An authentication bypass was found in an unknown area of the SiteOmat source code. All SiteOmat BOS versions are affected, prior to the submission of this exploit. Also, the SiteOmat does not force administrators to switch passwords, leaving SSH and HTTP remote authentication open to public.
                
            References
                    | Link | Resource | 
|---|---|
| http://www.orpak.com/allproducts/siteomat-station-controller-sw/ | Product Vendor Advisory | 
| http://www.securityfocus.com/bid/108167 | Third Party Advisory VDB Entry | 
| https://ics-cert.us-cert.gov/advisories/ICSA-19-122-01 | Third Party Advisory US Government Resource | 
| http://www.orpak.com/allproducts/siteomat-station-controller-sw/ | Product Vendor Advisory | 
| http://www.securityfocus.com/bid/108167 | Third Party Advisory VDB Entry | 
| https://ics-cert.us-cert.gov/advisories/ICSA-19-122-01 | Third Party Advisory US Government Resource | 
Configurations
                    History
                    No history.
Information
                Published : 2019-06-03 19:29
Updated : 2024-11-21 03:13
NVD link : CVE-2017-14728
Mitre link : CVE-2017-14728
CVE.ORG link : CVE-2017-14728
JSON object : View
Products Affected
                orpak
- siteomat
CWE
                
                    
                        
                        CWE-798
                        
            Use of Hard-coded Credentials
