#VU65082 Use of hard-coded credentials in Emerson Hardware solutions


Published: 2022-07-11

Vulnerability identifier: #VU65082

Vulnerability risk: Low

CVSSv3.1: 3.7 [CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-29964

CWE-ID: CWE-798

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
DeltaV M-series
Hardware solutions / Firmware
DeltaV S-series
Hardware solutions / Firmware
DeltaV P-series
Hardware solutions / Firmware
DeltaV SIS
Hardware solutions / Firmware
DeltaV CIOC IO
Hardware solutions / Firmware
DeltaV EIOC IO
Hardware solutions / Firmware
DeltaV WIOC IO
Hardware solutions / Firmware

Vendor: Emerson

Description

The vulnerability allows a local user to gain full access to vulnerable system.

The vulnerability exists due to presence of hard-coded credentials within the SSH service. A local user can access the affected system using the hard-coded credentials.

Mitigation
Install update from vendor's website.

Vulnerable software versions

DeltaV M-series: All versions

DeltaV S-series: All versions

DeltaV P-series: All versions

DeltaV SIS: All versions

DeltaV CIOC IO: All versions

DeltaV EIOC IO: All versions

DeltaV WIOC IO: All versions


External links
http://ics-cert.us-cert.gov/advisories/icsa-22-181-03


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability