The Schneider Electric Quantum Ethernet Module, as used in the Quantum 140NOE771* and 140CPU65* modules, the Premium TSXETY* and TSXP57* modules, the M340 BMXNOE01* and BMXP3420* modules, and the STB DIO STBNIC2212 and STBNIP2* modules, uses hardcoded passwords for the (1) AUTCSE, (2) AUT_CSE, (3) fdrusers, (4) ftpuser, (5) loader, (6) nic2212, (7) nimrohs2212, (8) nip2212, (9) noe77111_v500, (10) ntpupdate, (11) pcfactory, (12) sysdiag, (13) target, (14) test, (15) USER, and (16) webserver accounts, which makes it easier for remote attackers to obtain access via the (a) TELNET, (b) Windriver Debug, or (c) FTP port.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
No history.
Information
Published : 2011-12-17 11:55
Updated : 2024-02-28 11:41
NVD link : CVE-2011-4859
Mitre link : CVE-2011-4859
CVE.ORG link : CVE-2011-4859
JSON object : View
Products Affected
schneider-electric
- quantum_ethernet_module_140cpu65150
- stb_dio_ethernet_module_stbnip2212
- premium_ethernet_module_tsxp572634m
- premium_ethernet_module_tsxp576634m
- stb_dio_ethernet_module_stbnic2212
- quantum_ethernet_module_140cpu65260
- quantum_ethernet_module_140noe77111
- quantum_ethernet_module_140noe77100
- premium_ethernet_module_tsxp57163m
- premium_ethernet_module_tsxp575634m
- premium_ethernet_module_tsxety4103
- premium_ethernet_module_tsxp574634m
- stb_dio_ethernet_module_stbnip2311
- quantum_ethernet_module_140noe77101
- m340_ethernet_module_bmxp342030
- quantum_ethernet_module_140cpu65160
- premium_ethernet_module_tsxety5103
- premium_ethernet_module_tsxp573634m
- m340_ethernet_module_bmxp342020
- m340_ethernet_module_bmxnoe0100
- m340_ethernet_module_bmxnoe0110
CWE