Lucene search

K
nessusThis script is Copyright (C) 2022-2024 and is owned by Tenable, Inc. or an Affiliate thereof.TENABLE_OT_BACHMANN_CVE-2020-16231.NASL
HistoryJun 14, 2022 - 12:00 a.m.

All Bachmann M1 System Processor Modules Use of Password Hash with Insufficient Computational Effort (CVE-2020-16231)

2022-06-1400:00:00
This script is Copyright (C) 2022-2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
13

6.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

9 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

60.0%

The affected Bachmann Electronic M-Base Controllers of version MSYS v1.06.14 and later use weak cryptography to protect device passwords.
Affected controllers that are actively supported include MX207, MX213, MX220, MC206, MC212, MC220, and MH230 hardware controllers, and affected end-of-life controller include MC205, MC210, MH212, ME203, CS200, MP213, MP226, MPC240, MPC265, MPC270, MPC293, MPE270, and CPC210 hardware controllers. Security Level 0 is set at default from the manufacturer, which could allow an unauthenticated remote attacker to gain access to the password hashes. Security Level 4 is susceptible if an authenticated remote attacker or an unauthenticated person with physical access to the device reads and decrypts the password to conduct further attacks.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.

##
# (C) Tenable, Inc.
##

include('compat.inc');

if (description)
{
  script_id(500654);
  script_version("1.10");
  script_set_attribute(attribute:"plugin_modification_date", value:"2024/03/04");

  script_cve_id("CVE-2020-16231");

  script_name(english:"All Bachmann M1 System Processor Modules Use of Password Hash with Insufficient Computational Effort (CVE-2020-16231)");

  script_set_attribute(attribute:"synopsis", value:
"The remote OT asset is affected by a vulnerability.");
  script_set_attribute(attribute:"description", value:
"The affected Bachmann Electronic M-Base Controllers of version MSYS
v1.06.14 and later use weak cryptography to protect device passwords.
Affected controllers that are actively supported include MX207, MX213,
MX220, MC206, MC212, MC220, and MH230 hardware controllers, and
affected end-of-life controller include MC205, MC210, MH212, ME203,
CS200, MP213, MP226, MPC240, MPC265, MPC270, MPC293, MPE270, and
CPC210 hardware controllers. Security Level 0 is set at default from
the manufacturer, which could allow an unauthenticated remote attacker
to gain access to the password hashes. Security Level 4 is susceptible
if an authenticated remote attacker or an unauthenticated person with
physical access to the device reads and decrypts the password to
conduct further attacks.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.");
  script_set_attribute(attribute:"see_also", value:"https://www.cisa.gov/uscert/ics/advisories/icsa-21-026-02");
  script_set_attribute(attribute:"solution", value:
"The following text was originally created by the Cybersecurity and Infrastructure Security Agency (CISA). The original
can be found at CISA.gov.

Bachmann recommends its direct users and original equipment manufacturers (OEM) update to Version 4.49-P1, which is
available under item number 00036634-90. To obtain Version 3.95R-P8 the end user is required to contact their key
account manager or technical support agent at Bachmann. Asset owners should contact their OEM or reseller for patches.
Bachmann does not provide support directly to asset owners. Please refer to the Bachmann Customer Information Note for
more details. The password รขย€ยœ_pC5#3fS@Y8sรขย€ย is required to access.

If asset owners are unable to update to the latest version or a patch is not available from the OEM or reseller,
Bachmann recommends the following mitigations to be put in place:

- Update the default username and password in the default Bachmann login handler for field operations.
- Direct users or OEMs may utilize their own login handler (e.g., LDAP, Radius, etc.) to circumvent the default
authentication handler. Security Level 4 is still recommended for field operations.
- Restrict physical access to the device to authorized personnel only.

Default Security Level 0 within Bachmann controllers is inherently insecure and should not be used in field operations.
Security Levels 1, 2, and 3 are also not recommended for field operations. The use of Telnet, FTP, and Console access
during field operations may result in the exploitation of inherent vulnerabilities such as unauthenticated access or
exposure of sensitive information. Bachmann strongly recommends users apply Security Level 4, where communication with
the device is limited to TLS protected services and all insecure services are disabled.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2020-16231");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");
  script_cwe_id(916);

  script_set_attribute(attribute:"vuln_publication_date", value:"2022/05/19");
  script_set_attribute(attribute:"patch_publication_date", value:"2022/05/19");
  script_set_attribute(attribute:"plugin_publication_date", value:"2022/06/14");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:bachmann:cpc210_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:bachmann:cs200_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:bachmann:mc205_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:bachmann:mc206_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:bachmann:mc210_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:bachmann:mc212_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:bachmann:mc220_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:bachmann:me203_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:bachmann:mh212_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:bachmann:mh230_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:bachmann:mp213_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:bachmann:mp226_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:bachmann:mpc240_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:bachmann:mpc265_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:bachmann:mpc270_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:bachmann:mpc293_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:bachmann:mpe270_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:bachmann:mx207_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:bachmann:mx213_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:bachmann:mx220_firmware");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Tenable.ot");

