Impact
This vulnerability is a use of hard‑coded credentials in ScadaBR version 1.2.0. An attacker who is able to locate or otherwise extract these credentials can authenticate to the SCADA system as an administrator, gaining full control over configuration, monitoring, and potential command execution. The effect is an elevation of privilege that compromises both the confidentiality of operational data and the integrity and availability of the control system.
Affected Systems
The affected product is ScadaBR by ScadaBR, specifically the 1.2.0 release. No other versions are listed as impacted.
Risk and Exploitability
The CVSS score of 5.1 indicates a medium severity, and the vulnerability is not included in the CISA KEV catalog. An exploitation path likely requires that an attacker can access the application, read its configuration or binary files, or otherwise reverse engineer the hard‐coded credentials. This could be achieved via local access or across a network where the application files are exposed. The lack of an EPSS score means the current exploit probability is unknown, but the use of hard‑coded credentials represents a predictable weakness that could be leveraged if the attacker has any level of access to the system.
OpenCVE Enrichment