Emerson DeltaV 10.3.1, 11.3, 11.3.1, and 12.3 uses hardcoded credentials for diagnostic services, which allows remote attackers to bypass intended access restrictions via a TCP session, as demonstrated by a session that uses the telnet program.
Advisories
Source ID Title
EUVD EUVD EUVD-2014-2386 Emerson DeltaV 10.3.1, 11.3, 11.3.1, and 12.3 uses hardcoded credentials for diagnostic services, which allows remote attackers to bypass intended access restrictions via a TCP session, as demonstrated by a session that uses the telnet program.
Fixes

Solution

Emerson has created a patch to mitigate these vulnerabilities. Emerson has distributed a notification (KBA NK-1400-0031) that provides details of the vulnerabilities, recommended mitigations, and instructions on obtaining and installing the patch. This document is available on Emerson’s support site to users who have support contracts with Emerson. If you do not have access to this site and need to apply the patch, please contact customer service at 1‑800‑833‑8314.


Workaround

No workaround given by the vendor.

History

Fri, 31 Oct 2025 23:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-798

Fri, 31 Oct 2025 23:00:00 +0000

Type Values Removed Values Added
Title Emerson DeltaV Use of Hard-coded Credentials Emerson DeltaV Use of Improper Authorization
Weaknesses CWE-285
Metrics cvssV2_0

{'score': 2.4, 'vector': 'AV:L/AC:H/Au:S/C:N/I:P/A:P'}

cvssV2_0

{'score': 6.2, 'vector': 'AV:L/AC:L/Au:S/C:N/I:C/A:C'}


Fri, 03 Oct 2025 16:15:00 +0000

Type Values Removed Values Added
Description Emerson DeltaV 10.3.1, 11.3, 11.3.1, and 12.3 allows local users to modify or read configuration files by leveraging engineering-level privileges. Emerson DeltaV 10.3.1, 11.3, 11.3.1, and 12.3 uses hardcoded credentials for diagnostic services, which allows remote attackers to bypass intended access restrictions via a TCP session, as demonstrated by a session that uses the telnet program.
Title Emerson DeltaV Use of Hard-coded Credentials
Weaknesses CWE-798
References
Metrics cvssV2_0

{'score': 4.6, 'vector': 'AV:L/AC:L/Au:N/C:P/I:P/A:P'}

cvssV2_0

{'score': 2.4, 'vector': 'AV:L/AC:H/Au:S/C:N/I:P/A:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-10-31T22:56:34.809Z

Reserved: 2014-03-13T00:00:00

Link: CVE-2014-2349

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2014-05-22T20:55:06.377

Modified: 2025-10-31T23:15:31.537

Link: CVE-2014-2349

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.