  script_copyright(english:"This script is Copyright (C) 2022-2024 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("tenable_ot_api_integration.nasl");
  script_require_keys("Tenable.ot/Bachmann");

  exit(0);
}


include('tenable_ot_cve_funcs.inc');

get_kb_item_or_exit('Tenable.ot/Bachmann');

var asset = tenable_ot::assets::get(vendor:'Bachmann');

var vuln_cpes = {
    "cpe:/o:bachmann:mx207_firmware" :
        {"versionStartIncluding" : "1.06.14", "family" : "Bachmann"},
    "cpe:/o:bachmann:mx213_firmware" :
        {"versionStartIncluding" : "1.06.14", "family" : "Bachmann"},
    "cpe:/o:bachmann:mx220_firmware" :
        {"versionStartIncluding" : "1.06.14", "family" : "Bachmann"},
    "cpe:/o:bachmann:mc206_firmware" :
        {"versionStartIncluding" : "1.06.14", "family" : "Bachmann"},
    "cpe:/o:bachmann:mc212_firmware" :
        {"versionStartIncluding" : "1.06.14", "family" : "Bachmann"},
    "cpe:/o:bachmann:mc220_firmware" :
        {"versionStartIncluding" : "1.06.14", "family" : "Bachmann"},
    "cpe:/o:bachmann:mh230_firmware" :
        {"versionStartIncluding" : "1.06.14", "family" : "Bachmann"},
    "cpe:/o:bachmann:mc205_firmware" :
        {"versionStartIncluding" : "1.06.14", "family" : "Bachmann"},
    "cpe:/o:bachmann:mc210_firmware" :
        {"versionStartIncluding" : "1.06.14", "family" : "Bachmann"},
    "cpe:/o:bachmann:mh212_firmware" :
        {"versionStartIncluding" : "1.06.14", "family" : "Bachmann"},
    "cpe:/o:bachmann:me203_firmware" :
        {"versionStartIncluding" : "1.06.14", "family" : "Bachmann"},
    "cpe:/o:bachmann:cs200_firmware" :
        {"versionStartIncluding" : "1.06.14", "family" : "Bachmann"},
    "cpe:/o:bachmann:mp213_firmware" :
        {"versionStartIncluding" : "1.06.14", "family" : "Bachmann"},
    "cpe:/o:bachmann:mp226_firmware" :
        {"versionStartIncluding" : "1.06.14", "family" : "Bachmann"},
    "cpe:/o:bachmann:mpc240_firmware" :
        {"versionStartIncluding" : "1.06.14", "family" : "Bachmann"},
    "cpe:/o:bachmann:mpc265_firmware" :
        {"versionStartIncluding" : "1.06.14", "family" : "Bachmann"},
    "cpe:/o:bachmann:mpc270_firmware" :
        {"versionStartIncluding" : "1.06.14", "family" : "Bachmann"},
    "cpe:/o:bachmann:mpc293_firmware" :
        {"versionStartIncluding" : "1.06.14", "family" : "Bachmann"},
    "cpe:/o:bachmann:mpe270_firmware" :
        {"versionStartIncluding" : "1.06.14", "family" : "Bachmann"},
    "cpe:/o:bachmann:cpc210_firmware" :
        {"versionStartIncluding" : "1.06.14", "family" : "Bachmann"}
};

tenable_ot::cve::compare_and_report(asset:asset, cpes:vuln_cpes, severity:SECURITY_WARNING);
VendorProductVersionCPE
bachmanncpc210_firmwarecpe:/o:bachmann:cpc210_firmware
bachmanncs200_firmwarecpe:/o:bachmann:cs200_firmware
bachmannmc205_firmwarecpe:/o:bachmann:mc205_firmware
bachmannmc206_firmwarecpe:/o:bachmann:mc206_firmware
bachmannmc210_firmwarecpe:/o:bachmann:mc210_firmware
bachmannmc212_firmwarecpe:/o:bachmann:mc212_firmware
bachmannmc220_firmwarecpe:/o:bachmann:mc220_firmware
bachmannme203_firmwarecpe:/o:bachmann:me203_firmware
bachmannmh212_firmwarecpe:/o:bachmann:mh212_firmware
bachmannmh230_firmwarecpe:/o:bachmann:mh230_firmware
Rows per page:
1-10 of 201

6.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

9 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

60.0%

Related for TENABLE_OT_BACHMANN_CVE-2020-16231.NASL