ID CVE-2009-4463
Summary Intellicom NetBiter WebSCADA devices use default passwords for the HICP network configuration service, which makes it easier for remote attackers to modify network settings and cause a denial of service. NOTE: this is only a vulnerability when the administrator does not follow recommendations in the product's installation documentation. NOTE: this issue was originally reported to be hard-coded passwords, not default passwords.
References
Vulnerable Configurations
  • cpe:2.3:h:intellicom:netbiter_webscada_firmware:3.11.0:*:*:*:*:*:*:*
    cpe:2.3:h:intellicom:netbiter_webscada_firmware:3.11.0:*:*:*:*:*:*:*
  • cpe:2.3:h:intellicom:netbiter_webscada_firmware:3.11.1:*:*:*:*:*:*:*
    cpe:2.3:h:intellicom:netbiter_webscada_firmware:3.11.1:*:*:*:*:*:*:*
  • cpe:2.3:h:intellicom:netbiter_webscada_firmware:3.11.2:*:*:*:*:*:*:*
    cpe:2.3:h:intellicom:netbiter_webscada_firmware:3.11.2:*:*:*:*:*:*:*
  • cpe:2.3:h:intellicom:netbiter_webscada_firmware:3.12.4:*:*:*:*:*:*:*
    cpe:2.3:h:intellicom:netbiter_webscada_firmware:3.12.4:*:*:*:*:*:*:*
  • cpe:2.3:h:intellicom:netbiter_webscada_firmware:3.12.6:*:*:*:*:*:*:*
    cpe:2.3:h:intellicom:netbiter_webscada_firmware:3.12.6:*:*:*:*:*:*:*
  • cpe:2.3:h:intellicom:netbiter_webscada_firmware:3.13.0:beta:*:*:*:*:*:*
    cpe:2.3:h:intellicom:netbiter_webscada_firmware:3.13.0:beta:*:*:*:*:*:*
  • cpe:2.3:h:intellicom:netbiter_webscada_firmware:3.13.1:*:*:*:*:*:*:*
    cpe:2.3:h:intellicom:netbiter_webscada_firmware:3.13.1:*:*:*:*:*:*:*
  • cpe:2.3:h:intellicom:netbiter_webscada_firmware:3.13.2:*:*:*:*:*:*:*
    cpe:2.3:h:intellicom:netbiter_webscada_firmware:3.13.2:*:*:*:*:*:*:*
  • cpe:2.3:h:intellicom:netbiter_webscada_firmware:3.20.0:*:*:*:*:*:*:*
    cpe:2.3:h:intellicom:netbiter_webscada_firmware:3.20.0:*:*:*:*:*:*:*
  • cpe:2.3:h:intellicom:netbiter_webscada_firmware:3.30.0:*:*:*:*:*:*:*
    cpe:2.3:h:intellicom:netbiter_webscada_firmware:3.30.0:*:*:*:*:*:*:*
  • cpe:2.3:h:intellicom:netbiter_webscada_firmware:3.30.1:*:*:*:*:*:*:*
    cpe:2.3:h:intellicom:netbiter_webscada_firmware:3.30.1:*:*:*:*:*:*:*
  • cpe:2.3:h:intellicom:netbiter_webscada_firmware:3.30.2:b184:*:*:*:*:*:*
    cpe:2.3:h:intellicom:netbiter_webscada_firmware:3.30.2:b184:*:*:*:*:*:*
  • cpe:2.3:h:intellicom:netbiter_webscada_ws100:*:*:*:*:*:*:*:*
    cpe:2.3:h:intellicom:netbiter_webscada_ws100:*:*:*:*:*:*:*:*
  • cpe:2.3:h:intellicom:netbiter_webscada_ws200:*:*:*:*:*:*:*:*
    cpe:2.3:h:intellicom:netbiter_webscada_ws200:*:*:*:*:*:*:*:*
CVSS
Base: 10.0 (as of 10-10-2018 - 19:49)
Impact:
Exploitability:
CWE CWE-255
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:L/Au:N/C:C/I:C/A:C
refmap via4
bugtraq 20091214 Exposing HMS HICP Protocol + Intellicom NetBiterConfig.exe Remote Buffer Overflow (Not patched)
cert-vn VU#902793
misc
osvdb 61506
Last major update 10-10-2018 - 19:49
Published 30-12-2009 - 20:00
Last modified 10-10-2018 - 19:49
Back to Top