First published: Tue Jul 26 2022(Updated: )
The Emerson DeltaV Distributed Control System (DCS) through 2022-04-29 mishandles authentication. It utilizes several proprietary protocols for a wide variety of functionality. These protocols include Firmware upgrade (18508/TCP, 18518/TCP); Plug-and-Play (18510/UDP); Hawk services (18507/UDP); Management (18519/TCP); Cold restart (18512/UDP); SIS communications (12345/TCP); and Wireless Gateway Protocol (18515/UDP). None of these protocols have any authentication features, allowing any attacker capable of communicating with the ports in question to invoke (a subset of) desired functionality.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Emerson DeltaV Distributed Control System | <=2022-04-29 | |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-29957 is a vulnerability in the Emerson DeltaV Distributed Control System (DCS) that mishandles authentication.
The severity of CVE-2022-29957 is high with a CVSS score of 7.8.
CVE-2022-29957 affects the Emerson DeltaV Distributed Control System by mishandling authentication.
The affected software version by CVE-2022-29957 is Emerson DeltaV Distributed Control System up to and including version 2022-04-29.
To fix CVE-2022-29957, users should apply the necessary patches and updates provided by Emerson.