SB2022071112 - Multiple vulnerabilities in Emerson DeltaV Distributed Control System



SB2022071112 - Multiple vulnerabilities in Emerson DeltaV Distributed Control System

Published: July 11, 2022

Security Bulletin ID SB2022071112
Severity
Medium
Patch available
YES
Number of vulnerabilities 6
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 17% Low 83%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 6 secuirty vulnerabilities.


1) Missing Authentication for Critical Function (CVE-ID: CVE-2022-29957)

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to missing authentication for several protocols. A remote attacker on the local network can invoke desired functionality or cause a denial of service (DoS) condition.


2) Use of hard-coded credentials (CVE-ID: CVE-2022-29962)

The vulnerability allows a local user to gain full access to vulnerable system.

The vulnerability exists due to presence of hard-coded credentials in the FTP service. A local user can access the affected system using the hard-coded credentials.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


3) Use of hard-coded credentials (CVE-ID: CVE-2022-29963)

The vulnerability allows a remote user to compromise the target system.

The vulnerability exists due to presence of hard-coded credentials within the read-only Telnet service. A remote administrator on the local network can gain access to sensitive information on the target system.


4) Use of hard-coded credentials (CVE-ID: CVE-2022-29964)

The vulnerability allows a local user to gain full access to vulnerable system.

The vulnerability exists due to presence of hard-coded credentials within the SSH service. A local user can access the affected system using the hard-coded credentials.


5) Insufficient verification of data authenticity (CVE-ID: CVE-2022-30260)

The vulnerability allows a local user to compromise the target system.

The vulnerability exists due to the firmware images are not signed and rely on insecure checksums for regular integrity checks. A local administrator can execute arbitrary code on the target system.


6) Use of a broken or risky cryptographic algorithm (CVE-ID: CVE-2022-29965)

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to use of a broken or risky cryptographic algorithm. A remote attacker on the local network can gain access to privileged operations in the maintenance interface.


Remediation

Install update from vendor's website.