#VU13105 Use of hard-coded credentials in myPRO - CVE-2018-11311
Published: May 31, 2018 / Updated: June 17, 2021
Vulnerability identifier: #VU13105
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/U:Clear
CVE-ID: CVE-2018-11311
CWE-ID: CWE-798
Exploitation vector: Remote access
Exploit availability:
Public exploit is available
Vulnerable software:
myPRO
myPRO
Software vendor:
mySCADA
mySCADA
Description
The vulnerability allows a remote attacker to bypass security restrictions on the target system.
The weakness exists due to use of a hardcoded FTP username of myscada and password of Vikuk63 in 'myscadagate.exe'. A remote attacker can use these credentials, connect to an FTP server on port 2121 with an authorized account, bypass security restrictions and upload or download files onto the server running myPRO software.
The weakness exists due to use of a hardcoded FTP username of myscada and password of Vikuk63 in 'myscadagate.exe'. A remote attacker can use these credentials, connect to an FTP server on port 2121 with an authorized account, bypass security restrictions and upload or download files onto the server running myPRO software.
Remediation
Cybersecurity Help is currently unaware of any solutions addressing the vulnerability.