Advisory

Unitronics Vision Series VisiLogic Software vulnerable due to default password

Take action: If you are using Unitronics Vision Series, THIS IS URGENT. Reset the default password IMMEDIATELY and lock down the systems from internet access. Then patch the systems. For everyone else, this is another lesson learned of NOT implementing a hardcoded default password. Because nobody changes the default password.


Learn More

Unitronics Vision Series VisiLogic Software is vulnerable to remote attacks, low complexity for exploitation.

The vuilerability is tracked as CVE-2023-6448 (CVSS v3 score of 9.8) with trivial public exploits, and instances of public exploitation noted. If exploited, attackers could gain administrative control over the affected devices.

The issue stems from the fact that VisiLogic Software, part of the Vision Series PLCs and HMIs has default administrative password. Attackers with network access to the Vision Series equipment can seize administrative control.

 Vulnerable versions are VisiLogic Software, versions earlier than 9.9.00

The systems are commonly used in citical infrastructure, particularly Water and Wastewater, and the issue has been detected through active exploitation reports.

Users are advised to upgrade to the latest software version and to change default passwords, especially the commonly used "1111". As usual, they should also isolate the software and PLCs from direct internet access.

Unitronics Vision Series VisiLogic Software vulnerable due to default password