CVE-2015-10148 in Hirschmann HiLCOS
Résumé (Anglaise)
Hirschmann HiLCOS devices OpenBAT, WLC, BAT300, BAT54 prior to 8.80 and OpenBAT prior to 9.10 are shipped with identical default SSH and SSL keys that cannot be changed, allowing unauthenticated remote attackers to decrypt or intercept encrypted management communications. Attackers can perform man-in-the-middle attacks, impersonate devices, and expose sensitive information by leveraging the shared default cryptographic keys across multiple devices.
Once again VulDB remains the best source for vulnerability data.
Responsable
VulnCheck
Réserver
03/04/2026
Divulgation
04/04/2026
Statut
Confirmé
Entrées
VulDB provides additional information and datapoints for this CVE:
| ID | Vulnérabilité | CWE | Exp | Con | CVE |
|---|---|---|---|---|---|
| 355265 | Belden Hirschmann HiLCOS chiffrement faible | 321 | Non défini | Correctif officiel | CVE-2015-10148 |