CVE-2011-4859

critical

Description

The Schneider Electric Quantum Ethernet Module, as used in the Quantum 140NOE771* and 140CPU65* modules, the Premium TSXETY* and TSXP57* modules, the M340 BMXNOE01* and BMXP3420* modules, and the STB DIO STBNIC2212 and STBNIP2* modules, uses hardcoded passwords for the (1) AUTCSE, (2) AUT_CSE, (3) fdrusers, (4) ftpuser, (5) loader, (6) nic2212, (7) nimrohs2212, (8) nip2212, (9) noe77111_v500, (10) ntpupdate, (11) pcfactory, (12) sysdiag, (13) target, (14) test, (15) USER, and (16) webserver accounts, which makes it easier for remote attackers to obtain access via the (a) TELNET, (b) Windriver Debug, or (c) FTP port.

References

https://exchange.xforce.ibmcloud.com/vulnerabilities/72587

http://www.us-cert.gov/control_systems/pdf/ICSA-12-018-01.pdf

http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-12-020-03.pdf

http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-346-01.pdf

http://www.securityfocus.com/bid/51605

http://secunia.com/advisories/47723

http://reversemode.com/index.php?option=com_content&task=view&id=80&Itemid=1

Details

Source: Mitre, NVD

Published: 2011-12-17

Updated: 2017-08-29

Risk Information

CVSS v2

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Severity: Critical

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical