First published: Tue Jul 26 2022(Updated: )
Emerson OpenBSI through 2022-04-29 uses weak cryptography. It is an engineering environment for the ControlWave and Bristol Babcock line of RTUs. DES with hardcoded cryptographic keys is used for protection of certain system credentials, engineering files, and sensitive utilities.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Emerson OpenBSI | <5.9 | |
Emerson OpenBSI | =5.9 | |
Emerson OpenBSI | =5.9-sp1 | |
Emerson OpenBSI | =5.9-sp2 | |
Emerson OpenBSI | =5.9-sp3 | |
Emerson OpenBSI: Versions 5.9 SP3 and prior |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-29960 is a vulnerability in Emerson OpenBSI through 2022-04-29 that uses weak cryptography, specifically DES with hardcoded cryptographic keys.
Emerson OpenBSI versions up to and including 5.9, 5.9-sp1, 5.9-sp2, and 5.9-sp3 are affected by CVE-2022-29960.
CVE-2022-29960 has a severity score of 5.5, which is considered medium.
CVE-2022-29960 can lead to unauthorized access and compromise of certain system credentials, engineering files, and sensitive utilities.
To fix CVE-2022-29960, it is recommended to update to a version of Emerson OpenBSI that addresses the vulnerability.