Vulnerability CVE-2009-4463


Published: 2009-12-30   Modified: 2012-02-13

Description:
Intellicom NetBiter WebSCADA devices use default passwords for the HICP network configuration service, which makes it easier for remote attackers to modify network settings and cause a denial of service. NOTE: this is only a vulnerability when the administrator does not follow recommendations in the product's installation documentation. NOTE: this issue was originally reported to be hard-coded passwords, not default passwords.

See advisories in our WLB2 database:
Topic
Author
Date
High
Exposing HMS HICP Protocol + Intellicom Remote Buffer Overflow
Reversemode
31.12.2009

Type:

CWE-255

(Credentials Management)

CVSS2 => (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
10/10
10/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Intellicom -> Netbiter webscada firmware 
Intellicom -> Netbiter webscada ws100 
Intellicom -> Netbiter webscada ws200 

 References:
http://blog.48bits.com/?p=781
http://reversemode.com/index.php?option=com_content&task=view&id=65&Itemid=1
http://support.intellicom.se/getfile.cfm?FID=151
http://www.kb.cert.org/vuls/id/902793
http://www.securityfocus.com/archive/1/508449/100/0/threaded

Copyright 2024, cxsecurity.com

 

Back to Top