CVE-2021-36799
HIGHKNX Engineering Tool Software 5 < 5.7.6 - Hard-coded Credentials
Title source: ruleDescription
KNX ETS5 through 5.7.6 uses the hard-coded password ETS5Password, with a salt value of Ivan Medvedev, allowing local users to read project information. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
Exploits (1)
nomisec
WORKING POC
33 stars
by robertguetzkow · poc
https://github.com/robertguetzkow/ets5-password-recovery
References (3)
Core 3
Core References
Third Party Advisory x_refsource_misc
https://github.com/robertguetzkow/ets5-password-recovery
Product, Vendor Advisory x_refsource_misc
https://www.knx.org/knx-en/for-professionals/software/ets-5-professional/
Third Party Advisory, VDB Entry x_refsource_misc
http://packetstormsecurity.com/files/165200/ETS5-Password-Recovery-Tool.html
Scores
CVSS v3
8.8
EPSS
0.0013
EPSS Percentile
31.7%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Details
CWE
CWE-798
Status
published
Products (1)
knx/engineering_tool_software_5
< 5.7.6
Published
Jul 19, 2021
Tracked Since
Feb 18, 2026