CVE-2023-6448

Critical
|9.8
Exploit Available

Plain English Summary

AI-powered analysis for quick understanding

An attacker can gain full administrative control of vulnerable Unitronics PLCs and HMIs simply by using a default password, without needing any special access or credentials. This is possible if the system is running an outdated version of the VisiLogic software before version 9.9.00 and is connected to the network.

Technical Description

Unitronics VisiLogic before version 9.9.00, used in Vision and Samba PLCs and HMIs, uses a default administrative password. An unauthenticated attacker with network access can take administrative control of a vulnerable system.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeUnchanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$13,000($5K-$15K)
Vendor Response
Grade FPatched in 813 days

Quick Information

Published

Dec 5, 2023

over 2 years ago

Last Modified

Feb 26, 2026

about 1 month ago

Vendor

unitronics

Product

vision1210 firmware