The Advantech ADAM-6000 module has 00000000 as its default password, which makes it easier for remote attackers to obtain access through an HTTP session, and (1) monitor or (2) control the module's Modbus/TCP I/O activity.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:55
Type | Values Removed | Values Added |
---|---|---|
References | () http://ruxcon.org.au/files/2008/SIFT-Ruxcon2008-SCADA-Hacking-Modbus-Enabled-Devices.pdf - URL Repurposed | |
References | () http://support.advantech.com.tw/support/DownloadSRDetail.aspx?SR_ID=1-95WMW - | |
References | () http://www.ruxcon.org.au/presentations.shtml#13 - URL Repurposed |
14 Feb 2024, 01:17
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) http://ruxcon.org.au/files/2008/SIFT-Ruxcon2008-SCADA-Hacking-Modbus-Enabled-Devices.pdf - URL Repurposed | |
References | (MISC) http://www.ruxcon.org.au/presentations.shtml#13 - URL Repurposed |
Information
Published : 2009-01-06 17:30
Updated : 2024-11-21 00:55
NVD link : CVE-2008-5848
Mitre link : CVE-2008-5848
CVE.ORG link : CVE-2008-5848
JSON object : View
Products Affected
advantech
- adam-6051w
- adam-6066
- adam-6015
- adam-6050
- adam-6051
- adam-6052
- adam-6060w
- adam-6024
- adam-6060
- adam-6018
- adam-6050w
- adam-6501
- adam-6017
- adam-6022
CWE