CVE-2022-29965
https://notcve.org/view.php?id=CVE-2022-29965
The Emerson DeltaV Distributed Control System (DCS) controllers and IO cards through 2022-04-29 misuse passwords. Access to privileged operations on the maintenance port TELNET interface (23/TCP) on M-series and SIS (CSLS/LSNB/LSNG) nodes is controlled by means of utility passwords. These passwords are generated using a deterministic, insecure algorithm using a single seed value composed of a day/hour/minute timestamp with less than 16 bits of entropy. The seed value is fed through a lookup table and a series of permutation operations resulting in three different four-character passwords corresponding to different privilege levels. An attacker can easily reconstruct these passwords and thus gain access to privileged maintenance operations. • https://www.cisa.gov/uscert/ics/advisories/icsa-22-181-03 https://www.forescout.com/blog • CWE-327: Use of a Broken or Risky Cryptographic Algorithm •
CVE-2021-26264 – Emerson DeltaV Missing Authentication for Critical Function
https://notcve.org/view.php?id=CVE-2021-26264
A specially crafted script could cause the DeltaV Distributed Control System Controllers (All Versions) to restart and cause a denial-of-service condition. Un script especialmente diseñado podría hacer que DeltaV Distributed Control System Controllers (todas las versiones) se reinicien y causar una condición de denegación de servicio • https://www.cisa.gov/uscert/ics/advisories/icsa-21-355-04 • CWE-306: Missing Authentication for Critical Function •