
OpenPLC Webserver Default Login Scanner
This scanner detects the use of OpenPLC Webserver v3 in digital assets by identifying default credentials for unauthorized access.
Short Info
Level
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 seconds
Time Interval
16 days 12 hours
Scan only one
Domain, Subdomain, IPv4
Toolbox
-
OpenPLC Webserver is a software predominantly used in industrial and IoT environments to control and monitor PLC (Programmable Logic Controller) systems. Developed for providing a user-friendly interface for PLC configuration, it is used by engineers and technicians to automate and supervise industrial processes. The platform offers a web-based dashboard that allows for the integration and operation of various control modules. The software is crucial in smart manufacturing settings where it aids in the management of process controls and data collection. OpenPLC Webserver's ease of use and adaptability contribute to its widespread adoption in both small and large-scale industrial applications.
The vulnerability in question pertains to the use of default login credentials, which can be exploited to gain unauthorized access to the OpenPLC Webserver. Default logins represent a common oversight in the initial configuration of many systems, potentially resulting in significant security risks. When such credentials are not changed, it allows attackers to infiltrate the system without confronting any authentication hurdles. The detection template identifies these default credentials, alerting administrators to the potential security lapse. In environments where sensitive industrial processes are controlled, such vulnerabilities could have grave implications.
The detection mechanism sends an HTTP POST request to the login endpoint of the OpenPLC Webserver using the default credentials "openplc:openplc". If successful, it then attempts to access the dashboard via a GET request, seeking confirmation of access through specific keywords like "Dashboard" and "Runtime Logs". The response status code is checked to ensure that unauthorized access was indeed obtained. This technical approach confirms the presence of default credentials, thereby validating the vulnerability. Its dual-request structure ensures that both access and post-login functionality are properly evaluated.
Exploitation of this vulnerability could lead to unauthorized control over PLC configurations, risking alteration of critical industrial processes. Additionally, attackers could access sensitive operational data or even introduce harmful commands that could disrupt business operations. The potential for damage extends to physical hardware if controls are manipulated without proper supervision. The economic implications can be severe, as compromised systems might lead to production stoppages, consequently incurring financial losses. Furthermore, such security breaches could tarnish a company's reputation, eroding stakeholder trust.