87 lines
4.2 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2022-30319",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-07-28T16:15:11.500",
"lastModified": "2022-08-10T14:12:49.247",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Saia Burgess Controls (SBC) PCD through 2022-05-06 allows Authentication bypass. According to FSCT-2022-0062, there is a Saia Burgess Controls (SBC) PCD S-Bus authentication bypass issue. The affected components are characterized as: S-Bus (5050/UDP) authentication. The potential impact is: Authentication bypass. The Saia Burgess Controls (SBC) PCD controllers utilize the S-Bus protocol (5050/UDP) for a variety of engineering purposes. It is possible to configure a password in order to restrict access to sensitive engineering functionality. Authentication functions on the basis of a MAC/IP whitelist with inactivity timeout to which an authenticated client's MAC/IP is stored. UDP traffic can be spoofed to bypass the whitelist-based access control. Since UDP is stateless, an attacker capable of passively observing traffic can spoof arbitrary messages using the MAC/IP of an authenticated client. This allows the attacker access to sensitive engineering functionality such as uploading/downloading control logic and manipulating controller configuration."
},
{
"lang": "es",
"value": "Saia Burgess Controls (SBC) PCD versiones hasta 06-05-2022, permite una omisi\u00f3n de la Autenticaci\u00f3n. De acuerdo con FSCT-2022-0062, se presenta un problema de omisi\u00f3n de autenticaci\u00f3n S-Bus de Saia Burgess Controls (SBC) PCD. Los componentes afectados son caracterizados como: Autenticaci\u00f3n S-Bus (5050/UDP). El impacto potencial es: Omisi\u00f3n de Autenticaci\u00f3n. Los controladores PCD de Saia Burgess Controls (SBC) usan el protocolo S-Bus (5050/UDP) para diversos fines de ingenier\u00eda. Es posible configurar una contrase\u00f1a para restringir el acceso a la funcionalidad de ingenier\u00eda confidencial. La autenticaci\u00f3n funciona sobre la base de una lista blanca de MAC/IP con tiempo de inactividad en la que es almacenada la MAC/IP de un cliente autenticado. El tr\u00e1fico UDP puede ser falsificado para omitir el control de acceso basado en la lista blanca. Como el UDP no presenta estado, un atacante capaz de observar pasivamente el tr\u00e1fico puede falsificar mensajes arbitrarios usando la MAC/IP de un cliente autenticado. Esto permite al atacante acceder a funciones de ingenier\u00eda confidenciales, como la carga/descarga de la l\u00f3gica de control y la manipulaci\u00f3n de la configuraci\u00f3n del controlador"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:honeywell:saia_pg5_controls_suite:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3F7830BF-FD3B-4932-9713-CD8F9DB0A167"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-207-03",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "https://www.forescout.com/blog/",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}