Unitronics Vision and Samba Series (Update A)
Unitronics Vision and Samba series PLCs and HMIs contain a vulnerability that allows an unauthenticated attacker to gain administrative control using a default password. The vulnerability exists in VisiLogic software (versions before 9.9.00) and OS (versions before 12.38). Attackers can connect via PCOM protocol over TCP 20256 without authentication credentials and use the default administrative password "1111" to take full control of the device. This gives attackers the ability to modify process logic, alter control parameters, stop operations, or inject malware. The vulnerability is being actively exploited in the wild against water and wastewater systems.
- Network reachability to TCP port 20256 (or alternative PCOM port configured on the device)
- Default password 'Unitronics 1111' in use or no password set on PCOM-enabled sockets
- PCOM (remote operations) enabled on the device
- No firewall or network access control blocking external connections to the device
Patching may require device reboot — plan for process interruption
/api/v1/advisories/3dee4576-3a0c-46e4-958d-a268809ef38cGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.