. If the attacker obtains the file, then the credentials could be used to control the web user interface and file transfer protocol (FTP) server.

Action-Not Available
Vendor-echelonEnOcean
Product-i.lon_visionsmartserverSmartserver
CWE ID-CWE-798
Use of Hard-coded Credentials
CWE ID-CWE-312
Cleartext Storage of Sensitive Information
CVE-2022-30318
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-3.39% / 87.46%
||
7 Day CHG~0.00%
Published-31 Aug, 2022 | 15:39
Updated-03 Aug, 2024 | 06:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Honeywell ControlEdge through R151.1 uses Hard-coded Credentials. According to FSCT-2022-0056, there is a Honeywell ControlEdge hardcoded credentials issue. The affected components are characterized as: SSH. The potential impact is: Remote code execution, manipulate configuration, denial of service. The Honeywell ControlEdge PLC and RTU product line exposes an SSH service on port 22/TCP. Login as root to this service is permitted and credentials for the root user are hardcoded without automatically changing them upon first commissioning. The credentials for the SSH service are hardcoded in the firmware. The credentials grant an attacker access to a root shell on the PLC/RTU, allowing for remote code execution, configuration manipulation and denial of service.

Action-Not Available
Vendor-n/aHoneywell International Inc.
Product-controledge_plccontroledge_rtucontroledge_plc_firmwarecontroledge_rtu_firmwaren/a
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2022-30271
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.20% / 41.69%
||
7 Day CHG~0.00%
Published-26 Jul, 2022 | 22:11
Updated-03 Aug, 2024 | 06:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Motorola ACE1000 RTU through 2022-05-02 ships with a hardcoded SSH private key and initialization scripts (such as /etc/init.d/sshd_service) only generate a new key if no private-key file exists. Thus, this hardcoded key is likely to be used by default.

Action-Not Available
Vendor-n/aMotorola Mobility LLC. (Lenovo Group Limited)
Product-ace1000_firmwareace1000n/aace1000_firmware
CWE ID-CWE-259
Use of Hard-coded Password
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2022-30274
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.17% / 38.32%
||
7 Day CHG~0.00%
Published-26 Jul, 2022 | 22:06
Updated-03 Aug, 2024 | 06:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Motorola ACE1000 RTU through 2022-05-02 uses ECB encryption unsafely. It can communicate with an XRT LAN-to-radio gateway by means of an embedded client. Credentials for accessing this gateway are stored after being encrypted with the Tiny Encryption Algorithm (TEA) in ECB mode using a hardcoded key. Similarly, the ACE1000 RTU can route MDLC traffic over Extended Command and Management Protocol (XCMP) and Network Layer (XNL) networks via the MDLC driver. Authentication to the XNL port is protected by TEA in ECB mode using a hardcoded key.

Action-Not Available
Vendor-n/aMotorola Mobility LLC. (Lenovo Group Limited)
Product-ace1000_firmwareace1000n/a
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2022-30234
Matching Score-4
Assigner-Schneider Electric
ShareView Details
Matching Score-4
Assigner-Schneider Electric
CVSS Score-9.4||CRITICAL
EPSS-0.37% / 58.49%
||
7 Day CHG~0.00%
Published-02 Jun, 2022 | 22:45
Updated-16 Sep, 2024 | 19:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A CWE-798: Use of Hard-coded Credentials vulnerability exists that could allow arbitrary code to be executed when root level access is obtained. Affected Products: Wiser Smart, EER21000 & EER21001 (V4.5 and prior)

Action-Not Available
Vendor-
Product-wiser_smart_eer21000wiser_smart_eer21001_firmwarewiser_smart_eer21000_firmwarewiser_smart_eer21001Wiser Smart
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2022-29953
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.40% / 60.77%
||
7 Day CHG~0.00%
Published-26 Jul, 2022 | 21:42
Updated-03 Aug, 2024 | 06:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Bently Nevada 3700 series of condition monitoring equipment through 2022-04-29 has a maintenance interface on port 4001/TCP with undocumented, hardcoded credentials. An attacker capable of connecting to this interface can thus trivially take over its functionality.

