Bently Nevada condition monitoring equipment through 2022-04-29 mishandles authentication. It utilizes the TDI command and data protocols (60005/TCP, 60007/TCP) for communications between the monitoring controller and System 1 and/or Bently Nevada Monitor Configuration (BNMC) software. These protocols provide configuration management and historical data related functionality. Neither protocol has any authentication features, allowing any attacker capable of communicating with the ports in question to invoke (a subset of) desired functionality.
References
Link | Resource |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-22-188-02 | Mitigation Third Party Advisory US Government Resource |
https://www.forescout.com/blog/ | Third Party Advisory |
https://www.cisa.gov/uscert/ics/advisories/icsa-22-188-02 | Mitigation Third Party Advisory US Government Resource |
https://www.forescout.com/blog/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
History
21 Nov 2024, 07:00
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.cisa.gov/uscert/ics/advisories/icsa-22-188-02 - Mitigation, Third Party Advisory, US Government Resource | |
References | () https://www.forescout.com/blog/ - Third Party Advisory |
Information
Published : 2022-07-26 22:15
Updated : 2024-11-21 07:00
NVD link : CVE-2022-29952
Mitre link : CVE-2022-29952
CVE.ORG link : CVE-2022-29952
JSON object : View
Products Affected
bakerhughes
- bently_nevada_3701\/46_firmware
- bently_nevada_3701\/40
- bently_nevada_3701\/40_firmware
- bently_nevada_3701\/46
- bently_nevada_60m100_firmware
- bently_nevada_3701\/44_firmware
- bently_nevada_60m100
- bently_nevada_3701\/44
CWE
CWE-306
Missing Authentication for Critical Function