Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2025-6077

Summary
Assigner-certcc
Assigner Org ID-37e5125f-f79b-445b-8fad-9564f167944b
Published At-02 Aug, 2025 | 02:15
Updated At-05 Aug, 2025 | 14:48
Rejected At-
Credits

CVE-2025-6077

Partner Software's Partner Software Product and corresponding Partner Web application use the same default username and password for the administrator account across all versions.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:certcc
Assigner Org ID:37e5125f-f79b-445b-8fad-9564f167944b
Published At:02 Aug, 2025 | 02:15
Updated At:05 Aug, 2025 | 14:48
Rejected At:
▼CVE Numbering Authority (CNA)
CVE-2025-6077

Partner Software's Partner Software Product and corresponding Partner Web application use the same default username and password for the administrator account across all versions.

Affected Products
Vendor
Partner Software
Product
Partner Web
Versions
Affected
  • From 4.32 before 4.32.2 (custom)
Problem Types
TypeCWE IDDescription
N/AN/ACWE-1391
Type: N/A
CWE ID: N/A
Description: CWE-1391
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://partnersoftware.com/resources/software-release-info-4-32/
N/A
Hyperlink: https://partnersoftware.com/resources/software-release-info-4-32/
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Problem Types
TypeCWE IDDescription
CWECWE-1391CWE-1391 Use of Weak Credentials
Type: CWE
CWE ID: CWE-1391
Description: CWE-1391 Use of Weak Credentials
Metrics
VersionBase scoreBase severityVector
3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cret@cert.org
Published At:02 Aug, 2025 | 03:15
Updated At:05 Aug, 2025 | 15:15

Partner Software's Partner Software Product and corresponding Partner Web application use the same default username and password for the administrator account across all versions.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-1391Secondary134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE ID: CWE-1391
Type: Secondary
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://partnersoftware.com/resources/software-release-info-4-32/cret@cert.org
N/A
Hyperlink: https://partnersoftware.com/resources/software-release-info-4-32/
Source: cret@cert.org
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

5Records found

CVE-2023-0635
Matching Score-4
Assigner-Asea Brown Boveri Ltd. (ABB)
ShareView Details
Matching Score-4
Assigner-Asea Brown Boveri Ltd. (ABB)
CVSS Score-7.8||HIGH
EPSS-0.12% / 31.24%
||
7 Day CHG~0.00%
Published-05 Jun, 2023 | 03:42
Updated-08 Jan, 2025 | 16:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Privilege escalation to root

Improper Privilege Management vulnerability in ABB Ltd. ASPECT®-Enterprise on ASPECT®-Enterprise, Linux (2CQG103201S3021, 2CQG103202S3021, 2CQG103203S3021, 2CQG103204S3021 modules), ABB Ltd. NEXUS Series on NEXUS Series, Linux (2CQG100102R2021, 2CQG100104R2021, 2CQG100105R2021, 2CQG100106R2021, 2CQG100110R2021, 2CQG100112R2021, 2CQG100103R2021, 2CQG100107R2021, 2CQG100108R2021, 2CQG100109R2021, 2CQG100111R2021, 2CQG100113R2021 modules), ABB Ltd. MATRIX Series on MATRIX Series, Linux (2CQG100102R1021, 2CQG100103R1021, 2CQG100104R1021, 2CQG100105R1021, 2CQG100106R1021 modules) allows Privilege Escalation.This issue affects ASPECT®-Enterprise: from 3.0;0 before 3.07.01; NEXUS Series: from 3.0;0 before 3.07.01; MATRIX Series: from 3.0;0 before 3.07.01.

Action-Not Available
Vendor-ABB
Product-nexus-264-amatrix-11_firmwarematrix-264_firmwarematrix-232nexus-2128-g_firmwarenexus-264nexus-2128-aaspect-ent-96nexus-2128-gnexus-264_firmwarenexus-2128_firmwarenexus-2128-fnexus-264-a_firmwarenexus-2128-a_firmwarematrix-216matrix-296_firmwarematrix-216_firmwareaspect-ent-256nexus-3-264_firmwareaspect-ent-12aspect-ent-256_firmwarematrix-11nexus-264-faspect-ent-2_firmwarenexus-264-g_firmwarenexus-264-f_firmwarenexus-2128nexus-3-2128nexus-3-2128_firmwarematrix-232_firmwarenexus-264-gaspect-ent-12_firmwarematrix-296aspect-ent-2nexus-2128-f_firmwarenexus-3-264aspect-ent-96_firmwarematrix-264MATRIX SeriesNEXUS SeriesASPECT®-Enterprise
CWE ID-CWE-1391
Use of Weak Credentials
CVE-2024-12728
Matching Score-4
Assigner-Sophos Limited
ShareView Details
Matching Score-4
Assigner-Sophos Limited
CVSS Score-9.8||CRITICAL
EPSS-0.11% / 29.60%
||
7 Day CHG+0.01%
Published-19 Dec, 2024 | 20:48
Updated-21 Dec, 2024 | 04:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A weak credentials vulnerability potentially allows privileged system access via SSH to Sophos Firewall older than version 20.0 MR3 (20.0.3).

