Metrics
Affected Vendors & Products
Solution
Emerson has created a patch to mitigate these vulnerabilities. Emerson has distributed a notification (KBA NK-1400-0031) that provides details of the vulnerabilities, recommended mitigations, and instructions on obtaining and installing the patch. This document is available on Emerson’s support site to users who have support contracts with Emerson. If you do not have access to this site and need to apply the patch, please contact customer service at 1‑800‑833‑8314.
Workaround
No workaround given by the vendor.
Fri, 03 Oct 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Emerson DeltaV 10.3.1, 11.3, 11.3.1, and 12.3 allows local users to modify or read configuration files by leveraging engineering-level privileges. | Emerson DeltaV 10.3.1, 11.3, 11.3.1, and 12.3 uses hardcoded credentials for diagnostic services, which allows remote attackers to bypass intended access restrictions via a TCP session, as demonstrated by a session that uses the telnet program. |
Title | Emerson DeltaV Use of Hard-coded Credentials | |
Weaknesses | CWE-798 | |
References |
| |
Metrics |
cvssV2_0
|
cvssV2_0
|

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-10-03T16:13:34.985Z
Reserved: 2014-03-13T00:00:00
Link: CVE-2014-2349

No data.

Status : Deferred
Published: 2014-05-22T20:55:06.377
Modified: 2025-10-03T16:16:14.207
Link: CVE-2014-2349

No data.

No data.