CVE-2015-10148 PUBLISHED

Hirschmann HiLCOS Hard-coded Credentials SSH SSL Keys

Assigner: VulnCheck
Reserved: 03.04.2026 Published: 03.04.2026 Updated: 03.04.2026

Hirschmann HiLCOS devices OpenBAT, WLC, BAT300, BAT54 prior to 8.80 and OpenBAT prior to 9.10 are shipped with identical default SSH and SSL keys that cannot be changed, allowing unauthenticated remote attackers to decrypt or intercept encrypted management communications. Attackers can perform man-in-the-middle attacks, impersonate devices, and expose sensitive information by leveraging the shared default cryptographic keys across multiple devices.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N
CVSS Score: 8.2

Product Status

Vendor Belden
Product Hirschmann HiLCOS
Versions Default: affected
  • Version >= 9.10 is unaffected
  • affected from 0 to 9.00-RU1 (incl.)
  • affected from 0 to 8.80 (incl.)
  • affected from 0 to 8.60 (incl.)

References

Problem Types

  • CWE-321: Use of Hard-coded Cryptographic Key CWE