VAR-202206-2264

Vulnerability from variot - Updated: 2023-12-18 11:55

The Emerson DeltaV Distributed Control System (DCS) controllers and IO cards through 2022-04-29 misuse passwords. Access to privileged operations on the maintenance port TELNET interface (23/TCP) on M-series and SIS (CSLS/LSNB/LSNG) nodes is controlled by means of utility passwords. These passwords are generated using a deterministic, insecure algorithm using a single seed value composed of a day/hour/minute timestamp with less than 16 bits of entropy. The seed value is fed through a lookup table and a series of permutation operations resulting in three different four-character passwords corresponding to different privilege levels. An attacker can easily reconstruct these passwords and thus gain access to privileged maintenance operations. NOTE: this is different from CVE-2014-2350. DeltaV Distributed Control System , DeltaV Distributed Control System SQ controller firmware, DeltaV Distributed Control System SX controller Multiple Emerson products, including firmware, contain vulnerabilities related to the use of cryptographic algorithms.Information may be obtained

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202206-2264",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "se4003s2b524-pin mass i\\/o terminal block",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "emerson",
        "version": "2022-04-29"
      },
      {
        "model": "se4019p0 simplex h1 4-port plus fieldbus i\\/o interface with terminalblock",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "emerson",
        "version": "2022-04-29"
      },
      {
        "model": "se4027 virtual i\\/o module 2",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "emerson",
        "version": "2022-04-29"
      },
      {
        "model": "deltav distributed control system sx controller",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "emerson",
        "version": "2022-04-29"
      },
      {
        "model": "se4101 simplex ethernet i\\/o card \\ assembly",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "emerson",
        "version": "2022-04-29"
      },
      {
        "model": "se4032s1t2b8 high side 40-pin do mass i\\/o terminal block",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "emerson",
        "version": "2022-04-29"
      },
      {
        "model": "se4037p1 redundant h1 i\\/o card with integrated power and terminal block",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "emerson",
        "version": "2022-04-29"
      },
      {
        "model": "se4801t0x redundant wireless i\\/o card",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "emerson",
        "version": "2022-04-29"
      },
      {
        "model": "ve4106 opc-ua client for ethernet connected i\\/o \\",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "emerson",
        "version": "2022-04-29"
      },
      {
        "model": "se4003s2b4 16-pin mass i\\/o terminal block",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "emerson",
        "version": "2022-04-29"
      },
      {
        "model": "se4037p0 h1 i\\/o interface card and terminl block",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "emerson",
        "version": "2022-04-29"
      },
      {
        "model": "se4100 simplex ethernet i\\/o card \\ assembly",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "emerson",
        "version": "2022-04-29"
      },
      {
        "model": "se4017p1 h1 i\\/o card with integrated power",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "emerson",
        "version": "2022-04-29"
      },
      {
        "model": "deltav distributed control system sq controller",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "emerson",
        "version": "2022-04-29"
      },
      {
        "model": "ve4107 iec 61850 mms interface for ethernet connected i\\/o \\",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "emerson",
        "version": "2022-04-29"
      },
      {
        "model": "se4082s1t2b8 high side 40-pin do mass i\\/o terminal block",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "emerson",
        "version": "2022-04-29"
      },
      {
        "model": "se4039p0 redundant h1 4-port plus fieldbus i\\/o interface with terminalblock",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "emerson",
        "version": "2022-04-29"
      },
      {
        "model": "se4017p0 h1 i\\/o interface card and terminl block",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "emerson",
        "version": "2022-04-29"
      },
      {
        "model": "se4026 virtual i\\/o module 2",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "emerson",
        "version": "2022-04-29"
      },
      {
        "model": "deltav distributed control system",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "emerson",
        "version": "2022-04-29"
      },
      {
        "model": "ve4105 ethernet\\/ip interface for ethernet connected i\\/o \\",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "emerson",
        "version": "2022-04-29"
      },
      {
        "model": "ve4103 modbus tcp interface for ethernet connected i\\/o \\",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "emerson",
        "version": "2022-04-29"
      },
      {
        "model": "se4002s1t2b6 high side 40-pin mass i\\/o terminal block",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "emerson",
        "version": "2022-04-29"
      },
      {
        "model": "ve4104 ethernet\\/ip control tag integration for ethernet connected i\\/o \\",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "emerson",
        "version": "2022-04-29"
      },
      {
        "model": "se4052s1t2b6 high side 40-pin mass i\\/o terminal block",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "emerson",
        "version": "2022-04-29"
      },
      {
        "model": "se4032s1t2b8 high side 40-pin do mass i/o terminal block",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30a8\u30de\u30bd\u30f3",
        "version": null
      },
      {
        "model": "se4801t0x redundant wireless i/o card",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30a8\u30de\u30bd\u30f3",
        "version": null
      },
      {
        "model": "se4003s2b4 16-pin mass i/o terminal block",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30a8\u30de\u30bd\u30f3",
        "version": null
      },
      {
        "model": "se4003s2b524-pin mass i/o terminal block",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30a8\u30de\u30bd\u30f3",
        "version": null
      },
      {
        "model": "se4017p1 h1 i/o card with integrated power",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30a8\u30de\u30bd\u30f3",
        "version": null
      },
      {
        "model": "se4052s1t2b6 high side 40-pin mass i/o terminal block",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30a8\u30de\u30bd\u30f3",
        "version": null
      },
      {
        "model": "se4039p0 redundant h1 4-port plus fieldbus i/o interface with terminalblock",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30a8\u30de\u30bd\u30f3",
        "version": null
      },
      {
        "model": "se4101 simplex ethernet i/o card assembly",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30a8\u30de\u30bd\u30f3",
        "version": null
      },
      {
        "model": "se4037p0 h1 i/o interface card and terminl block",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30a8\u30de\u30bd\u30f3",
        "version": null
      },
      {
        "model": "se4082s1t2b8 high side 40-pin do mass i/o terminal block",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30a8\u30de\u30bd\u30f3",
        "version": null
      },
      {
        "model": "se4100 simplex ethernet i/o card assembly",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30a8\u30de\u30bd\u30f3",
        "version": null
      },
      {
        "model": "se4037p1 redundant h1 i/o card with integrated power and terminal block",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30a8\u30de\u30bd\u30f3",
        "version": null
      },
      {
        "model": "se4027 virtual i/o module 2",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30a8\u30de\u30bd\u30f3",
        "version": null
      },
      {
        "model": "se4019p0 simplex h1 4-port plus fieldbus i/o interface with terminalblock",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30a8\u30de\u30bd\u30f3",
        "version": null
      },
      {
        "model": "se4017p0 h1 i/o card and terminal block",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30a8\u30de\u30bd\u30f3",
        "version": null
      },
      {
        "model": "deltav distributed control system sx \u30b3\u30f3\u30c8\u30ed\u30fc\u30e9",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30a8\u30de\u30bd\u30f3",
        "version": null
      },
      {
        "model": "se4026 virtual i/o module 2",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30a8\u30de\u30bd\u30f3",
        "version": null
      },
      {
        "model": "se4002s1t2b6 high side 40-pin mass i/o terminal block",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30a8\u30de\u30bd\u30f3",
        "version": null
      },
      {
        "model": "deltav distributed control system sq \u30b3\u30f3\u30c8\u30ed\u30fc\u30e9",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30a8\u30de\u30bd\u30f3",
        "version": null
      },
      {
        "model": "deltav distributed control system",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30a8\u30de\u30bd\u30f3",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-017497"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-29965"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:emerson:deltav_distributed_control_system:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "2022-04-29",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:emerson:deltav_distributed_control_system_sq_controller_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "2022-04-29",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:emerson:deltav_distributed_control_system_sq_controller:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:emerson:deltav_distributed_control_system_sx_controller_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "2022-04-29",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:emerson:deltav_distributed_control_system_sx_controller:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:emerson:se4002s1t2b6_high_side_40-pin_mass_i\\/o_terminal_block_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "2022-04-29",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:emerson:se4002s1t2b6_high_side_40-pin_mass_i\\/o_terminal_block:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:emerson:se4003s2b4_16-pin_mass_i\\/o_terminal_block_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "2022-04-29",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:emerson:se4003s2b4_16-pin_mass_i\\/o_terminal_block:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:emerson:se4003s2b524-pin_mass_i\\/o_terminal_block_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "2022-04-29",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:emerson:se4003s2b524-pin_mass_i\\/o_terminal_block:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:emerson:se4017p0_h1_i\\/o_interface_card_and_terminl_block_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "2022-04-29",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:emerson:se4017p0_h1_i\\/o_interface_card_and_terminl_block:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:emerson:se4017p1_h1_i\\/o_card_with_integrated