CVE-2008-5848

The Advantech ADAM-6000 module has 00000000 as its default password, which makes it easier for remote attackers to obtain access through an HTTP session, and (1) monitor or (2) control the module's Modbus/TCP I/O activity.
Configurations

Configuration 1 (hide)

OR cpe:2.3:h:advantech:adam-6015:*:*:*:*:*:*:*:*
cpe:2.3:h:advantech:adam-6017:*:*:*:*:*:*:*:*
cpe:2.3:h:advantech:adam-6018:*:*:*:*:*:*:*:*
cpe:2.3:h:advantech:adam-6022:*:*:*:*:*:*:*:*
cpe:2.3:h:advantech:adam-6024:*:*:*:*:*:*:*:*
cpe:2.3:h:advantech:adam-6050:*:*:*:*:*:*:*:*
cpe:2.3:h:advantech:adam-6050w:*:*:*:*:*:*:*:*
cpe:2.3:h:advantech:adam-6051:*:*:*:*:*:*:*:*
cpe:2.3:h:advantech:adam-6051w:*:*:*:*:*:*:*:*
cpe:2.3:h:advantech:adam-6052:*:*:*:*:*:*:*:*
cpe:2.3:h:advantech:adam-6060:*:*:*:*:*:*:*:*
cpe:2.3:h:advantech:adam-6060w:*:*:*:*:*:*:*:*
cpe:2.3:h:advantech:adam-6066:*:*:*:*:*:*:*:*
cpe:2.3:h:advantech:adam-6501:*:*:*:*:*:*:*:*

History

14 Feb 2024, 01:17

Type Values Removed Values Added
References () http://ruxcon.org.au/files/2008/SIFT-Ruxcon2008-SCADA-Hacking-Modbus-Enabled-Devices.pdf - () http://ruxcon.org.au/files/2008/SIFT-Ruxcon2008-SCADA-Hacking-Modbus-Enabled-Devices.pdf - URL Repurposed
References () http://www.ruxcon.org.au/presentations.shtml#13 - () http://www.ruxcon.org.au/presentations.shtml#13 - URL Repurposed

Information

Published : 2009-01-06 17:30

Updated : 2024-02-14 01:17


NVD link : CVE-2008-5848

Mitre link : CVE-2008-5848

CVE.ORG link : CVE-2008-5848


JSON object : View

Products Affected

advantech

  • adam-6022
  • adam-6015
  • adam-6051w
  • adam-6051
  • adam-6066
  • adam-6050w
  • adam-6017
  • adam-6018
  • adam-6060w
  • adam-6501
  • adam-6024
  • adam-6060
  • adam-6050
  • adam-6052
CWE
CWE-255

Credentials Management Errors

NVD-CWE-noinfo