CVE-2024-57811

In Eaton X303 3.5.16 - X303 3.5.17 Build 712, an attacker with network access to a XC-303 PLC can login as root over SSH. The root password is hardcoded in the firmware. NOTE: This vulnerability appears in versions that are no longer supported by Eaton.
Configurations

No configuration.

History

16 Jan 2025, 18:15

Type Values Removed Values Added
CWE CWE-798
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.1
Summary
  • (es) En Eaton X303 3.5.16 - X303 3.5.17 Build 712, un atacante con acceso de red a un PLC XC-303 puede iniciar sesión como root a través de SSH. La contraseña de root está codificada en el firmware. NOTA: Esta vulnerabilidad aparece en versiones que ya no son compatibles con Eaton.
References () https://github.com/google/security-research/security/advisories/GHSA-xf7j-4x67-6h93 - () https://github.com/google/security-research/security/advisories/GHSA-xf7j-4x67-6h93 -

13 Jan 2025, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-01-13 22:15

Updated : 2025-01-16 18:15


NVD link : CVE-2024-57811

Mitre link : CVE-2024-57811

CVE.ORG link : CVE-2024-57811


JSON object : View

Products Affected

No product.

CWE
CWE-798

Use of Hard-coded Credentials