CVE-2023-6448

9.8 CRITICAL

📋 TL;DR

CVE-2023-6448 allows unauthenticated attackers with network access to take administrative control of Unitronics Vision and Samba PLCs and HMIs by exploiting a default administrative password. Organizations using Unitronics VisiLogic software before version 9.9.00 are affected, particularly critical infrastructure sectors like water and wastewater systems.

💻 Affected Systems

Products:
  • Unitronics Vision PLCs
  • Unitronics Samba PLCs
  • Unitronics HMIs
Versions: All versions before 9.9.00
Operating Systems: Unitronics proprietary OS
Default Config Vulnerable: ⚠️ Yes
Notes: Systems using VisiLogic software for programming and configuration are vulnerable. The default administrative password is hardcoded and cannot be changed in affected versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of industrial control systems leading to physical damage, production shutdown, safety hazards, or environmental contamination

🟠

Likely Case

Unauthorized access to PLC/HMI systems allowing manipulation of industrial processes, data theft, or ransomware deployment

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing external access

🌐 Internet-Facing: HIGH - Direct internet exposure allows immediate compromise without authentication
🏢 Internal Only: HIGH - Internal attackers or malware can easily exploit this vulnerability

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Active exploitation has been observed in the wild, particularly against water and wastewater systems. Attackers only need network access to the device.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: VisiLogic 9.9.00

Vendor Advisory: https://downloads.unitronicsplc.com/Sites/plc/Technical_Library/Unitronics-Cybersecurity-Advisory-2023-001-CVE-2023-6448.pdf

Restart Required: Yes

Instructions:

1. Download VisiLogic 9.9.00 from Unitronics website. 2. Install the update on programming computers. 3. Upload updated programs to all affected PLCs/HMIs. 4. Restart affected devices. 5. Change all default passwords after update.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate PLC/HMI networks from corporate and internet networks using firewalls

Access Control Lists

all

Implement strict network access controls to limit connections to PLC/HMI devices

🧯 If You Can't Patch

  • Implement strict network segmentation and firewall rules to block all unnecessary access to PLC/HMI devices
  • Monitor network traffic for unauthorized access attempts and implement intrusion detection systems

🔍 How to Verify

Check if Vulnerable:

Check VisiLogic software version on programming computers. If version is below 9.9.00, systems are vulnerable.

Check Version:

Open VisiLogic software and check Help → About for version number

Verify Fix Applied:

Verify VisiLogic version is 9.9.00 or higher and test that default password no longer provides administrative access

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts followed by successful login
  • Unauthorized configuration changes
  • Multiple login attempts from unusual IP addresses

Network Indicators:

  • TCP port 20256 access attempts
  • Unauthorized Modbus/TCP traffic
  • Traffic from external networks to PLC devices

SIEM Query:

source="plc_network" AND (event_type="authentication" AND result="success" AND user="admin") OR (destination_port=20256 AND source_ip NOT IN allowed_ips)

🔗 References

📤 Share & Export