An authentication bypass was found in an unknown area of the SiteOmat source code. All SiteOmat BOS versions are affected, prior to the submission of this exploit. Also, the SiteOmat does not force administrators to switch passwords, leaving SSH and HTTP remote authentication open to public.
References
Link | Resource |
---|---|
https://ics-cert.us-cert.gov/advisories/ICSA-19-122-01 | US Government Resource Third Party Advisory |
http://www.securityfocus.com/bid/108167 | Third Party Advisory VDB Entry |
http://www.orpak.com/allproducts/siteomat-station-controller-sw/ | Product Vendor Advisory |
Configurations
Information
Published : 2019-06-03 12:29
Updated : 2019-06-04 12:46
NVD link : CVE-2017-14728
Mitre link : CVE-2017-14728
JSON object : View
CWE
CWE-798
Use of Hard-coded Credentials
Products Affected
orpak
- siteomat