First published: Tue Jan 06 2009(Updated: )
The Advantech ADAM-6000 module has 00000000 as its default password, which makes it easier for remote attackers to obtain access through an HTTP session, and (1) monitor or (2) control the module's Modbus/TCP I/O activity.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Advantech Adam-6015 | ||
Advantech Adam-6022 | ||
Advantech Adam-6050w | ||
Advantech Adam-6060 | ||
Advantech Adam-6050 | ||
Advantech Adam-6051 | ||
Advantech Adam-6024 | ||
Advantech Adam-6060w | ||
Advantech Adam-6018 | ||
Advantech Adam-6501 | ||
Advantech Adam-6017 | ||
Advantech Adam-6051w | ||
Advantech Adam-6066 | ||
Advantech Adam-6052 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-5848 is considered to be of medium severity due to the risks associated with unauthorized access.
To fix CVE-2008-5848, change the default password from '00000000' to a strong, unique password.
CVE-2008-5848 affects several Advantech ADAM-6000 modules, including models like ADAM-6015, ADAM-6022, and ADAM-6050.
CVE-2008-5848 can enable attackers to monitor and control Modbus/TCP I/O activities on the affected devices.
The primary workaround for CVE-2008-5848 is to immediately change the default password to prevent unauthorized access.