Action-Not Available
Vendor-Sophos Ltd.
Product-Sophos Firewall
CWE ID-CWE-1391
Use of Weak Credentials
CVE-2023-31240
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-8.3||HIGH
EPSS-0.06% / 17.11%
||
7 Day CHG~0.00%
Published-22 May, 2023 | 19:58
Updated-16 Jan, 2025 | 21:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Snap One OvrC Pro versions prior to 7.2 have their own locally running web server accessible both from the local network and remotely. OvrC cloud contains a hidden superuser account accessible through hard-coded credentials.

Action-Not Available
Vendor-snaponeSnap One
Product-orvcOvrC Cloud
CWE ID-CWE-1391
Use of Weak Credentials
CVE-2024-51978
Matching Score-4
Assigner-Rapid7, Inc.
ShareView Details
Matching Score-4
Assigner-Rapid7, Inc.
CVSS Score-9.8||CRITICAL
EPSS-71.38% / 98.66%
||
7 Day CHG+11.31%
Published-25 Jun, 2025 | 07:17
Updated-25 Jul, 2025 | 16:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Authentication bypass via default password generation affecting multiple models from Brother Industries, Ltd, Toshiba Tec, and Konica Minolta, Inc.

An unauthenticated attacker who knows the target device's serial number, can generate the default administrator password for the device. An unauthenticated attacker can first discover the target device's serial number via CVE-2024-51977 over HTTP/HTTPS/IPP, or via a PJL request, or via an SNMP request.

Action-Not Available
Vendor-Brother Industries, LtdToshiba TecKonica Minolta, Inc.
Product-HL-L2865DWHL-L2360DNDCP-L2531DWDCP-J4543NHL-1210WRHL-L2400DWEDCP-B7578DWHL-L1232WMFC-L2717DWDCP-L6600DWMFC-7895DWMFC-J6580CDWMFC-J3930DWHL-L3240CDWDCP-T230HL-1218WMFC-L5802DWDCP-L2605DWMFC-J1170DWADS-3300Wbizhub 5020iMFC-L8690CDWMFC-J5340DWMFC-J5345DWHL-L2371DNPT-E550W (for Russia)MFC-B7810DWBMFC-L9570CDW(for Japan)DCP-L2540DWHL-L2340DWMFC-J3940DWHL-L2375DWRQL-1115NWBMFC-J1215WMFC-L6800DWDCP-L1632WDCP-L2640DWMFC-J1205W(XL)MFC-L5700DWHL-L6410DNDCP-L3560CDWDCP-L2520DWDCP-L5510DNDCP-L5500DNDCP-J982N-W/BDCP-T420WDCP-J4143NHL-L2350DWMFC-L2800DWMFC-J6730DWMFC-L2710DWRDCP-T435WDCP-L2627DWHL-L3300CDWHL-L2461DNMFC-L2860DWHL-B2150WMFC-L2860DWEMFC-J5845DW(XL)PT-P750WMFC-L6810DWPT-E550W (for Vietnum)MFC-J4345DW XLMFC-L5717DWDCP-L2627DWXLMFC-L2880DWDCP-L3555CDWHL-L3215CWMFC-9150CDNMFC-L6702DWDCP-C1210NHL-L6200DWMFC-J6955DWRJ-3150AiDCP-L3510CDWMFC-L2751DWDCP-B7640DWBDCP-L3551CDWHL-L2357DWTD-2350DDCP-T530DWHL-L6210DWSP-1 (for Japan)HL-L6412DWDCP-L2627DWEMFC-J1605DNDCP-1623WRDCP-9030CDNDCP-L2647DWMFC-L5800DWHL-L6400DWGMFC-L5850DWMFC-J4340DW(XL)HL-L2366DWDCP-T226DCP-1610WEMFC-J4443NMFC-L5715DNMFC-J939DNTJ-4121TNRPT-D800WHL-L6300DWMFC-J5335DWMFC-T810W(for China)DCP-1610WDCP-T825DWHL-L2465DWMFC-L8610CDW(for Japan)MFC-L5900DWHL-L9310CDWDCP-B7620DWADS-1250WMFC-L5715DWMFC-L8395CDWHL-L2385DWMFC-J1012DWQL-810WHL-L6415DWTJ-4020TNDCP-1618WHL-L5210DWTHL-L2390DWMFC-L6912DWNFC-EX670HL-L3220CWDCP-L1848WMFC-L2817DWTD-4750TNWBRTJ-4021TNMFC-L5702DWHL-B2158WDCP-L2551DWNFC-J903NMFC-J497DWDCP-B7658DWPT-E550W (for US, EU)HL-L6402DWPT-P950NWMFC-J904NMFC-J939DWNDCP-L5652DNMFC-L8900CDWMFC-L2900DWXLMFC-L8340CDWMFC-7889DWDCP-1616NWDCP-J572NHL-L2360DWRJ-3150HL-L2351DWDCP-J981NDCP-J988NHL-L2350DWRTD-2350DFSAHL-3190CDWHL-L6217DWHL-L6450DWMFC-L2802DNMFC-L5750DWDCP-L5518DNHL-L2425DWTD-2125NQL-1110NWBcDCP-B7620DWBMFC-L9635CDNDCP-J572DWDCP-1612WDCP-L3550CDWMFC-J2730DWMFC-L2820DWXLMFC-L5700DNMFC-J738DWNDCP-L2552DNMFC-L6700DWTD-2310DHL-L5228DWDCP-L2665DWDCP-T220MFC-L5728DWDCP-L8410CDWMFC-1915WDCP-L2550DWQL-810WcMFC-L2900DWDCP-L5600DNMFC-J7100CDWHL-J6000DWMFC-J995DW XLDCP-L3520CDWMFC-L3735CDNDCP-J1140DWHL-L2386DWMFC-L2827DWXLHL-L1230WMFC-J4540NDCP-L2535DWRJ-4250WBMFC-L8610CDWHL-J6000CDWHL-L1808WDCP-J914NMFC-J690DWMFC-L2805DWHL-L8360CDWADS-2400NRJ-3035BMFC-J815DW XLHL-L2460DWXLDCP-L5610DNHL-5595DNHMFC-L2732DWMFC-L8390CDWMFC-J491DWRJ-2050TD-2120NMFC-L2713DWDCP-L2620DWHL-L2440DWDCP-J1200WEDCP-L1638WMFC-L9577CDWMFC-1910WDCP-T536DWHL-L9430CDNMFC-EX670WPT-E850TKW (for Asia pacific, EU, US)MFC-L2750DWRDCP-B7638DNDCP-L2520DWRDCP-J577NTD-2130NDCP-L3515CDWDCP-B7648DWHL-L2480DWMFC-L2685DWMFC-1916NWMFC-L2886DWMFC-L2707DWHL-EX415DWDCP-J972NHL-L8245CDWRJ-2150MFC-J6930DWHL-L6300DWTHL-L2375DWMFC-T910DWbizhub 5000iMFC-L6902DWPT-E550W (for Thailand)MFC-L2861DWMFC-L2720DWRMFC-8540DNTJ-4422TNDCP-1610WRHL-1222WEDCP-T439WQL-1110NWBHL-L2447DWMFC-L9630CDNDCP-L2625DWPT-E850TKW (for UAE)HL-L3220CWEHL-L5102DWMFC-J890DWTD-4520DNPT-P900WcHL-L6415DNHL-L9470CDNMFC-J905NDCP-7090DWMFC-J893NDCP-7190DNDCP-7195DWHL-L2400DWPT-E850TKW (for China)MFC-J5930DWDCP-7189DWHL-L6202DWMFC-B7800DNMFC-J1300DWHL-L6210DWTDCP-L2532DWTJ-4121TNMFC-J6945DWDCP-T525WMFC-J4540DW(XL)DCP-L2550DNMFC-J4440NMFC-L5718DNDCP-L2640DNHL-2560DNHL-EX470WMFC-L2730DNMFC-L3780CDWDCP-T735DWHL-L2360DNRHL-L6400DWTMFC-L5912DWHL-5590DNHL-L2370DNRDCP-J987N-BMFC-T4500DWHL-B2100DPT-E850TKW (for Koria)MFC-J739DNHL-L2340DWRMFC-L2730DWMFC-J6959DWMFC-L6710DWMFC-L6970DWMFC-L5710DWDCP-J4140Nbizhub 4000iHL-L2467DWVC-500WDCP-B7558WMFC-J2330DWHL-L3290CDWADS-4700WHL-2569DWMFC-L2827DWMFC-L6900DWMFC-J1500NMFC-J805DWHL-L3270CDWHL-1223WEMFC-1919NWDCP-J528NMFC-J4335DW(XL)MFC-L2770DWHL-L5210DNMFC-T925DWDCP-T820DWTJ-4021TNRHL-L6200DWTTD-4420DNZMFC-L2802DWDCP-B7608WDCP-L2540DNDCP-L2537DWTJ-4005DNMFC-J6555DW XLDCP-J928N-WBMFC-L2690DWHL-L2325DWMFC-L2771DWDCP-B7535DWDCP-L2550DNRMFC-1911WMFC-J6555DWMFC-L3740CDWMFC-L3740CDWEMFC-L2880DWXLTD-4650TNWBRPT-E550W (for China)MFC-J6983CDWMFC-L6915DNMFC-L6950DWHL-J7010CDWHL-L5200DWTHL-1212WRHL-1212WEMFC-J5730DWDCP-T238MFC-1912WRDCP-L5510DWHL-L2460DWHL-L2380DWMFC-J6530DWHL-L2352DWMFC-7880DNTD-2320DSADCP-L2660DWDCP-J772DWHL-L2315DWHL-2590DNMFC-J6540DWEMFC-L2710DNMFC-B7715DWMFC-L3730CDNTD-2135NRJ-2035BMFC-L2980DWDCP-B7530DNDCP-L2551DNDCP-T830DWQL-820NWBHL-B2100DBDCP-B7600DBDCP-B7548WDCP-C421WMFC-L5710DNMFC-L2885DWMFC-L2705DWRJ-3050HL-B2080DWMFC-1910WEHL-L3280CDWMFC-L5755DWMFC-J6940DWDCP-L2540DNRMFC-J998DWNDCP-1615NWMFC-B7810DWTD-4550DNWBHL-L6400DWHL-T4000DWMFC-B7811DWADS-3600WHL-L3295CDWDCP-T710W(for China)DCP-L2560DWRDCP-L2622DWHL-L5212DWTJ-4420TNMFC-L2806DWDCP-J1200W(XL)MFC-T810WDCP-T520WHL-JF1MFC-L6910DNMFC-J895DWMFC-L2701DWTJ-4520TNHL-L3230CDNMFC-J5945DWMFC-L2715DWDCP-J1200NPT-E850TKW (for Vietnum)MFC-J738DNDCP-L2530DWHL-L2405WMFC-J5330DWHL-B2181DWDCP-T225DCP-J1203NADS-4900WHL-L2372DNMFC-L2700DNHL-L8240CDWHL-L8260CDNMFC-J5955DWDCP-L5650DNMFC-J6997CDWMFC-L2710DWHL-L6250DNDCP-7190DWPJ-773MFC-L2740DWDCP-T730DWFAX-L2710DNMFC-J5855DWMFC-J1800DWMFC-L2716DWHL-L5215DNMFC-T935DWADS-2800WHL-L5100DNTMFC-L6900DWGDCP-L3568CDWDCP-B7650DWDCP-L2600DWTJ-4010TNMFC-J4940DNMFC-L2862DWHL-L2464DWMFC-L3710CDWMFC-J6999CDWHL-L2475DWHL-1211WHL-L2370DWXLTD-2350DFMFC-7890DNDCP-T436WMFC-T920DWHL-L8260CDWTD-4420TNDCP-L3520CDWETD-4420DNHL-L2395DWHL-L6418DWHL-L5202DWMFC-J5800CDWHL-L2365DWMFC-T930DWHL-L2365DWRDCP-1617NWMFC-J6947DWQL-820NWBcHL-L8360CDWTMFC-L2922DWDCP-L3517CDWADS-1700WMFC-J6995CDWMFC-L2750DWDCP-L2648DWMFC-L3770CDWMFC-L2700DW(ASA)DCP-T428WHL-1223WRDCP-J973N-W/BFAX-L2800DWMFC-J5630CDWMFC-L3760CDWMFC-L6915DN CSPHL-L2420DWMFC-L2700DWRMFC-L3720CDWMFC-8530DNRJ-3050AiMFC-J739DWNMFC-L9610CDNDCP-J987N-WDCP-L1630WHL-L8230CDWDCP-T510W(for China)DCP-J1800NHL-L2460DNMFC-L2700DWMFC-J1010DWMFC-J7600CDWDCP-L5602DNDCP-T535DWDCP-L2518DWHL-L1238WMFC-J805DW XLRJ-3250WBMFC-L2715DW(for Tiwan, Koria)TJ-4620TNHL-L3220CDWMFC-L2820DWHL-L5215DWDS-740DMFC-1911NWHL-L2376DWDCP-1622WEADS-4300NMFC-J6583CDWDCP-J1050DWHL-1212WHL-L9410CDNMFC-J6935DWDCP-T430WMFC-L3750CDWMFC-J7700CDWDCP-J1800DWDCP-T236MFC-J6535DWMFC-L3745CDWPT-E550W (for Koria)HL-L5050DNMFC-L3768CDWHL-L3230CDWTJ-4120TNMFC-L2835DWMFC-L9570CDWMFC-L2920DWADS-2700WeMFC-L6915DWHL-L5218DNMFC-L2720DNMFC-L3765CDWHL-B2180DWBDCP-B7520DWPT-E800WHL-3160CDWMFC-L2765DWMFC-J5830DWDCP-T510WMFC-L5915DWHL-1210WMFC-L2710DNRMFC-L2740DWRDCP-T720DWMFC-J5855DW XLDCP-L2560DWTD-4650TNWBHL-J6100DWMFC-L2680WDCP-L5502DNDCP-7180DNbizhub 4020iMFC-4340DWETD-2320DFMFC-EX915DWDCP-1623WEMFC-J6540DWMFC-L2703DWPJ-883HL-L2445DWADS-1350WMFC-J998DNHL-L6415DWTMFC-L2760DWADS-2700WDS/MDS-940DWHL-L5210DWPT-E550W (for Tiwan, Hongkong)HL-J6010DWHL-L5212DNDCP-L2508DWDCP-L2628DWMFC-L2720DWHL-L5100DNDCP-J915NMFC-L2750DWXLHL-L2370DWMFC-J3540DWDCP-L5662DNTJ-TJ-4522TNTD-2320DDCP-L2541DWe-STUDIO302DNFMFC-J3530DWMFC-J898NHL-5595DNPT-E850TKW (for Tiwan)HL-L3228CDWMFC-L2712DWDCP-T426WDCP-J582NHL-1210WEHL-B2188DWMFC-J4535DW(XL)DCP-L5660DNMFC-L2712DNMFC-L3755CDWMFC-J6740DWMFC-L2960DWMFC-J5740DWMFC-L2807DWDCP-J526NMFC-L2730DWRHL-L2370DNHL-B2180DWHL-L3288CDWMFC-J2740DWPT-E850TKW (for Thailand)HL-L6310DWRJ-2140MFC-EX910DCP-B7600DHL-2595DWMFC-L5902DWMFC-J4440DWFAX-L2700DNMFC-J6980CDWHL-L3210CWMFC-J995DWMFC-L6820DWMFC-J7300CDWDCP-B7640DWMFC-J7500CDWMFC-J5340DWEDCP-L3528CDWDCP-1612WRDCP-L2548DWMFC-J2340DWMFC-9350CDWMFC-J926N-WBe-STUDIO301DNDCP-J978N-W/BHL-L6415DN CSPDCP-L2680DWTD-4750TNWBDCP-J587NHL-L6250DWTD-4520TNDCP-L2600DHL-B2050DNSP-1MFC-L6750DWDCP-J1700DWADS-1800WDCP-T725DWTD-2350DSAMFC-L9670CDNDCP-B7628DWDCP-J774DWHL-L5200DWMFC-B7720DNDCP-L5512DNDCP-T425WDCP-T710WDCP-1612WEHL-L2305WMFC-L6720DWDCP-T835DWDCP-L2530DWRADS-3000NMFC-J6957DWPT-P900WADS-4500WDCP-L2550DW(TWN)DCP-J1100DW
CWE ID-CWE-1391
Use of Weak Credentials
CVE-2024-43698
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.3||CRITICAL
EPSS-0.42% / 61.14%
||
7 Day CHG~0.00%
Published-22 Oct, 2024 | 21:23
Updated-23 Oct, 2024 | 15:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Kieback&Peter DDC4000 Series Use of Weak Credentials

Kieback & Peter's DDC4000 series uses weak credentials, which may allow an unauthenticated attacker to get full admin rights on the system.

Action-Not Available
Vendor-Kieback&Peterkieback\&peter
Product-DDC4400eDDC4002DDC4100DDC4400DDC4200-LDDC4040eDDC4020eDDC4200eDDC4200DDC4002eddc4200e_firmwareddc4002e_firmwareddc4100_firmwareddc4400e_firmwareddc4200_firmwareddc4400_firmwareddc4040e_firmwareddc4002_firmwareddc4020e_firmwareddc4200-l_firmware
CWE ID-CWE-1391
Use of Weak Credentials
Details not found