cpe:/h:advantech:adam-6015 cpe:/h:advantech:adam-6017 cpe:/h:advantech:adam-6018 cpe:/h:advantech:adam-6022 cpe:/h:advantech:adam-6024 cpe:/h:advantech:adam-6050 cpe:/h:advantech:adam-6050w cpe:/h:advantech:adam-6051 cpe:/h:advantech:adam-6051w cpe:/h:advantech:adam-6052 cpe:/h:advantech:adam-6060 cpe:/h:advantech:adam-6060w cpe:/h:advantech:adam-6066 cpe:/h:advantech:adam-6501 CVE-2008-5848 2009-01-06T12:30:00.267-05:00 2009-05-20T00:00:00.000-04:00 10.0 NETWORK LOW NONE COMPLETE COMPLETE COMPLETE http://nvd.nist.gov 2009-01-06T13:18:00.000-05:00 ALLOWS_ADMIN_ACCESS MISC http://ruxcon.org.au/files/2008/SIFT-Ruxcon2008-SCADA-Hacking-Modbus-Enabled-Devices.pdf CONFIRM http://support.advantech.com.tw/support/DownloadSRDetail.aspx?SR_ID=1-95WMW MISC http://www.ruxcon.org.au/presentations.shtml#13 The Advantech ADAM-6000 module has 00000000 as its default password, which makes it easier for remote attackers to obtain access through an HTTP session, and (1) monitor or (2) control the module's Modbus/TCP I/O activity.