Action-Not Available
Vendor-n/aBaker Hughes Company
Product-bently_nevada_3701\/46bently_nevada_60m100_firmwarebently_nevada_3701\/40_firmwarebently_nevada_3701\/40bently_nevada_60m100bently_nevada_3701\/44bently_nevada_3701\/46_firmwarebently_nevada_3701\/44_firmwaren/a
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2022-29730
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.64% / 70.71%
||
7 Day CHG~0.00%
Published-27 May, 2022 | 12:56
Updated-03 Aug, 2024 | 06:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

USR IOT 4G LTE Industrial Cellular VPN Router v1.0.36 was discovered to contain hard-coded credentials for its highest privileged account. The credentials cannot be altered through normal operation of the device.

Action-Not Available
Vendor-usrn/a
Product-usr-g800v2_firmwareusr-g808_firmwareusr-g807usr-g806usr-g806_firmwareusr-lg220-l_firmwareusr-g800v2usr-lg220-lusr-g808usr-g807_firmwaren/a
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2020-35929
Matching Score-4
Assigner-Kaspersky
ShareView Details
Matching Score-4
Assigner-Kaspersky
CVSS Score-9.8||CRITICAL
EPSS-0.36% / 58.41%
||
7 Day CHG~0.00%
Published-19 Jan, 2021 | 16:53
Updated-04 Aug, 2024 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In TinyCheck before commits 9fd360d and ea53de8, the installation script of the tool contained hard-coded credentials to the backend part of the tool. This information could be used by an attacker for unauthorized access to remote data.

Action-Not Available
Vendor-Kaspersky Lab
Product-tinycheckTinyCheck
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2020-35338
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-81.95% / 99.21%
||
7 Day CHG~0.00%
Published-14 Dec, 2020 | 17:02
Updated-04 Aug, 2024 | 17:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Web Administrative Interface in Mobile Viewpoint Wireless Multiplex Terminal (WMT) Playout Server 20.2.8 and earlier has a default account with a password of "pokon."

Action-Not Available
Vendor-mobileviewpointn/a
Product-wireless_multiplex_terminal_playout_servern/a
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2020-3318
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-8.1||HIGH
EPSS-0.41% / 61.17%
||
7 Day CHG~0.00%
Published-06 May, 2020 | 16:40
Updated-26 Nov, 2024 | 16:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Firepower Management Center Static Credential Vulnerabilities

Multiple vulnerabilities in Cisco Firepower Management Center (FMC) Software and Cisco Firepower User Agent Software could allow an attacker to access a sensitive part of an affected system with a high-privileged account. For more information about these vulnerabilities, see the Details section of this advisory.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-secure_firewall_management_centerCisco Firepower Management Center
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2022-29645
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.39% / 60.27%
||
7 Day CHG~0.00%
Published-18 May, 2022 | 11:50
Updated-03 Aug, 2024 | 06:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

TOTOLINK A3100R V4.1.2cu.5050_B20200504 and V4.1.2cu.5247_B20211129 were discovered to contain a hard coded password for root stored in the component /etc/shadow.sample.

Action-Not Available
Vendor-n/aTOTOLINK
Product-a3100ra3100r_firmwaren/a
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2024-1039
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.8||CRITICAL
EPSS-0.16% / 36.57%
||
7 Day CHG~0.00%
Published-01 Feb, 2024 | 21:38
Updated-07 Aug, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use of Hard-coded Credentials in Gessler GmbH WEB-MASTER

Gessler GmbH WEB-MASTER has a restoration account that uses weak hard coded credentials and if exploited could allow an attacker control over the web management of the device.

