Emerson DeltaV 10.3.1, 11.3, 11.3.1, and 12.3 uses hardcoded credentials for diagnostic services, which allows remote attackers to bypass intended access restrictions via a TCP session, as demonstrated by a session that uses the telnet program.
Advisories
Source ID Title
EUVD EUVD EUVD-2014-2387 Emerson DeltaV 10.3.1, 11.3, 11.3.1, and 12.3 uses hardcoded credentials for diagnostic services, which allows remote attackers to bypass intended access restrictions via a TCP session, as demonstrated by a session that uses the telnet program.
Fixes

Solution

Emerson has created a patch to mitigate these vulnerabilities. Emerson has distributed a notification (KBA NK-1400-0031) that provides details of the vulnerabilities, recommended mitigations, and instructions on obtaining and installing the patch. This document is available on Emerson’s support site to users who have support contracts with Emerson. If you do not have access to this site and need to apply the patch, please contact customer service at 1‑800‑833‑8314.


Workaround

No workaround given by the vendor.

History

Fri, 31 Oct 2025 23:00:00 +0000

Type Values Removed Values Added
Title Emerson DeltaV Use of Hard-coded Credentials
Weaknesses CWE-798
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P'}

cvssV2_0

{'score': 2.4, 'vector': 'AV:L/AC:H/Au:S/C:N/I:P/A:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-10-31T22:55:07.498Z

Reserved: 2014-03-13T00:00:00

Link: CVE-2014-2350

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2014-05-22T20:55:06.440

Modified: 2025-10-31T23:15:32.127

Link: CVE-2014-2350

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.