#VU65079 Use of hard-coded credentials in Emerson Hardware solutions


Published: 2022-07-11

Vulnerability identifier: #VU65079

Vulnerability risk: Low

CVSSv3.1: 1.6 [CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-29963

CWE-ID: CWE-798

Exploitation vector: Local network

Exploit availability: No

Vulnerable software:
DeltaV M-series
Hardware solutions / Firmware
DeltaV S-series
Hardware solutions / Firmware
DeltaV P-series
Hardware solutions / Firmware
DeltaV SIS
Hardware solutions / Firmware
DeltaV CIOC IO
Hardware solutions / Firmware
DeltaV EIOC IO
Hardware solutions / Firmware
DeltaV WIOC IO
Hardware solutions / Firmware

Vendor: Emerson

Description

The vulnerability allows a remote user to compromise the target system.

The vulnerability exists due to presence of hard-coded credentials within the read-only Telnet service. A remote administrator on the local network can gain access to sensitive information on the target system.

Mitigation
Install update from vendor's website.

Vulnerable software versions

DeltaV M-series: All versions

DeltaV S-series: All versions

DeltaV P-series: All versions

DeltaV SIS: All versions

DeltaV CIOC IO: All versions

DeltaV EIOC IO: All versions

DeltaV WIOC IO: All versions


External links
http://ics-cert.us-cert.gov/advisories/icsa-22-181-03


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability