In Eaton X303 3.5.16 - X303 3.5.17 Build 712, an attacker with network access to a XC-303 PLC can login as root over SSH. The root password is hardcoded in the firmware. NOTE: This vulnerability appears in versions that are no longer supported by Eaton.
References
Configurations
No configuration.
History
16 Jan 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-798 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.1 |
Summary |
|
|
References | () https://github.com/google/security-research/security/advisories/GHSA-xf7j-4x67-6h93 - |
13 Jan 2025, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-01-13 22:15
Updated : 2025-01-16 18:15
NVD link : CVE-2024-57811
Mitre link : CVE-2024-57811
CVE.ORG link : CVE-2024-57811
JSON object : View
Products Affected
No product.
CWE
CWE-798
Use of Hard-coded Credentials