CVE-2024-57811: n/a
In Eaton X303 3.5.16 - X303 3.5.17 Build 712, an attacker with network access to a XC-303 PLC can login as root over SSH. The root password is hardcoded in the firmware. NOTE: This vulnerability appears in versions that are no longer supported by Eaton.
AI Analysis
Technical Summary
CVE-2024-57811 is a critical security vulnerability identified in Eaton XC-303 Programmable Logic Controllers (PLCs) running firmware versions 3.5.16 through 3.5.17 Build 712. The vulnerability stems from a hardcoded root password embedded within the device firmware, which allows an attacker with network access to the PLC to authenticate as the root user over SSH without any prior credentials or user interaction. This flaw is classified under CWE-798 (Use of Hard-coded Credentials), a well-known security weakness that severely undermines device security. The vulnerability has a CVSS v3.1 base score of 9.1, indicating a critical severity level due to its network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), but high integrity (I:H) and availability (A:H) impacts. Exploiting this vulnerability enables an attacker to gain full administrative control over the PLC, potentially allowing them to manipulate industrial processes, disrupt operations, or cause physical damage. Eaton no longer supports the affected firmware versions, and no patches or mitigations have been released, increasing the risk for organizations still operating these devices. The vulnerability is particularly concerning for industrial control systems (ICS) environments where PLCs are critical components of operational technology (OT) networks.
Potential Impact
The impact of CVE-2024-57811 is severe for organizations relying on Eaton XC-303 PLCs in their industrial control environments. An attacker exploiting this vulnerability can gain root-level access remotely without authentication, enabling full control over the PLC. This can lead to unauthorized manipulation of industrial processes, causing operational disruptions, safety hazards, and potential physical damage to equipment or infrastructure. The integrity and availability of the affected systems are at high risk, while confidentiality impact is minimal since the vulnerability does not directly expose sensitive data. Given the critical role PLCs play in sectors such as manufacturing, energy, water treatment, and transportation, exploitation could result in significant economic losses, safety incidents, and reputational damage. The lack of vendor support and patches for the affected firmware versions exacerbates the risk, as organizations cannot remediate through standard updates and must rely on compensating controls or device replacement. Additionally, the vulnerability could be leveraged as a foothold for lateral movement within OT networks, increasing the overall threat landscape.
Mitigation Recommendations
Since no patches or firmware updates are available for the affected Eaton XC-303 PLC versions, organizations must implement compensating controls to mitigate risk. First, immediately identify and inventory all affected PLCs within the network. Restrict network access to these devices by implementing strict network segmentation and firewall rules, allowing SSH access only from trusted management stations or isolated networks. Disable or block SSH access if it is not essential for operations. Employ network intrusion detection systems (NIDS) to monitor for suspicious SSH login attempts or unusual traffic patterns targeting PLCs. Consider deploying jump servers or bastion hosts with multi-factor authentication to control administrative access. If feasible, replace affected PLCs with updated or alternative devices that do not contain hardcoded credentials. Conduct regular security assessments and penetration tests focused on OT environments to detect potential exploitation attempts. Finally, develop and rehearse incident response plans specific to OT systems to quickly contain and remediate any compromise involving these PLCs.
Affected Countries
United States, Germany, China, South Korea, Japan, United Kingdom, France, Canada, Australia, India
CVE-2024-57811: n/a
Description
In Eaton X303 3.5.16 - X303 3.5.17 Build 712, an attacker with network access to a XC-303 PLC can login as root over SSH. The root password is hardcoded in the firmware. NOTE: This vulnerability appears in versions that are no longer supported by Eaton.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-57811 is a critical security vulnerability identified in Eaton XC-303 Programmable Logic Controllers (PLCs) running firmware versions 3.5.16 through 3.5.17 Build 712. The vulnerability stems from a hardcoded root password embedded within the device firmware, which allows an attacker with network access to the PLC to authenticate as the root user over SSH without any prior credentials or user interaction. This flaw is classified under CWE-798 (Use of Hard-coded Credentials), a well-known security weakness that severely undermines device security. The vulnerability has a CVSS v3.1 base score of 9.1, indicating a critical severity level due to its network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), but high integrity (I:H) and availability (A:H) impacts. Exploiting this vulnerability enables an attacker to gain full administrative control over the PLC, potentially allowing them to manipulate industrial processes, disrupt operations, or cause physical damage. Eaton no longer supports the affected firmware versions, and no patches or mitigations have been released, increasing the risk for organizations still operating these devices. The vulnerability is particularly concerning for industrial control systems (ICS) environments where PLCs are critical components of operational technology (OT) networks.
Potential Impact
The impact of CVE-2024-57811 is severe for organizations relying on Eaton XC-303 PLCs in their industrial control environments. An attacker exploiting this vulnerability can gain root-level access remotely without authentication, enabling full control over the PLC. This can lead to unauthorized manipulation of industrial processes, causing operational disruptions, safety hazards, and potential physical damage to equipment or infrastructure. The integrity and availability of the affected systems are at high risk, while confidentiality impact is minimal since the vulnerability does not directly expose sensitive data. Given the critical role PLCs play in sectors such as manufacturing, energy, water treatment, and transportation, exploitation could result in significant economic losses, safety incidents, and reputational damage. The lack of vendor support and patches for the affected firmware versions exacerbates the risk, as organizations cannot remediate through standard updates and must rely on compensating controls or device replacement. Additionally, the vulnerability could be leveraged as a foothold for lateral movement within OT networks, increasing the overall threat landscape.
Mitigation Recommendations
Since no patches or firmware updates are available for the affected Eaton XC-303 PLC versions, organizations must implement compensating controls to mitigate risk. First, immediately identify and inventory all affected PLCs within the network. Restrict network access to these devices by implementing strict network segmentation and firewall rules, allowing SSH access only from trusted management stations or isolated networks. Disable or block SSH access if it is not essential for operations. Employ network intrusion detection systems (NIDS) to monitor for suspicious SSH login attempts or unusual traffic patterns targeting PLCs. Consider deploying jump servers or bastion hosts with multi-factor authentication to control administrative access. If feasible, replace affected PLCs with updated or alternative devices that do not contain hardcoded credentials. Conduct regular security assessments and penetration tests focused on OT environments to detect potential exploitation attempts. Finally, develop and rehearse incident response plans specific to OT systems to quickly contain and remediate any compromise involving these PLCs.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-01-09T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6bdbb7ef31ef0b55b7bb
Added to database: 2/25/2026, 9:38:35 PM
Last enriched: 2/26/2026, 2:22:14 AM
Last updated: 4/12/2026, 6:18:10 PM
Views: 11
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.