Description
An unauthenticated remote attacker can use the hard-coded credentials to access the SmartSPS devices with high privileges.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-25835 | An unauthenticated remote attacker can use the hard-coded credentials to access the SmartSPS devices with high privileges. |
References
| Link | Providers |
|---|---|
| https://cert.vde.com/en/advisories/VDE-2024-012 |
|
History
No history.
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2024-08-02T00:56:58.150Z
Reserved: 2024-03-08T08:39:32.659Z
Link: CVE-2024-28747
Updated: 2024-07-09T16:33:33.499Z
Status : Deferred
Published: 2024-07-09T07:15:03.563
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-28747
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD