Barco ClickShare Devices Weak Password Requirements (CVE-2019-18828)

medium Tenable OT Security Plugin ID 503365

Synopsis

The remote OT asset is affected by a vulnerability.

Description

Barco ClickShare Button R9861500D01 devices before 1.9.0 have Insufficiently Protected Credentials. The root account (present for access via debug interfaces, which are by default not enabled on production devices) of the embedded Linux on the ClickShare Button is using a weak password.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.

Solution

Refer to the vendor advisory.

See Also

https://www.barco.com/en/clickshare/firmware-update

http://www.nessus.org/u?c52e85b9

http://www.nessus.org/u?946efa15

http://www.nessus.org/u?25dcdea6

http://www.nessus.org/u?5ca5c22e

http://www.nessus.org/u?edaedcdc

Plugin Details

Severity: Medium

ID: 503365

Version: 1.1

Type: remote

Family: Tenable.ot

Published: 10/9/2025

Updated: 10/9/2025

Supported Sensors: Tenable OT Security

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.2

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2019-18828

CVSS v3

Risk Factor: Medium

Base Score: 6.8

Vector: CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: cpe:/o:barco:clickshare_cse-200_firmware, cpe:/o:barco:clickshare_cs-100_firmware, cpe:/o:barco:clickshare_cse-200%2b_firmware, cpe:/o:barco:clickshare_cse-800_firmware

Required KB Items: Tenable.ot/Barco

Exploit Ease: No known exploits are available

Patch Publication Date: 12/16/2019

Vulnerability Publication Date: 12/16/2019

Reference Information

CVE: CVE-2019-18828

CWE: 521