Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
The Emerson DeltaV Distributed Control System (DCS) controllers and IO cards through 2022-04-29 misuse passwords. Access to privileged operations on the maintenance port TELNET interface (23/TCP) on M-series and SIS (CSLS/LSNB/LSNG) nodes is controlled by means of utility passwords. These passwords are generated using a deterministic, insecure algorithm using a single seed value composed of a day/hour/minute timestamp with less than 16 bits of entropy. The seed value is fed through a lookup table and a series of permutation operations resulting in three different four-character passwords corresponding to different privilege levels. An attacker can easily reconstruct these passwords and thus gain access to privileged maintenance operations. NOTE: this is different from CVE-2014-2350.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
Emerson DeltaV Distributed Control System 加密问题漏洞
Vulnerability Description
Emerson DeltaV Distributed Control System是美国艾默生电气(Emerson)公司的一套自动化分布式控制系统。该系统包括网络安全管理、报警管理、批量控制和变更管理等功能。 Emerson DeltaV Distributed Control System存在加密问题漏洞,该漏洞源于维护界面中对特权操作的访问由使用确定性不安全算法的质询-响应身份验证控制。
CVSS Information
N/A
Vulnerability Type
N/A