Description


Axeda agent (All versions) and Axeda Desktop Server for Windows (All versions) uses hard-coded credentials for its UltraVNC installation. Successful exploitation of this vulnerability could allow a remote authenticated attacker to take full remote control of the host operating system.

References


https://www.cisa.gov/uscert/ics/advisories/icsa-22-067-01

MitigationThird Party AdvisoryUS Government Resource


https://www.cisa.gov/uscert/ics/advisories/icsa-22-067-01

MitigationThird Party AdvisoryUS Government Resource

Weaknesses



CWE-798


CWE-798

CVSS impact metrics


CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.8 · Critical

Information


Source identifier

[email protected]

Vulnerability status

Modified

Published

2022-03-16T14:15:16.343Z

4 years ago

Last modified

2024-11-21T05:51:52.383Z

1 year ago