6.5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:P/I:P/A:P
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
9 High
AI Score
Confidence
High
0.002 Low
EPSS
Percentile
60.0%
The affected Bachmann Electronic M-Base Controllers of version MSYS v1.06.14 and later use weak cryptography to protect device passwords.
Affected controllers that are actively supported include MX207, MX213, MX220, MC206, MC212, MC220, and MH230 hardware controllers, and affected end-of-life controller include MC205, MC210, MH212, ME203, CS200, MP213, MP226, MPC240, MPC265, MPC270, MPC293, MPE270, and CPC210 hardware controllers. Security Level 0 is set at default from the manufacturer, which could allow an unauthenticated remote attacker to gain access to the password hashes. Security Level 4 is susceptible if an authenticated remote attacker or an unauthenticated person with physical access to the device reads and decrypts the password to conduct further attacks.
This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.
##
# (C) Tenable, Inc.
##
include('compat.inc');
if (description)
{
script_id(500654);
script_version("1.10");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/03/04");
script_cve_id("CVE-2020-16231");
script_name(english:"All Bachmann M1 System Processor Modules Use of Password Hash with Insufficient Computational Effort (CVE-2020-16231)");
script_set_attribute(attribute:"synopsis", value:
"The remote OT asset is affected by a vulnerability.");
script_set_attribute(attribute:"description", value:
"The affected Bachmann Electronic M-Base Controllers of version MSYS
v1.06.14 and later use weak cryptography to protect device passwords.
Affected controllers that are actively supported include MX207, MX213,
MX220, MC206, MC212, MC220, and MH230 hardware controllers, and
affected end-of-life controller include MC205, MC210, MH212, ME203,
CS200, MP213, MP226, MPC240, MPC265, MPC270, MPC293, MPE270, and
CPC210 hardware controllers. Security Level 0 is set at default from
the manufacturer, which could allow an unauthenticated remote attacker
to gain access to the password hashes. Security Level 4 is susceptible
if an authenticated remote attacker or an unauthenticated person with
physical access to the device reads and decrypts the password to
conduct further attacks.
This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.");
script_set_attribute(attribute:"see_also", value:"https://www.cisa.gov/uscert/ics/advisories/icsa-21-026-02");
script_set_attribute(attribute:"solution", value:
"The following text was originally created by the Cybersecurity and Infrastructure Security Agency (CISA). The original
can be found at CISA.gov.
Bachmann recommends its direct users and original equipment manufacturers (OEM) update to Version 4.49-P1, which is
available under item number 00036634-90. To obtain Version 3.95R-P8 the end user is required to contact their key
account manager or technical support agent at Bachmann. Asset owners should contact their OEM or reseller for patches.
Bachmann does not provide support directly to asset owners. Please refer to the Bachmann Customer Information Note for
more details. The password รขยย_pC5#3fS@Y8sรขยย is required to access.
If asset owners are unable to update to the latest version or a patch is not available from the OEM or reseller,
Bachmann recommends the following mitigations to be put in place:
- Update the default username and password in the default Bachmann login handler for field operations.
- Direct users or OEMs may utilize their own login handler (e.g., LDAP, Radius, etc.) to circumvent the default
authentication handler. Security Level 4 is still recommended for field operations.
- Restrict physical access to the device to authorized personnel only.
Default Security Level 0 within Bachmann controllers is inherently insecure and should not be used in field operations.
Security Levels 1, 2, and 3 are also not recommended for field operations. The use of Telnet, FTP, and Console access
during field operations may result in the exploitation of inherent vulnerabilities such as unauthenticated access or
exposure of sensitive information. Bachmann strongly recommends users apply Security Level 4, where communication with
the device is limited to TLS protected services and all insecure services are disabled.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2020-16231");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_cwe_id(916);
script_set_attribute(attribute:"vuln_publication_date", value:"2022/05/19");
script_set_attribute(attribute:"patch_publication_date", value:"2022/05/19");
script_set_attribute(attribute:"plugin_publication_date", value:"2022/06/14");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_set_attribute(attribute:"cpe", value:"cpe:/o:bachmann:cpc210_firmware");