_power_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "2022-04-29",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:emerson:se4017p1_h1_i\\/o_card_with_integrated_power:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:emerson:se4019p0_simplex_h1_4-port_plus_fieldbus_i\\/o_interface_with_terminalblock_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "2022-04-29",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:emerson:se4019p0_simplex_h1_4-port_plus_fieldbus_i\\/o_interface_with_terminalblock:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:emerson:se4026_virtual_i\\/o_module_2_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "2022-04-29",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:emerson:se4026_virtual_i\\/o_module_2:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:emerson:se4027_virtual_i\\/o_module_2_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "2022-04-29",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:emerson:se4027_virtual_i\\/o_module_2:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:emerson:se4032s1t2b8_high_side_40-pin_do_mass_i\\/o_terminal_block_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "2022-04-29",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:emerson:se4032s1t2b8_high_side_40-pin_do_mass_i\\/o_terminal_block:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:emerson:se4037p0_h1_i\\/o_interface_card_and_terminl_block_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "2022-04-29",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:emerson:se4037p0_h1_i\\/o_interface_card_and_terminl_block:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:emerson:se4037p1_redundant_h1_i\\/o_card_with_integrated_power_and_terminal_block_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "2022-04-29",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:emerson:se4037p1_redundant_h1_i\\/o_card_with_integrated_power_and_terminal_block:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:emerson:se4039p0_redundant_h1_4-port_plus_fieldbus_i\\/o_interface_with_terminalblock_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "2022-04-29",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:emerson:se4039p0_redundant_h1_4-port_plus_fieldbus_i\\/o_interface_with_terminalblock:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:emerson:se4052s1t2b6_high_side_40-pin_mass_i\\/o_terminal_block_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "2022-04-29",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:emerson:se4052s1t2b6_high_side_40-pin_mass_i\\/o_terminal_block:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:emerson:se4082s1t2b8_high_side_40-pin_do_mass_i\\/o_terminal_block_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "2022-04-29",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:emerson:se4082s1t2b8_high_side_40-pin_do_mass_i\\/o_terminal_block:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:emerson:se4100_simplex_ethernet_i\\/o_card_\\(eioc\\)_assembly_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "2022-04-29",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:emerson:se4100_simplex_ethernet_i\\/o_card_\\(eioc\\)_assembly:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:emerson:se4101_simplex_ethernet_i\\/o_card_\\(eioc\\)_assembly_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "2022-04-29",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:emerson:se4101_simplex_ethernet_i\\/o_card_\\(eioc\\)_assembly:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:emerson:se4801t0x_redundant_wireless_i\\/o_card_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "2022-04-29",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:emerson:se4801t0x_redundant_wireless_i\\/o_card:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:emerson:ve4103_modbus_tcp_interface_for_ethernet_connected_i\\/o_\\(eioc\\)_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "2022-04-29",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:emerson:ve4103_modbus_tcp_interface_for_ethernet_connected_i\\/o_\\(eioc\\):-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:emerson:ve4104_ethernet\\/ip_control_tag_integration_for_ethernet_connected_i\\/o_\\(eioc\\)_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "2022-04-29",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:emerson:ve4104_ethernet\\/ip_control_tag_integration_for_ethernet_connected_i\\/o_\\(eioc\\):-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:emerson:ve4105_ethernet\\/ip_interface_for_ethernet_connected_i\\/o_\\(eioc\\)_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "2022-04-29",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:emerson:ve4105_ethernet\\/ip_interface_for_ethernet_connected_i\\/o_\\(eioc\\):-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:emerson:ve4106_opc-ua_client_for_ethernet_connected_i\\/o_\\(eioc\\)_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "2022-04-29",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:emerson:ve4106_opc-ua_client_for_ethernet_connected_i\\/o_\\(eioc\\):-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:emerson:ve4107_iec_61850_mms_interface_for_ethernet_connected_i\\/o_\\(eioc\\)_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "2022-04-29",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:emerson:ve4107_iec_61850_mms_interface_for_ethernet_connected_i\\/o_\\(eioc\\):-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2022-29965"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Daniel dos Santos and Jos Wetzels from Forescout Technologies reported these vulnerabilities to CISA.",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202206-2913"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2022-29965",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.8,
