Description


Bently Nevada condition monitoring equipment through 2022-04-29 mishandles authentication. It utilizes the TDI command and data protocols (60005/TCP, 60007/TCP) for communications between the monitoring controller and System 1 and/or Bently Nevada Monitor Configuration (BNMC) software. These protocols provide configuration management and historical data related functionality. Neither protocol has any authentication features, allowing any attacker capable of communicating with the ports in question to invoke (a subset of) desired functionality.

References


https://www.cisa.gov/uscert/ics/advisories/icsa-22-188-02

MitigationThird Party AdvisoryUS Government Resource


https://www.cisa.gov/uscert/ics/advisories/icsa-22-188-02

MitigationThird Party AdvisoryUS Government Resource

Weaknesses



CWE-306

CVSS impact metrics


CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H

9.1 · Critical

Information


Source identifier

[email protected]

Vulnerability status

Modified

Published

2022-07-26T20:15:10.843Z

3 years ago

Last modified

2024-11-21T06:00:03.173Z

1 year ago