E3 Site Supervisor Control (firmware version < 2.31F01) generates the root linux password on each boot. An attacker can generate the root linux password for a vulnerable device based on known or easy to fetch parameters.
Description: CAPEC-653 Use of Known Operating System Credentials
Solutions
Upgrade firmware of affected E3 Supervisory Controls to a version > 2.30F1.
Configurations
Workarounds
Restrict access to the E3 Supervisory Controls network interface (ETH 0) by use of restricted VLAN or subnet and / or network firewall. Ensure the restricted VLAN or subnet is never accessible from untrusted networks.