Description
Axeda agent (All versions) and Axeda Desktop Server for Windows (All versions) uses hard-coded credentials for its UltraVNC installation. Successful exploitation of this vulnerability could allow a remote authenticated attacker to take full remote control of the host operating system.
References
https://www.cisa.gov/uscert/ics/advisories/icsa-22-067-01
MitigationThird Party AdvisoryUS Government Resource
https://www.ptc.com/en/support/article/CS363561
Vendor Advisory
https://www.cisa.gov/uscert/ics/advisories/icsa-22-067-01
MitigationThird Party AdvisoryUS Government Resource
https://www.ptc.com/en/support/article/CS363561
Vendor Advisory
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 · Critical
Information
Source identifier
Vulnerability status
Modified
Published
2022-03-16T14:15:16.343Z
4 years agoLast modified
2024-11-21T05:51:52.383Z
1 year ago