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 5.5,
            "baseSeverity": "Medium",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2022-29965",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "Low",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2022-29965",
            "trust": 1.8,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202206-2913",
            "trust": 0.6,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-017497"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-29965"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202206-2913"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The Emerson DeltaV Distributed Control System (DCS) controllers and IO cards through 2022-04-29 misuse passwords. Access to privileged operations on the maintenance port TELNET interface (23/TCP) on M-series and SIS (CSLS/LSNB/LSNG) nodes is controlled by means of utility passwords. These passwords are generated using a deterministic, insecure algorithm using a single seed value composed of a day/hour/minute timestamp with less than 16 bits of entropy. The seed value is fed through a lookup table and a series of permutation operations resulting in three different four-character passwords corresponding to different privilege levels. An attacker can easily reconstruct these passwords and thus gain access to privileged maintenance operations. NOTE: this is different from CVE-2014-2350. DeltaV Distributed Control System , DeltaV Distributed Control System SQ controller firmware, DeltaV Distributed Control System SX controller Multiple Emerson products, including firmware, contain vulnerabilities related to the use of cryptographic algorithms.Information may be obtained",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2022-29965"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-017497"
      },
      {
        "db": "VULMON",
        "id": "CVE-2022-29965"
      }
    ],
    "trust": 1.71
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2022-29965",
        "trust": 3.3
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-22-181-03",
        "trust": 2.5
      },
      {
        "db": "JVN",
        "id": "JVNVU92990931",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-017497",
        "trust": 0.8
      },
      {
        "db": "CS-HELP",
        "id": "SB2022071112",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202206-2913",
        "trust": 0.6
      },
      {
        "db": "VULMON",
        "id": "CVE-2022-29965",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2022-29965"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-017497"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-29965"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202206-2913"
      }
    ]
  },
  "id": "VAR-202206-2264",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.6666667
  },
  "last_update_date": "2023-12-18T11:55:47.689000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Emerson DeltaV Distributed Control System Fixes for encryption problem vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=202537"
      }
    ],
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202206-2913"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-327",
        "trust": 1.0
      },
      {
        "problemtype": "Use of incomplete or dangerous cryptographic algorithms (CWE-327) [NVD evaluation ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-017497"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-29965"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.5,
        "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-181-03"
      },
      {
        "trust": 2.4,
        "url": "https://www.forescout.com/blog/"
      },
      {
        "trust": 0.8,
        "url": "https://jvn.jp/vu/jvnvu92990931/"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-29965"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2022071112"
      },
      {
        "trust": 0.6,
        "url": "https://cxsecurity.com/cveshow/cve-2022-29965/"
      },
      {
        "trust": 0.6,
        "url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-181-03"
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2022-29965"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-017497"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-29965"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202206-2913"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULMON",
        "id": "CVE-2022-29965"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-017497"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-29965"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202206-2913"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2023-10-13T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2022-017497"
      },
      {
        "date": "2022-07-26T22:15:11.183000",
        "db": "NVD",
        "id": "CVE-2022-29965"
      },
      {
        "date": "2022-06-30T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202206-2913"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2023-10-13T04:53:00",
        "db": "JVNDB",
        "id": "JVNDB-2022-017497"
      },
      {
        "date": "2023-01-24T16:06:41.127000",
        "db": "NVD",
        "id": "CVE-2022-29965"
      },
      {
        "date": "2022-08-05T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202206-2913"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202206-2913"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Vulnerabilities related to the use of cryptographic algorithms in multiple Emerson products",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-017497"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "encryption problem",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202206-2913"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…