Create MDT_KNX_manager_panel_default_credentials_vulnerability.md

add MDT KNX manager panel default credentials vulnerability
This commit is contained in:
Goby 2023-06-09 18:00:07 +08:00 committed by GitHub
parent aaf35fe56a
commit 63898c20b2
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -0,0 +1,12 @@
## MDT KNX manager panel default credentials vulnerability
| **Vulnerability** | **MDT KNX manager panel default credentials vulnerability** |
| :----: | :-----|
| **Chinese name** | MDT KNX 管理面板默认口令 |
| **CVSS core** | 7.5 |
| **FOFA Query** (click to view the results directly)| [title="MDT Technologies GmbH" && server="DEFAULT IP PLATFORM"](https://en.fofa.info/result?qbase64=dGl0bGU9Ik1EVCBUZWNobm9sb2dpZXMgR21iSCIgJiYgc2VydmVyPSJERUZBVUxUIElQIFBMQVRGT1JNIg%3D%3D) |
| **Number of assets affected** | 1135 |
| **Description** | MDT Technologies is an intelligent building automation service provider based on KNX technology for product manufacturing. Its KNX-IP Interface/ Knx-ip Object Server panel is used to access every bus device in the KNX bus system. These panels have default passwords and malicious attackers can take over the target panel system. Default passwords exist on the KNX-IP Interface and KNX-IP Object Server management panel of MDT Technologies. Malicious attackers can use these passwords to take over the target web system. |
| **Impact** | Default passwords exist on the KNX-IP Interface and KNX-IP Object Server management panel of MDT Technologies. Malicious attackers can use these passwords to take over the target web system. |
![](https://s3.bmp.ovh/imgs/2023/06/09/c82a201acb398b4b.gif)