Action-Not Available
Vendor-gesslergmbhGessler GmbH
Product-web-masterweb-master_firmwareWEB-MASTER
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2022-29889
Matching Score-4
Assigner-Talos
ShareView Details
Matching Score-4
Assigner-Talos
CVSS Score-9.8||CRITICAL
EPSS-1.12% / 78.37%
||
7 Day CHG~0.00%
Published-25 Oct, 2022 | 16:33
Updated-15 Apr, 2025 | 18:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A hard-coded password vulnerability exists in the telnet functionality of Abode Systems, Inc. iota All-In-One Security Kit 6.9Z. Use of a hard-coded root password can lead to arbitrary command execution. An attacker can authenticate with hard-coded credentials to trigger this vulnerability.

Action-Not Available
Vendor-goabodeabode systems, inc.
Product-iota_all-in-one_security_kitiota_all-in-one_security_kit_firmwareiota All-In-One Security Kit
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2020-36062
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.89% / 75.65%
||
7 Day CHG~0.00%
Published-11 Feb, 2022 | 15:03
Updated-04 Aug, 2024 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dairy Farm Shop Management System v1.0 was discovered to contain hardcoded credentials in the source code which allows attackers access to the control panel if compromised.

Action-Not Available
Vendor-n/aPHPGurukul LLP
Product-dairy_farm_shop_management_systemn/a
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2020-3330
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-9.8||CRITICAL
EPSS-5.36% / 90.12%
||
7 Day CHG~0.00%
Published-16 Jul, 2020 | 17:20
Updated-15 Nov, 2024 | 16:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Small Business RV110W Wireless-N VPN Firewall Static Default Credential Vulnerability

A vulnerability in the Telnet service of Cisco Small Business RV110W Wireless-N VPN Firewall Routers could allow an unauthenticated, remote attacker to take full control of the device with a high-privileged account. The vulnerability exists because a system account has a default and static password. An attacker could exploit this vulnerability by using this default account to connect to the affected system. A successful exploit could allow the attacker to gain full control of an affected device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-rv110w_wireless-n_vpn_firewall_firmwarerv110w_wireless-n_vpn_firewallCisco RV110W Wireless-N VPN Firewall Firmware
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2022-29525
Matching Score-4
Assigner-JPCERT/CC
ShareView Details
Matching Score-4
Assigner-JPCERT/CC
CVSS Score-9.8||CRITICAL
EPSS-0.67% / 71.41%
||
7 Day CHG~0.00%
Published-13 Jun, 2022 | 04:50
Updated-03 Aug, 2024 | 06:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Rakuten Casa version AP_F_V1_4_1 or AP_F_V2_0_0 uses a hard-coded credential which may allow a remote unauthenticated attacker to log in with the root privilege and perform an arbitrary operation.

Action-Not Available
Vendor-rakutenRakuten Mobile, Inc.
Product-casaRakuten Casa
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2024-12286
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.3||CRITICAL
EPSS-0.43% / 62.65%
||
7 Day CHG+0.11%
Published-10 Dec, 2024 | 17:40
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
MOBATIME Network Master Clock has a use of default credentials vulnerability

MOBATIME Network Master Clock - DTS 4801 allows attackers to use SSH to gain initial access using default credentials.

Action-Not Available
Vendor-MOBATIME
Product-Network Master Clock - DTS 4801
CWE ID-CWE-1392
Use of Default Credentials
CVE-2022-29477
Matching Score-4
Assigner-Talos
ShareView Details
Matching Score-4
Assigner-Talos
CVSS Score-8.6||HIGH
EPSS-0.29% / 51.94%
||
7 Day CHG~0.00%
Published-25 Oct, 2022 | 16:33
Updated-15 Apr, 2025 | 18:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An authentication bypass vulnerability exists in the web interface /action/factory* functionality of Abode Systems, Inc. iota All-In-One Security Kit 6.9X and 6.9Z. A specially-crafted HTTP header can lead to authentication bypass. An attacker can send an HTTP request to trigger this vulnerability.

Action-Not Available
Vendor-goabodeabode systems, inc.
Product-iota_all-in-one_security_kitiota_all-in-one_security_kit_firmwareiota All-In-One Security Kit
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2022-29644
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.39% / 60.27%
||
7 Day CHG~0.00%
Published-18 May, 2022 | 11:50
Updated-03 Aug, 2024 | 06:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

TOTOLINK A3100R V4.1.2cu.5050_B20200504 and V4.1.2cu.5247_B20211129 were discovered to contain a hard coded password for the telnet service stored in the component /web_cste/cgi-bin/product.ini.

