CVE-2022-29965
Severity CVSS v4.0:
Pending analysis
Type:
CWE-327
Use of a Broken or Risky Cryptographic Algorithm
Publication date:
26/07/2022
Last modified:
24/01/2023
Description
The Emerson DeltaV Distributed Control System (DCS) controllers and IO cards through 2022-04-29 misuse passwords. Access to privileged operations on the maintenance port TELNET interface (23/TCP) on M-series and SIS (CSLS/LSNB/LSNG) nodes is controlled by means of utility passwords. These passwords are generated using a deterministic, insecure algorithm using a single seed value composed of a day/hour/minute timestamp with less than 16 bits of entropy. The seed value is fed through a lookup table and a series of permutation operations resulting in three different four-character passwords corresponding to different privilege levels. An attacker can easily reconstruct these passwords and thus gain access to privileged maintenance operations. NOTE: this is different from CVE-2014-2350.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:emerson:deltav_distributed_control_system:*:*:*:*:*:*:*:* | 2022-04-29 (including) | |
| cpe:2.3:o:emerson:deltav_distributed_control_system_sq_controller_firmware:*:*:*:*:*:*:*:* | 2022-04-29 (including) | |
| cpe:2.3:h:emerson:deltav_distributed_control_system_sq_controller:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:emerson:deltav_distributed_control_system_sx_controller_firmware:*:*:*:*:*:*:*:* | 2022-04-29 (including) | |
| cpe:2.3:h:emerson:deltav_distributed_control_system_sx_controller:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:emerson:se4002s1t2b6_high_side_40-pin_mass_i\/o_terminal_block_firmware:*:*:*:*:*:*:*:* | 2022-04-29 (including) | |
| cpe:2.3:h:emerson:se4002s1t2b6_high_side_40-pin_mass_i\/o_terminal_block:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:emerson:se4003s2b4_16-pin_mass_i\/o_terminal_block_firmware:*:*:*:*:*:*:*:* | 2022-04-29 (including) | |
| cpe:2.3:h:emerson:se4003s2b4_16-pin_mass_i\/o_terminal_block:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:emerson:se4003s2b524-pin_mass_i\/o_terminal_block_firmware:*:*:*:*:*:*:*:* | 2022-04-29 (including) | |
| cpe:2.3:h:emerson:se4003s2b524-pin_mass_i\/o_terminal_block:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:emerson:se4017p0_h1_i\/o_interface_card_and_terminl_block_firmware:*:*:*:*:*:*:*:* | 2022-04-29 (including) | |
| cpe:2.3:h:emerson:se4017p0_h1_i\/o_interface_card_and_terminl_block:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:emerson:se4017p1_h1_i\/o_card_with_integrated_power_firmware:*:*:*:*:*:*:*:* | 2022-04-29 (including) | |
| cpe:2.3:h:emerson:se4017p1_h1_i\/o_card_with_integrated_power:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



