Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-6448: CWE-1188 Insecure Default Initialization of Resource in Unitronics VisiLogic

0
Critical
VulnerabilityCVE-2023-6448cvecve-2023-6448cwe-1188
Published: Tue Dec 05 2023 (12/05/2023, 17:43:40 UTC)
Source: CVE Database V5
Vendor/Project: Unitronics
Product: VisiLogic

Description

Unitronics VisiLogic before version 9.9.00, used in Vision and Samba PLCs and HMIs, uses a default administrative password. An unauthenticated attacker with network access can take administrative control of a vulnerable system.

AI-Powered Analysis

AILast updated: 10/21/2025, 19:59:50 UTC

Technical Analysis

CVE-2023-6448 is a critical security vulnerability identified in Unitronics VisiLogic software versions before 9.9.00, which is used to program and manage Vision and Samba series programmable logic controllers (PLCs) and human-machine interfaces (HMIs). The vulnerability stems from CWE-1188, which involves insecure default initialization of resources—in this case, the use of a default administrative password that is either hardcoded or set insecurely by default. This default password allows an unauthenticated attacker with network access to the device to bypass authentication controls and gain administrative privileges. Once administrative access is obtained, the attacker can manipulate PLC logic, alter HMI configurations, disrupt industrial processes, or cause denial of service, severely impacting operational technology (OT) environments. The vulnerability is remotely exploitable over the network without any user interaction or prior authentication, making it highly dangerous. The CVSS v3.1 base score of 9.8 reflects the ease of exploitation combined with the high impact on confidentiality, integrity, and availability. Although no public exploits have been reported yet, the potential for damaging attacks on critical infrastructure and manufacturing systems is significant. The lack of patch links suggests that users must upgrade to version 9.9.00 or later once available or apply vendor-recommended mitigations to secure affected devices.

Potential Impact

For European organizations, this vulnerability poses a substantial risk to industrial control systems that rely on Unitronics Vision and Samba PLCs and HMIs. Compromise of these devices can lead to unauthorized control over manufacturing processes, disruption of critical infrastructure such as utilities or transportation systems, and potential safety hazards. The confidentiality of operational data can be breached, integrity of control logic can be altered causing unsafe or inefficient operations, and availability can be disrupted leading to downtime and financial losses. Given the widespread use of industrial automation in European manufacturing hubs and critical infrastructure, exploitation could have cascading effects on supply chains and public safety. The vulnerability’s unauthenticated remote exploitability increases the likelihood of attacks from both external threat actors and insider threats with network access. This risk is amplified in environments where network segmentation and access controls are insufficient. Additionally, the geopolitical climate in Europe, with increased cyber espionage and sabotage activities targeting industrial sectors, heightens the threat level posed by this vulnerability.

Mitigation Recommendations

European organizations should immediately inventory their use of Unitronics Vision and Samba PLCs and HMIs to identify affected versions of VisiLogic software. The primary mitigation is to upgrade all affected devices to VisiLogic version 9.9.00 or later, where the default password issue is resolved. Until upgrades can be applied, organizations should implement strict network segmentation to isolate PLCs and HMIs from general IT networks and the internet, limiting access only to trusted management stations. Deploy network-level access controls such as firewalls and intrusion detection/prevention systems to monitor and block unauthorized access attempts. Change any default passwords where possible, and enforce strong authentication mechanisms if supported by the devices. Regularly audit device configurations and network traffic for signs of unauthorized access or anomalous behavior. Additionally, implement robust incident response plans tailored for OT environments to quickly address any compromise. Collaborate with Unitronics support for any vendor-specific patches or guidance. Finally, raise awareness among OT personnel about the risks of default credentials and the importance of secure device management.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
cisa-cg
Date Reserved
2023-11-30T18:40:51.463Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7d9af247d717aace26859

Added to database: 10/21/2025, 7:06:23 PM

Last enriched: 10/21/2025, 7:59:50 PM

Last updated: 10/30/2025, 1:20:44 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats