CVE-2008-5848
Severity CVSS v4.0:
Pending analysis
Type:
CWE-255
Credentials Management
Publication date:
06/01/2009
Last modified:
09/04/2025
Description
The Advantech ADAM-6000 module has 00000000 as its default password, which makes it easier for remote attackers to obtain access through an HTTP session, and (1) monitor or (2) control the module's Modbus/TCP I/O activity.
Impact
Base Score 2.0
10.00
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:h:advantech:adam-6015:*:*:*:*:*:*:*:* | ||
cpe:2.3:h:advantech:adam-6017:*:*:*:*:*:*:*:* | ||
cpe:2.3:h:advantech:adam-6018:*:*:*:*:*:*:*:* | ||
cpe:2.3:h:advantech:adam-6022:*:*:*:*:*:*:*:* | ||
cpe:2.3:h:advantech:adam-6024:*:*:*:*:*:*:*:* | ||
cpe:2.3:h:advantech:adam-6050:*:*:*:*:*:*:*:* | ||
cpe:2.3:h:advantech:adam-6050w:*:*:*:*:*:*:*:* | ||
cpe:2.3:h:advantech:adam-6051:*:*:*:*:*:*:*:* | ||
cpe:2.3:h:advantech:adam-6051w:*:*:*:*:*:*:*:* | ||
cpe:2.3:h:advantech:adam-6052:*:*:*:*:*:*:*:* | ||
cpe:2.3:h:advantech:adam-6060:*:*:*:*:*:*:*:* | ||
cpe:2.3:h:advantech:adam-6060w:*:*:*:*:*:*:*:* | ||
cpe:2.3:h:advantech:adam-6066:*:*:*:*:*:*:*:* | ||
cpe:2.3:h:advantech:adam-6501:*:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://ruxcon.org.au/files/2008/SIFT-Ruxcon2008-SCADA-Hacking-Modbus-Enabled-Devices.pdf
- http://support.advantech.com.tw/support/DownloadSRDetail.aspx?SR_ID=1-95WMW
- http://www.ruxcon.org.au/presentations.shtml#13
- http://ruxcon.org.au/files/2008/SIFT-Ruxcon2008-SCADA-Hacking-Modbus-Enabled-Devices.pdf
- http://support.advantech.com.tw/support/DownloadSRDetail.aspx?SR_ID=1-95WMW
- http://www.ruxcon.org.au/presentations.shtml#13