No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 07 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Belden
Belden hirschmann Hilcos |
|
| Vendors & Products |
Belden
Belden hirschmann Hilcos |
Mon, 06 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 03 Apr 2026 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Hirschmann HiLCOS devices OpenBAT, WLC, BAT300, BAT54 prior to 8.80 and OpenBAT prior to 9.10 are shipped with identical default SSH and SSL keys that cannot be changed, allowing unauthenticated remote attackers to decrypt or intercept encrypted management communications. Attackers can perform man-in-the-middle attacks, impersonate devices, and expose sensitive information by leveraging the shared default cryptographic keys across multiple devices. | |
| Title | Hirschmann HiLCOS Hard-coded Credentials SSH SSL Keys | |
| Weaknesses | CWE-321 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-06T13:11:22.775Z
Reserved: 2026-04-03T21:32:33.851Z
Link: CVE-2015-10148
Updated: 2026-04-06T13:11:18.314Z
Status : Awaiting Analysis
Published: 2026-04-03T22:16:24.207
Modified: 2026-04-07T13:20:55.200
Link: CVE-2015-10148
No data.
OpenCVE Enrichment
Updated: 2026-04-06T22:21:56Z