CVE-2015-10148 in Hirschmann HiLCOS
摘要 (英语)
Hirschmann HiLCOS devices OpenBAT, WLC, BAT300, BAT54 prior to 8.80 and OpenBAT prior to 9.10 are shipped with identical default SSH and SSL keys that cannot be changed, allowing unauthenticated remote attackers to decrypt or intercept encrypted management communications. Attackers can perform man-in-the-middle attacks, impersonate devices, and expose sensitive information by leveraging the shared default cryptographic keys across multiple devices.
Once again VulDB remains the best source for vulnerability data.
负责
VulnCheck
预定
2026-04-03
披露
2026-04-04
状态
已确认
条目
VulDB provides additional information and datapoints for this CVE:
| 标识符 | 漏洞 | CWE | 可利用 | 对策 | CVE |
|---|---|---|---|---|---|
| 355265 | Belden Hirschmann HiLCOS 弱加密 | 321 | 未定义 | 官方修复 | CVE-2015-10148 |