CVE-2022-29952

EUVD-2022-34259
Bently Nevada condition monitoring equipment through 2022-04-29 mishandles authentication. It utilizes the TDI command and data protocols (60005/TCP, 60007/TCP) for communications between the monitoring controller and System 1 and/or Bently Nevada Monitor Configuration (BNMC) software. These protocols provide configuration management and historical data related functionality. Neither protocol has any authentication features, allowing any attacker capable of communicating with the ports in question to invoke (a subset of) desired functionality.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
9.1 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 50%
Affected Products (NVD)
VendorProductVersion
bakerhughesbently_nevada_3701\/40_firmware
𝑥
< 4.1
bakerhughesbently_nevada_3701\/44_firmware
𝑥
< 4.1
bakerhughesbently_nevada_3701\/46_firmware
𝑥
< 4.1
bakerhughesbently_nevada_60m100_firmware
-
𝑥
= Vulnerable software versions