CVE-2016-9358

Description

A Hard-Coded Passwords issue was discovered in Marel Food Processing Systems M3000 terminal associated with the following systems: A320, A325, A371, A520 Master, A520 Slave, A530, A542, A571, Check Bin Grader, FlowlineQC T376, IPM3 Dual Cam v132, IPM3 Dual Cam v139, IPM3 Single Cam v132, P520, P574, SensorX13 QC flow line, SensorX23 QC Master, SensorX23 QC Slave, Speed Batcher, T374, T377, V36, V36B, and V36C; M3210 terminal associated with the same systems as the M3000 terminal identified above; M3000 desktop software associated with the same systems as the M3000 terminal identified above; MAC4 controller associated with the same systems as the M3000 terminal identified above; SensorX23 X-ray machine; SensorX25 X-ray machine; and MWS2 weighing system. The end user does not have the ability to change system passwords.

Categories

9.8
CVSS
Severity: Critical
CVSS 3.0 •
CVSS 2.0 •
EPSS 0.55%
Third-Party Advisory securityfocus.com Third-Party Advisory us-cert.gov
Affected: n/a Marel Food Processing Systems
Published at:
Updated at:

References

Link Tags
http://www.securityfocus.com/bid/97388 third party advisory vdb entry
https://ics-cert.us-cert.gov/advisories/ICSA-17-094-02 mitigation third party advisory us government resource

Frequently Asked Questions

What is the severity of CVE-2016-9358?
CVE-2016-9358 has been scored as a critical severity vulnerability.
How to fix CVE-2016-9358?
To fix CVE-2016-9358, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2016-9358 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2016-9358 is being actively exploited. According to its EPSS score, there is a ~1% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2016-9358?
CVE-2016-9358 affects n/a Marel Food Processing Systems.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.