First published: Thu Dec 05 2024(Updated: )
Default Credentail vulnerabilities allows access to an Aspect device using publicly available default credentials since the system does not require the installer to change default credentials. Affected products: ABB ASPECT - Enterprise v3.07.02; NEXUS Series v3.07.02; MATRIX Series v3.07.02
Credit: cybersecurity@ch.abb.com
Affected Software | Affected Version | How to fix |
---|---|---|
ABB ASPECT-Enterprise | ||
Cisco Nexus | ||
MATRIX MATRIX Series |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-51555 has been classified with a high severity due to the risk of unauthorized access through default credentials.
To fix CVE-2024-51555, change the default credentials of the affected Aspect devices immediately to secure passwords.
CVE-2024-51555 affects ABB ASPECT - Enterprise v3.07.02, NEXUS Series v3.07.02, and MATRIX Series devices.
Yes, CVE-2024-51555 can be exploited remotely since the default credentials allow access without local interaction.
While public exploit details are not available, the vulnerability is significant enough that it is crucial to secure affected devices promptly.