AMX Multiple Products Credential Management Vulnerabilities (Update A)
AMX NetLinx, Enova, and Massio controllers contain vulnerabilities in credential management (CWE-256) that allow extraction or weak handling of embedded administrative credentials. Affected products include NX-series controllers, Enova DVX and DGX audio/video products, NI-series master controllers, and Massio ControlPads. Firmware versions below the indicated thresholds are vulnerable (e.g., NX series <1.4.65, Enova NX DGX <1.4.72_Hotfix_firmware, NI-700/900/2100/3100/4100 <4.1.419 or <3.60.456_Hotfix_firmware depending on model). The vendor has not released patches for the affected products and they remain vulnerable.
- Network access to the AMX device management port (typically port 23 or web interface port)
- No credentials required to trigger the vulnerability, though valid credentials are needed to fully exploit after extraction
Patching may require device reboot — plan for process interruption
/api/v1/advisories/65a26677-eeb8-4e97-8a84-70e679f82f64Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.