Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-53f8-p3cp-57m5

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The IRC5 family with UAS service enabled comes by default with credentials that can be found on publicly available manuals. ABB considers this a well documented functionality that helps customer set up however, out of our research, we found multiple production systems running these exact default credentials and consider thereby this an exposure that should be mitigated. Moreover, future deployments should consider that these defaults should be forbidden (user should be forced to change them).

The IRC5 family with UAS service enabled comes by default with credentials that can be found on publicly available manuals. ABB considers this a well documented functionality that helps customer set up however, out of our research, we found multiple production systems running these exact default credentials and consider thereby this an exposure that should be mitigated. Moreover, future deployments should consider that these defaults should be forbidden (user should be forced to change them).

EPSS

Процентиль: 59%
0.00384
Низкий

Связанные уязвимости

CVSS3: 9.8
nvd
больше 5 лет назад

The IRC5 family with UAS service enabled comes by default with credentials that can be found on publicly available manuals. ABB considers this a well documented functionality that helps customer set up however, out of our research, we found multiple production systems running these exact default credentials and consider thereby this an exposure that should be mitigated. Moreover, future deployments should consider that these defaults should be forbidden (user should be forced to change them).

EPSS

Процентиль: 59%
0.00384
Низкий