Hard-coded Password Vulnerability in Unsupported KNX ETS5 Versions

Hard-coded Password Vulnerability in Unsupported KNX ETS5 Versions

CVE-2021-36799 · HIGH Severity

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

KNX ETS5 through 5.7.6 uses the hard-coded password ETS5Password, with a salt value of Ivan Medvedev, allowing local users to read project information. NOTE: This vulnerability only affects products that are no longer supported by the maintainer

Learn more about our User Device Pen Test.