CVE-2022-29952
Severity CVSS v4.0:
Pending analysis
Type:
CWE-306
Missing Authentication for Critical Function
Publication date:
26/07/2022
Last modified:
09/02/2024
Description
Bently Nevada condition monitoring equipment through 2022-04-29 mishandles authentication. It utilizes the TDI command and data protocols (60005/TCP, 60007/TCP) for communications between the monitoring controller and System 1 and/or Bently Nevada Monitor Configuration (BNMC) software. These protocols provide configuration management and historical data related functionality. Neither protocol has any authentication features, allowing any attacker capable of communicating with the ports in question to invoke (a subset of) desired functionality.
Impact
Base Score 3.x
9.10
Severity 3.x
CRITICAL
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:bakerhughes:bently_nevada_3701\/40_firmware:*:*:*:*:*:*:*:* | 4.1 (excluding) | |
| cpe:2.3:h:bakerhughes:bently_nevada_3701\/40:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:bakerhughes:bently_nevada_3701\/44_firmware:*:*:*:*:*:*:*:* | 4.1 (excluding) | |
| cpe:2.3:h:bakerhughes:bently_nevada_3701\/44:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:bakerhughes:bently_nevada_3701\/46_firmware:*:*:*:*:*:*:*:* | 4.1 (excluding) | |
| cpe:2.3:h:bakerhughes:bently_nevada_3701\/46:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:bakerhughes:bently_nevada_60m100_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:bakerhughes:bently_nevada_60m100:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



