An authentication bypass was found in an unknown area of the SiteOmat source code. All SiteOmat BOS versions are affected, prior to the submission of this exploit. Also, the SiteOmat does not force administrators to switch passwords, leaving SSH and HTTP remote authentication open to public.
References
Link | Resource |
---|---|
http://www.orpak.com/allproducts/siteomat-station-controller-sw/ | Product Vendor Advisory |
http://www.securityfocus.com/bid/108167 | Third Party Advisory VDB Entry |
https://ics-cert.us-cert.gov/advisories/ICSA-19-122-01 | Third Party Advisory US Government Resource |
http://www.orpak.com/allproducts/siteomat-station-controller-sw/ | Product Vendor Advisory |
http://www.securityfocus.com/bid/108167 | Third Party Advisory VDB Entry |
https://ics-cert.us-cert.gov/advisories/ICSA-19-122-01 | Third Party Advisory US Government Resource |
Configurations
History
21 Nov 2024, 03:13
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.orpak.com/allproducts/siteomat-station-controller-sw/ - Product, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/108167 - Third Party Advisory, VDB Entry | |
References | () https://ics-cert.us-cert.gov/advisories/ICSA-19-122-01 - Third Party Advisory, US Government Resource |
Information
Published : 2019-06-03 19:29
Updated : 2024-11-21 03:13
NVD link : CVE-2017-14728
Mitre link : CVE-2017-14728
CVE.ORG link : CVE-2017-14728
JSON object : View
Products Affected
orpak
- siteomat
CWE
CWE-798
Use of Hard-coded Credentials