emerson deltav_distributed_control_system 使用已被攻破或存在风险的密码学算法

admin 2023-11-30 06:41:01 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
emerson deltav_distributed_control_system 使用已被攻破或存在风险的密码学算法

CVE编号

CVE-2022-29965

利用情况

暂无

补丁情况

N/A

披露时间

2022-07-27
漏洞描述
The Emerson DeltaV Distributed Control System (DCS) controllers and IO cards through 2022-04-29 misuse passwords. Access to privileged operations on the maintenance port TELNET interface (23/TCP) on M-series and SIS (CSLS/LSNB/LSNG) nodes is controlled by means of utility passwords. These passwords are generated using a deterministic, insecure algorithm using a single seed value composed of a day/hour/minute timestamp with less than 16 bits of entropy. The seed value is fed through a lookup table and a series of permutation operations resulting in three different four-character passwords corresponding to different privilege levels. An attacker can easily reconstruct these passwords and thus gain access to privileged maintenance operations. NOTE: this is different from CVE-2014-2350.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
https://www.cisa.gov/uscert/ics/advisories/icsa-22-181-03
https://www.forescout.com/blog/
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 emerson deltav_distributed_control_system * Up to (including) 2022-04-29
运行在以下环境
硬件 emerson deltav_distributed_control_system_sq_controller - -
运行在以下环境
硬件 emerson deltav_distributed_control_system_sx_controller - -
运行在以下环境
硬件 emerson se4002s1t2b6_high_side_40-pin_mass_i/o_terminal_block - -
运行在以下环境
硬件 emerson se4003s2b4_16-pin_mass_i/o_terminal_block - -
运行在以下环境
硬件 emerson se4003s2b524-pin_mass_i/o_terminal_block - -
运行在以下环境
硬件 emerson se4017p0_h1_i/o_interface_card_and_terminl_block - -
运行在以下环境
硬件 emerson se4017p1_h1_i/o_card_with_integrated_power - -
运行在以下环境
硬件 emerson se4019p0_simplex_h1_4-port_plus_fieldbus_i/o_interface_with_terminalblock - -
运行在以下环境
硬件 emerson se4026_virtual_i/o_module_2 - -
运行在以下环境
硬件 emerson se4027_virtual_i/o_module_2 - -
运行在以下环境
硬件 emerson se4032s1t2b8_high_side_40-pin_do_mass_i/o_terminal_block - -
运行在以下环境
硬件 emerson se4037p0_h1_i/o_interface_card_and_terminl_block - -
运行在以下环境
硬件 emerson se4037p1_redundant_h1_i/o_card_with_integrated_power_and_terminal_block - -
运行在以下环境
硬件 emerson se4039p0_redundant_h1_4-port_plus_fieldbus_i/o_interface_with_terminalblock - -
运行在以下环境
硬件 emerson se4052s1t2b6_high_side_40-pin_mass_i/o_terminal_block - -
运行在以下环境
硬件 emerson se4082s1t2b8_high_side_40-pin_do_mass_i/o_terminal_block - -
运行在以下环境
硬件 emerson se4100_simplex_ethernet_i/o_card_(eioc)_assembly - -
运行在以下环境
硬件 emerson se4101_simplex_ethernet_i/o_card_(eioc)_assembly - -
运行在以下环境
硬件 emerson se4801t0x_redundant_wireless_i/o_card - -
运行在以下环境
硬件 emerson ve4103_modbus_tcp_interface_for_ethernet_connected_i/o_(eioc) - -
运行在以下环境
硬件 emerson ve4104_ethernet/ip_control_tag_integration_for_ethernet_connected_i/o_(eioc) - -
运行在以下环境
硬件 emerson ve4105_ethernet/ip_interface_for_ethernet_connected_i/o_(eioc) - -
运行在以下环境
硬件 emerson ve4106_opc-ua_client_for_ethernet_connected_i/o_(eioc) - -
运行在以下环境
硬件 emerson ve4107_iec_61850_mms_interface_for_ethernet_connected_i/o_(eioc) - -
CVSS3评分 5.5
  • 攻击路径 本地
  • 攻击复杂度 低
  • 权限要求 低
  • 影响范围 未更改
  • 用户交互 无
  • 可用性 无
  • 保密性 高
  • 完整性 无
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CWE-ID 漏洞类型
CWE-327 使用已被攻破或存在风险的密码学算法
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
N/A Ali_nvd

N/A

N/ACVE编号 CVE-2024-9120利用情况 暂无补丁情况 N/A披露时间 2024-09-23漏洞描述Use after free in Dawn
评论:0   参与:  0