CVE-2022-29952

CVSS V2 None CVSS V3 Critical 9.1
Description
Bently Nevada condition monitoring equipment through 2022-04-29 mishandles authentication. It utilizes the TDI command and data protocols (60005/TCP, 60007/TCP) for communications between the monitoring controller and System 1 and/or Bently Nevada Monitor Configuration (BNMC) software. These protocols provide configuration management and historical data related functionality. Neither protocol has any authentication features, allowing any attacker capable of communicating with the ports in question to invoke (a subset of) desired functionality.
Overview
  • CVE ID
  • CVE-2022-29952
  • Assigner
  • cve@mitre.org
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2022-07-26T22:15:10
  • Last Modified Date
  • 2022-08-02T20:53:46
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
AND
cpe:2.3:o:bakerhughes:bently_nevada_3701\/40_firmware:*:*:*:*:*:*:*:* 1 OR 4.1
cpe:2.3:h:bakerhughes:bently_nevada_3701\/40:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:bakerhughes:bently_nevada_3701\/44_firmware:*:*:*:*:*:*:*:* 1 OR 4.1
cpe:2.3:h:bakerhughes:bently_nevada_3701\/44:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:bakerhughes:bently_nevada_3701\/46_firmware:*:*:*:*:*:*:*:* 1 OR 4.1
cpe:2.3:h:bakerhughes:bently_nevada_3701\/46:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:bakerhughes:bently_nevada_60m100_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:bakerhughes:bently_nevada_60m100:-:*:*:*:*:*:*:* 0 OR
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • LOW
  • Privileges Required
  • NONE
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • NONE
  • Availability Impact
  • HIGH
  • Base Score
  • 9.1
  • Base Severity
  • CRITICAL
  • Exploitability Score
  • 3.9
  • Impact Score
  • 5.2
History
Created Old Value New Value Data Type Notes
2022-07-26 23:00:27 Added to TrackCVE