Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-55021: n/a

0
High
VulnerabilityCVE-2024-55021cvecve-2024-55021
Published: Tue Mar 03 2026 (03/03/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-55021 is a vulnerability found in Weintek cMT-3072XH2 easyweb v2. 1. 53, OS v20231011, involving a hardcoded password in the FTP protocol. This flaw allows unauthorized access to the device's FTP service without requiring user authentication or interaction. The presence of a hardcoded password significantly undermines the confidentiality and integrity of the system by enabling attackers to potentially access, modify, or exfiltrate sensitive data. Although no known exploits are currently reported in the wild, the vulnerability poses a high risk due to the ease of exploitation and the critical role of these devices in industrial control environments. Organizations using affected Weintek devices should prioritize mitigation to prevent unauthorized access and potential operational disruptions. Countries with significant industrial automation deployments and usage of Weintek products are at higher risk. Immediate remediation steps include disabling FTP if not needed, restricting network access, and monitoring for suspicious activity. A patch or firmware update from the vendor should be applied once available.

AI-Powered Analysis

AILast updated: 03/03/2026, 19:03:44 UTC

Technical Analysis

The vulnerability identified as CVE-2024-55021 affects the Weintek cMT-3072XH2 easyweb device running version 2.1.53 with OS version 20231011. The core issue is the presence of a hardcoded password within the FTP protocol implementation of the device. Hardcoded passwords are embedded credentials that cannot be changed by the user, creating a backdoor that attackers can exploit to gain unauthorized access. FTP, being an older protocol, often lacks encryption, which further exacerbates the risk by potentially exposing credentials and data in transit. This vulnerability allows an attacker to connect to the FTP service on the device using the hardcoded password, bypassing normal authentication mechanisms. The affected device is commonly used in industrial automation and control systems, where unauthorized access can lead to data theft, manipulation of control commands, or disruption of operations. The vulnerability does not require user interaction and can be exploited remotely if the FTP service is exposed to untrusted networks. No CVSS score has been assigned yet, and no public exploits have been reported, but the risk remains significant due to the nature of the flaw and the criticality of the affected systems. The lack of patch information suggests that users should apply compensating controls until an official fix is released.

Potential Impact

The impact of this vulnerability is substantial for organizations using Weintek cMT-3072XH2 devices, especially in industrial and manufacturing sectors. Unauthorized FTP access can lead to exposure of sensitive operational data, unauthorized modification of device configurations or control commands, and potential disruption of industrial processes. This can result in operational downtime, safety hazards, financial losses, and damage to organizational reputation. The vulnerability compromises confidentiality by exposing data, integrity by allowing unauthorized changes, and potentially availability if attackers disrupt device functionality. Given the critical role of these devices in industrial environments, exploitation could have cascading effects on supply chains and critical infrastructure. The ease of exploitation and lack of required user interaction increase the likelihood of successful attacks if devices are accessible over insecure networks.

Mitigation Recommendations

Organizations should immediately assess their exposure to this vulnerability by identifying all Weintek cMT-3072XH2 devices running the affected firmware. If FTP service is not essential, it should be disabled to eliminate the attack vector. Network segmentation and firewall rules should be implemented to restrict access to the FTP service only to trusted management networks. Monitoring and logging of FTP access attempts should be enhanced to detect suspicious activity. Until an official patch or firmware update is released by Weintek, consider deploying compensating controls such as VPNs or secure tunnels to protect device communications. Regularly check vendor advisories for updates and apply patches promptly once available. Additionally, consider replacing devices that cannot be secured or updated in a timely manner. Educate operational technology (OT) personnel about the risks of hardcoded credentials and the importance of secure device configuration.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2024-12-06T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69a72cf6d1a09e29cb6e2699

Added to database: 3/3/2026, 6:48:22 PM

Last enriched: 3/3/2026, 7:03:44 PM

Last updated: 3/4/2026, 1:47:36 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses