An authentication bypass was found in an unknown area of the SiteOmat source code. All SiteOmat BOS versions are affected, prior to the submission of this exploit. Also, the SiteOmat does not force administrators to switch passwords, leaving SSH and HTTP remote authentication open to public.
The product contains hard-coded credentials, such as a password or cryptographic key.
Link | Tags |
---|---|
http://www.orpak.com/allproducts/siteomat-station-controller-sw/ | product vendor advisory |
https://ics-cert.us-cert.gov/advisories/ICSA-19-122-01 | third party advisory us government resource |
http://www.securityfocus.com/bid/108167 | vdb entry third party advisory |