"value":"Kieback & Peter's DDC4000 series\u00a0uses weak credentials, which may allow an unauthenticated attacker to get full admin rights on the system."
"value":"<p>Kieback&Peter DDC4002, DDC4100, DDC4200, DDC4200-L and DDC4400 \ncontrollers are considered End-of-Life (EOL) and are no longer \nsupported. Users operating these controllers should ensure they are \noperated in a strictly separate OT environment and consider updating to a\n supported controller.</p>\n<p>Kieback&Peter recommends users update to DDC4002e, DDC4200e, DDC4400e, DDC4020e and DDC4040e controllers.</p>\n<p>Kieback&Peter recommends all affected users contact their local \nKieback&Peter office to update the firmware of the supported DDC \nsystems to v1.21.0 or later.</p>\n\n<br>"
}
],
"value":"Kieback&Peter DDC4002, DDC4100, DDC4200, DDC4200-L and DDC4400 \ncontrollers are considered End-of-Life (EOL) and are no longer \nsupported. Users operating these controllers should ensure they are \noperated in a strictly separate OT environment and consider updating to a\n supported controller.\n\n\nKieback&Peter recommends users update to DDC4002e, DDC4200e, DDC4400e, DDC4020e and DDC4040e controllers.\n\n\nKieback&Peter recommends all affected users contact their local \nKieback&Peter office to update the firmware of the supported DDC \nsystems to v1.21.0 or later."
}
],
"credits":[
{
"lang":"en",
"value":"Raphael Ruf of terreActive AG reported these vulnerabilities to CISA."