CVE-2021-36799

HIGH

KNX Engineering Tool Software 5 < 5.7.6 - Hard-coded Credentials

Title source: rule
STIX 2.1

Description

KNX ETS5 through 5.7.6 uses the hard-coded password ETS5Password, with a salt value of Ivan Medvedev, allowing local users to read project information. NOTE: This vulnerability only affects products that are no longer supported by the maintainer

Exploits (1)

nomisec WORKING POC 33 stars
by robertguetzkow · poc
https://github.com/robertguetzkow/ets5-password-recovery

References (3)

Core 3
Core References
Third Party Advisory x_refsource_misc
https://github.com/robertguetzkow/ets5-password-recovery
Third Party Advisory, VDB Entry x_refsource_misc
http://packetstormsecurity.com/files/165200/ETS5-Password-Recovery-Tool.html

Scores

CVSS v3 8.8
EPSS 0.0013
EPSS Percentile 31.7%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Details

CWE
CWE-798
Status published
Products (1)
knx/engineering_tool_software_5 < 5.7.6
Published Jul 19, 2021
Tracked Since Feb 18, 2026