Emerson DeltaV 10.3.1, 11.3, 11.3.1, and 12.3 uses hardcoded credentials for diagnostic services, which allows remote attackers to bypass intended access restrictions via a TCP session, as demonstrated by a session that uses the telnet program.
References
Link | Resource |
---|---|
https://www.cisa.gov/news-events/ics-advisories/icsa-14-133-02 | |
http://ics-cert.us-cert.gov/advisories/ICSA-14-133-02 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
|
History
03 Oct 2025, 16:16
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 2.4
v3 : unknown |
Summary | (en) Emerson DeltaV 10.3.1, 11.3, 11.3.1, and 12.3 uses hardcoded credentials for diagnostic services, which allows remote attackers to bypass intended access restrictions via a TCP session, as demonstrated by a session that uses the telnet program. | |
References |
|
|
CWE | CWE-798 |
21 Nov 2024, 02:06
Type | Values Removed | Values Added |
---|---|---|
References | () http://ics-cert.us-cert.gov/advisories/ICSA-14-133-02 - Third Party Advisory, US Government Resource |
Information
Published : 2014-05-22 20:55
Updated : 2025-10-03 16:16
NVD link : CVE-2014-2349
Mitre link : CVE-2014-2349
CVE.ORG link : CVE-2014-2349
JSON object : View
Products Affected
emerson
- deltav