Action-Not Available
Vendor-n/aTOTOLINK
Product-a3100ra3100r_firmwaren/a
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2022-29186
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-9.1||CRITICAL
EPSS-0.31% / 54.12%
||
7 Day CHG~0.00%
Published-20 May, 2022 | 20:20
Updated-23 Apr, 2025 | 18:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use of Hard-coded Cryptographic Key in rundeck/rundeck, rundeckpro/enterprise

Rundeck is an open source automation service with a web console, command line tools and a WebAPI. Rundeck community and rundeck-enterprise docker images contained a pre-generated SSH keypair. If the id_rsa.pub public key of the keypair was copied to authorized_keys files on remote host, those hosts would allow access to anyone with the exposed private credentials. This misconfiguration only impacts Rundeck Docker instances of PagerDuty® Process Automation On Prem (formerly Rundeck) version 4.0 and earlier, not Debian, RPM or .WAR. Additionally, the id_rsa.pub file would have to be copied from the Docker image filesystem contents without overwriting it and used to configure SSH access on a host. A patch on Rundeck's `main` branch has removed the pre-generated SSH key pair, but it does not remove exposed keys that have been configured. To patch, users must run a script on hosts in their environment to search for exposed keys and rotate them. Two workarounds are available: Do not use any pre-existing public key file from the rundeck docker images to allow SSH access by adding it to authorized_keys files and, if you have copied the public key file included in the docker image, remove it from any authorized_keys files.

Action-Not Available
Vendor-pagerdutyrundeck
Product-rundeckrundeck
CWE ID-CWE-321
Use of Hard-coded Cryptographic Key
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2025-30113
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.11% / 28.73%
||
7 Day CHG-0.02%
Published-18 Mar, 2025 | 00:00
Updated-22 May, 2025 | 19:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on the Forvia Hella HELLA Driving Recorder DR 820. Hardcoded Credentials exist in the APK for Ports 9091 and 9092. The dashcam's Android application contains hardcoded credentials that allow unauthorized access to device settings through ports 9091 and 9092. These credentials, stored in cleartext, can be exploited by an attacker who gains access to the dashcam's network.

Action-Not Available
Vendor-hellan/a
Product-dr_820dr_820_firmwaren/a
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2022-28605
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-1.49% / 81.15%
||
7 Day CHG~0.00%
Published-31 May, 2022 | 20:11
Updated-03 Aug, 2024 | 05:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Hardcoded admin token in SoundBar apps in Linkplay SDK 1.00 allows remote attackers to gain admin privilege access in linkplay antifactory

Action-Not Available
Vendor-linkplayn/aApple Inc.Google LLC
Product-androidiphone_ossound_barn/a
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2024-1228
Matching Score-4
Assigner-CERT.PL
ShareView Details
Matching Score-4
Assigner-CERT.PL
CVSS Score-9.3||CRITICAL
EPSS-0.13% / 31.29%
||
7 Day CHG~0.00%
Published-10 Jun, 2024 | 11:13
Updated-07 Oct, 2025 | 13:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Hardcoded password in Eurosoft Przychodnia

Use of hard-coded password to the patients' database allows an attacker to retrieve sensitive data stored in the database. The password is the same among all Eurosoft Przychodnia installations. This issue affects Eurosoft Przychodnia software before version 20240417.001 (from that version vulnerability is fixed).

Action-Not Available
Vendor-eurosoftEuroSoft Sp. z o. o.eurosoftsp.zo.o
Product-przychodniaEurosoft Przychodniaeurosoft_przychodina
CWE ID-CWE-259
Use of Hard-coded Password
CWE ID-CWE-798
Use of Hard-coded Credentials
  • Previous
  • 1
  • 2
  • 3
  • ...
  • 11
  • 12
  • Next
Details not found