Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-57811: n/a

0
Critical
VulnerabilityCVE-2024-57811cvecve-2024-57811
Published: Mon Jan 13 2025 (01/13/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-57811 is a critical vulnerability affecting Eaton XC-303 PLC devices running firmware versions 3. 5. 16 to 3. 5. 17 Build 712. The flaw allows an attacker with network access to log in as root over SSH due to a hardcoded root password embedded in the firmware. This vulnerability requires no authentication or user interaction and can lead to full system compromise, impacting the integrity and availability of the PLC. Although the affected versions are no longer supported by Eaton and no patches are available, the risk remains significant for organizations still using these devices. The CVSS score of 9. 1 reflects the ease of exploitation and the high impact.

AI-Powered Analysis

AILast updated: 02/26/2026, 02:22:14 UTC

Technical Analysis

CVE-2024-57811 is a critical security vulnerability identified in Eaton XC-303 Programmable Logic Controllers (PLCs) running firmware versions 3.5.16 through 3.5.17 Build 712. The vulnerability stems from a hardcoded root password embedded within the device firmware, which allows an attacker with network access to the PLC to authenticate as the root user over SSH without any prior credentials or user interaction. This flaw is classified under CWE-798 (Use of Hard-coded Credentials), a well-known security weakness that severely undermines device security. The vulnerability has a CVSS v3.1 base score of 9.1, indicating a critical severity level due to its network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), but high integrity (I:H) and availability (A:H) impacts. Exploiting this vulnerability enables an attacker to gain full administrative control over the PLC, potentially allowing them to manipulate industrial processes, disrupt operations, or cause physical damage. Eaton no longer supports the affected firmware versions, and no patches or mitigations have been released, increasing the risk for organizations still operating these devices. The vulnerability is particularly concerning for industrial control systems (ICS) environments where PLCs are critical components of operational technology (OT) networks.

Potential Impact

The impact of CVE-2024-57811 is severe for organizations relying on Eaton XC-303 PLCs in their industrial control environments. An attacker exploiting this vulnerability can gain root-level access remotely without authentication, enabling full control over the PLC. This can lead to unauthorized manipulation of industrial processes, causing operational disruptions, safety hazards, and potential physical damage to equipment or infrastructure. The integrity and availability of the affected systems are at high risk, while confidentiality impact is minimal since the vulnerability does not directly expose sensitive data. Given the critical role PLCs play in sectors such as manufacturing, energy, water treatment, and transportation, exploitation could result in significant economic losses, safety incidents, and reputational damage. The lack of vendor support and patches for the affected firmware versions exacerbates the risk, as organizations cannot remediate through standard updates and must rely on compensating controls or device replacement. Additionally, the vulnerability could be leveraged as a foothold for lateral movement within OT networks, increasing the overall threat landscape.

Mitigation Recommendations

Since no patches or firmware updates are available for the affected Eaton XC-303 PLC versions, organizations must implement compensating controls to mitigate risk. First, immediately identify and inventory all affected PLCs within the network. Restrict network access to these devices by implementing strict network segmentation and firewall rules, allowing SSH access only from trusted management stations or isolated networks. Disable or block SSH access if it is not essential for operations. Employ network intrusion detection systems (NIDS) to monitor for suspicious SSH login attempts or unusual traffic patterns targeting PLCs. Consider deploying jump servers or bastion hosts with multi-factor authentication to control administrative access. If feasible, replace affected PLCs with updated or alternative devices that do not contain hardcoded credentials. Conduct regular security assessments and penetration tests focused on OT environments to detect potential exploitation attempts. Finally, develop and rehearse incident response plans specific to OT systems to quickly contain and remediate any compromise involving these PLCs.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-01-09T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6bdbb7ef31ef0b55b7bb

Added to database: 2/25/2026, 9:38:35 PM

Last enriched: 2/26/2026, 2:22:14 AM

Last updated: 2/26/2026, 9:40:06 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats