Adcon Telemetry A840 Vulnerabilities
The Adcon A840 Telemetry Gateway Base Station contains multiple critical vulnerabilities: CWE-798 (hardcoded credentials), CWE-287 (broken authentication), CWE-319 (cleartext transmission), and CWE-200 (information exposure). The device ships with default credentials that cannot be changed and uses unencrypted communication protocols. These allow unauthenticated remote attackers to retrieve sensitive information, impersonate legitimate telemetry connections, and potentially send unauthorized commands to monitored sites. All versions are affected. The A840 is end-of-life and no vendor patch is available.
- Network access to the A840 gateway management interface or communication ports
- Knowledge of default credentials (documented in product materials or publicly disclosed)
- No requirement for valid engineering credentials; default credentials are pre-set by the vendor
Patching may require device reboot — plan for process interruption
/api/v1/advisories/950df288-6a0f-476e-acfe-d0ee10700640Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.