Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 6 |
CVE-ID | CVE-2022-29957 CVE-2022-29962 CVE-2022-29963 CVE-2022-29964 CVE-2022-30260 CVE-2022-29965 |
CWE-ID | CWE-306 CWE-798 CWE-345 CWE-327 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
DeltaV M-series Hardware solutions / Firmware DeltaV S-series Hardware solutions / Firmware DeltaV P-series Hardware solutions / Firmware DeltaV SIS Hardware solutions / Firmware DeltaV CIOC IO Hardware solutions / Firmware DeltaV EIOC IO Hardware solutions / Firmware DeltaV WIOC IO Hardware solutions / Firmware |
Vendor | Emerson |
Security Bulletin
This security bulletin contains information about 6 vulnerabilities.
EUVDB-ID: #VU65076
Risk: Low
CVSSv3.1: 5.9 [CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-29957
CWE-ID:
CWE-306 - Missing Authentication for Critical Function
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass authentication process.
The vulnerability exists due to missing authentication for several protocols. A remote attacker on the local network can invoke desired functionality or cause a denial of service (DoS) condition.
MitigationInstall update from vendor's website.
Vulnerable software versionsDeltaV M-series: All versions
DeltaV S-series: All versions
DeltaV P-series: All versions
DeltaV SIS: All versions
DeltaV CIOC IO: All versions
DeltaV EIOC IO: All versions
DeltaV WIOC IO: All versions
External linkshttp://ics-cert.us-cert.gov/advisories/icsa-22-181-03
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU65077
Risk: Low
CVSSv3.1: 3.7 [CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-29962
CWE-ID:
CWE-798 - Use of Hard-coded Credentials
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain full access to vulnerable system.
The vulnerability exists due to presence of hard-coded credentials in the FTP service. A local user can access the affected system using the hard-coded credentials.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall update from vendor's website.
Vulnerable software versionsDeltaV M-series: All versions
DeltaV S-series: All versions
DeltaV P-series: All versions
DeltaV SIS: All versions
DeltaV CIOC IO: All versions
DeltaV EIOC IO: All versions
DeltaV WIOC IO: All versions
External linkshttp://ics-cert.us-cert.gov/advisories/icsa-22-181-03
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU65079
Risk: Low
CVSSv3.1: 1.6 [CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-29963
CWE-ID:
CWE-798 - Use of Hard-coded Credentials
Exploit availability: No
DescriptionThe vulnerability allows a remote user to compromise the target system.
The vulnerability exists due to presence of hard-coded credentials within the read-only Telnet service. A remote administrator on the local network can gain access to sensitive information on the target system.
MitigationInstall update from vendor's website.
Vulnerable software versionsDeltaV M-series: All versions
DeltaV S-series: All versions
DeltaV P-series: All versions
DeltaV SIS: All versions
DeltaV CIOC IO: All versions
DeltaV EIOC IO: All versions
DeltaV WIOC IO: All versions
External linkshttp://ics-cert.us-cert.gov/advisories/icsa-22-181-03
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU65082
Risk: Low
CVSSv3.1: 3.7 [CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-29964
CWE-ID:
CWE-798 - Use of Hard-coded Credentials
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain full access to vulnerable system.
The vulnerability exists due to presence of hard-coded credentials within the SSH service. A local user can access the affected system using the hard-coded credentials.
MitigationInstall update from vendor's website.
Vulnerable software versionsDeltaV M-series: All versions
DeltaV S-series: All versions
DeltaV P-series: All versions
DeltaV SIS: All versions
DeltaV CIOC IO: All versions
DeltaV EIOC IO: All versions
DeltaV WIOC IO: All versions
External linkshttp://ics-cert.us-cert.gov/advisories/icsa-22-181-03
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU65085
Risk: Low
CVSSv3.1: 5.5 [CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-30260
CWE-ID:
CWE-345 - Insufficient Verification of Data Authenticity
Exploit availability: No
DescriptionThe vulnerability allows a local user to compromise the target system.
The vulnerability exists due to the firmware images are not signed and rely on insecure checksums for regular integrity checks. A local administrator can execute arbitrary code on the target system.
MitigationInstall update from vendor's website.
Vulnerable software versionsDeltaV M-series: All versions
DeltaV S-series: All versions
DeltaV P-series: All versions
DeltaV SIS: All versions
DeltaV CIOC IO: All versions
DeltaV EIOC IO: All versions
DeltaV WIOC IO: All versions
External linkshttp://ics-cert.us-cert.gov/advisories/icsa-22-181-03
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU65089
Risk: Medium
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-29965
CWE-ID:
CWE-327 - Use of a Broken or Risky Cryptographic Algorithm
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to use of a broken or risky cryptographic algorithm. A remote attacker on the local network can gain access to privileged operations in the maintenance interface.
MitigationInstall update from vendor's website.
Vulnerable software versionsDeltaV M-series: All versions
DeltaV S-series: All versions
DeltaV P-series: All versions
DeltaV SIS: All versions
DeltaV CIOC IO: All versions
DeltaV EIOC IO: All versions
DeltaV WIOC IO: All versions
External linkshttp://ics-cert.us-cert.gov/advisories/icsa-22-181-03
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.