script_set_attribute(attribute:"cpe", value:"cpe:/o:bachmann:cs200_firmware");
script_set_attribute(attribute:"cpe", value:"cpe:/o:bachmann:mc205_firmware");
script_set_attribute(attribute:"cpe", value:"cpe:/o:bachmann:mc206_firmware");
script_set_attribute(attribute:"cpe", value:"cpe:/o:bachmann:mc210_firmware");
script_set_attribute(attribute:"cpe", value:"cpe:/o:bachmann:mc212_firmware");
script_set_attribute(attribute:"cpe", value:"cpe:/o:bachmann:mc220_firmware");
script_set_attribute(attribute:"cpe", value:"cpe:/o:bachmann:me203_firmware");
script_set_attribute(attribute:"cpe", value:"cpe:/o:bachmann:mh212_firmware");
script_set_attribute(attribute:"cpe", value:"cpe:/o:bachmann:mh230_firmware");
script_set_attribute(attribute:"cpe", value:"cpe:/o:bachmann:mp213_firmware");
script_set_attribute(attribute:"cpe", value:"cpe:/o:bachmann:mp226_firmware");
script_set_attribute(attribute:"cpe", value:"cpe:/o:bachmann:mpc240_firmware");
script_set_attribute(attribute:"cpe", value:"cpe:/o:bachmann:mpc265_firmware");
script_set_attribute(attribute:"cpe", value:"cpe:/o:bachmann:mpc270_firmware");
script_set_attribute(attribute:"cpe", value:"cpe:/o:bachmann:mpc293_firmware");
script_set_attribute(attribute:"cpe", value:"cpe:/o:bachmann:mpe270_firmware");
script_set_attribute(attribute:"cpe", value:"cpe:/o:bachmann:mx207_firmware");
script_set_attribute(attribute:"cpe", value:"cpe:/o:bachmann:mx213_firmware");
script_set_attribute(attribute:"cpe", value:"cpe:/o:bachmann:mx220_firmware");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Tenable.ot");
script_copyright(english:"This script is Copyright (C) 2022-2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("tenable_ot_api_integration.nasl");
script_require_keys("Tenable.ot/Bachmann");
exit(0);
}
include('tenable_ot_cve_funcs.inc');
get_kb_item_or_exit('Tenable.ot/Bachmann');
var asset = tenable_ot::assets::get(vendor:'Bachmann');
var vuln_cpes = {
"cpe:/o:bachmann:mx207_firmware" :
{"versionStartIncluding" : "1.06.14", "family" : "Bachmann"},
"cpe:/o:bachmann:mx213_firmware" :
{"versionStartIncluding" : "1.06.14", "family" : "Bachmann"},
"cpe:/o:bachmann:mx220_firmware" :
{"versionStartIncluding" : "1.06.14", "family" : "Bachmann"},
"cpe:/o:bachmann:mc206_firmware" :
{"versionStartIncluding" : "1.06.14", "family" : "Bachmann"},
"cpe:/o:bachmann:mc212_firmware" :
{"versionStartIncluding" : "1.06.14", "family" : "Bachmann"},
"cpe:/o:bachmann:mc220_firmware" :
{"versionStartIncluding" : "1.06.14", "family" : "Bachmann"},
"cpe:/o:bachmann:mh230_firmware" :
{"versionStartIncluding" : "1.06.14", "family" : "Bachmann"},
"cpe:/o:bachmann:mc205_firmware" :
{"versionStartIncluding" : "1.06.14", "family" : "Bachmann"},
"cpe:/o:bachmann:mc210_firmware" :
{"versionStartIncluding" : "1.06.14", "family" : "Bachmann"},
"cpe:/o:bachmann:mh212_firmware" :
{"versionStartIncluding" : "1.06.14", "family" : "Bachmann"},
"cpe:/o:bachmann:me203_firmware" :
{"versionStartIncluding" : "1.06.14", "family" : "Bachmann"},
"cpe:/o:bachmann:cs200_firmware" :
{"versionStartIncluding" : "1.06.14", "family" : "Bachmann"},
"cpe:/o:bachmann:mp213_firmware" :
{"versionStartIncluding" : "1.06.14", "family" : "Bachmann"},
"cpe:/o:bachmann:mp226_firmware" :
{"versionStartIncluding" : "1.06.14", "family" : "Bachmann"},
"cpe:/o:bachmann:mpc240_firmware" :
{"versionStartIncluding" : "1.06.14", "family" : "Bachmann"},
"cpe:/o:bachmann:mpc265_firmware" :
{"versionStartIncluding" : "1.06.14", "family" : "Bachmann"},
"cpe:/o:bachmann:mpc270_firmware" :
{"versionStartIncluding" : "1.06.14", "family" : "Bachmann"},
"cpe:/o:bachmann:mpc293_firmware" :
{"versionStartIncluding" : "1.06.14", "family" : "Bachmann"},
"cpe:/o:bachmann:mpe270_firmware" :
{"versionStartIncluding" : "1.06.14", "family" : "Bachmann"},
"cpe:/o:bachmann:cpc210_firmware" :
{"versionStartIncluding" : "1.06.14", "family" : "Bachmann"}
};
tenable_ot::cve::compare_and_report(asset:asset, cpes:vuln_cpes, severity:SECURITY_WARNING);
Vendor | Product | Version | CPE |
---|---|---|---|
bachmann | cpc210_firmware | cpe:/o:bachmann:cpc210_firmware | |
bachmann | cs200_firmware | cpe:/o:bachmann:cs200_firmware | |
bachmann | mc205_firmware | cpe:/o:bachmann:mc205_firmware | |
bachmann | mc206_firmware | cpe:/o:bachmann:mc206_firmware | |
bachmann | mc210_firmware | cpe:/o:bachmann:mc210_firmware | |
bachmann | mc212_firmware | cpe:/o:bachmann:mc212_firmware | |
bachmann | mc220_firmware | cpe:/o:bachmann:mc220_firmware | |
bachmann | me203_firmware | cpe:/o:bachmann:me203_firmware | |
bachmann | mh212_firmware | cpe:/o:bachmann:mh212_firmware | |
bachmann | mh230_firmware | cpe:/o:bachmann:mh230_firmware |
6.5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:P/I:P/A:P
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
9 High
AI Score
Confidence
High
0.002 Low
EPSS
Percentile
60.0%