Vulnerability in Hirschmann HiLCOS Devices Linked to Default SSH and SSL Keys
CVE-2015-10148

8.2HIGH

Key Information:

Vendor

Belden

Vendor
CVE Published:
3 April 2026

What is CVE-2015-10148?

Hirschmann HiLCOS devices, including OpenBAT, WLC, BAT300, and BAT54, prior to version 8.80 and OpenBAT prior to 9.10, are shipped with identical default SSH and SSL keys. This security misconfiguration allows unauthenticated remote attackers to exploit these default keys, facilitating man-in-the-middle attacks that enable device impersonation and the interception of sensitive management communications. The inability to change these default keys leaves devices vulnerable to unauthorized access, threatening the confidentiality and integrity of data transmitted over these connections.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Hirschmann HiLCOS >= 9.10

Hirschmann HiLCOS 0 <= 9.00-RU1

Hirschmann HiLCOS 0 <= 8.80

References

CVSS V4

Score:
8.2
Severity:
HIGH
Confidentiality:
High
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.