CVE-2022-4333

high-risk
Published 2023-06-01

Hardcoded Credentials in multiple SPRECON-E CPU variants of Sprecher Automation allows an remote attacker to take over the device. These accounts should be deactivated according to Sprecher's hardening guidelines.

Do I need to act?

-
0.86% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10 Critical
NETWORK / LOW complexity

Affected Products (9)

Sprecon-E-P Dq6-1 Firmware
Sprecon-E-P Dl6-1 Firmware
Sprecon-E-P Ds6-0 Firmware
Sprecon-E-C Firmware
Sprecon-E-T3 Firmware
Sprecon-E-Tc Ax-3110 Firmware
Sprecon-E Ap-2200 Firmware
Sprecon-E Cp-2131 Firmware
Sprecon-E Cp-2330 Firmware

Affected Vendors

50
/ 100
high-risk
Severity 32/34 · Critical
Exploitability 3/34 · Minimal
Exposure 15/34 · Moderate