| Summary | The affected Bachmann Electronic M-Base Controllers of version MSYS v1.06.14 and later use weak cryptography to protect device passwords. Affected controllers that are actively supported include MX207, MX213, MX220, MC206, MC212, MC220, and MH230 hardware controllers, and affected end-of-life controller include MC205, MC210, MH212, ME203, CS200, MP213, MP226, MPC240, MPC265, MPC270, MPC293, MPE270, and CPC210 hardware controllers. Security Level 0 is set at default from the manufacturer, which could allow an unauthenticated remote attacker to gain access to the password hashes. Security Level 4 is susceptible if an authenticated remote attacker or an unauthenticated person with physical access to the device reads and decrypts the password to conduct further attacks. |
|---|---|
| Publication Date | May 20, 2022, 3:15 a.m. |
| Registration Date | May 20, 2022, 10 a.m. |
| Last Update | Nov. 21, 2024, 2:06 p.m. |
| CVSS3.1 : HIGH | |
| スコア | 8.8 |
|---|---|
| Vector | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
| 攻撃元区分(AV) | ネットワーク |
| 攻撃条件の複雑さ(AC) | 低 |
| 攻撃に必要な特権レベル(PR) | 低 |
| 利用者の関与(UI) | 不要 |
| 影響の想定範囲(S) | 変更なし |
| 機密性への影響(C) | 高 |
| 完全性への影響(I) | 高 |
| 可用性への影響(A) | 高 |
| CVSS2.0 : MEDIUM | |
| Score | 6.5 |
|---|---|
| Vector | AV:N/AC:L/Au:S/C:P/I:P/A:P |
| 攻撃元区分(AV) | ネットワーク |
| 攻撃条件の複雑さ(AC) | 低 |
| 攻撃前の認証要否(Au) | 単一 |
| 機密性への影響(C) | 低 |
| 完全性への影響(I) | 低 |
| 可用性への影響(A) | 低 |
| Get all privileges. | いいえ |
| Get user privileges | いいえ |
| Get other privileges | いいえ |
| User operation required | いいえ |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:o:bachmann:mx207_firmware:*:*:*:*:*:*:*:* | 1.06.14 | ||||
| execution environment | |||||
| 1 | cpe:2.3:h:bachmann:mx207:-:*:*:*:*:*:*:* | ||||
| Configuration2 | or higher | or less | more than | less than | |
| cpe:2.3:o:bachmann:mx213_firmware:*:*:*:*:*:*:*:* | 1.06.14 | ||||
| execution environment | |||||
| 1 | cpe:2.3:h:bachmann:mx213:-:*:*:*:*:*:*:* | ||||
| Configuration3 | or higher | or less | more than | less than | |
| cpe:2.3:o:bachmann:mx220_firmware:*:*:*:*:*:*:*:* | 1.06.14 | ||||
| execution environment | |||||
| 1 | cpe:2.3:h:bachmann:mx220:-:*:*:*:*:*:*:* | ||||
| Configuration4 | or higher | or less | more than | less than | |
| cpe:2.3:o:bachmann:mc206_firmware:*:*:*:*:*:*:*:* | 1.06.14 | ||||
| execution environment | |||||
| 1 | cpe:2.3:h:bachmann:mc206:-:*:*:*:*:*:*:* | ||||
| Configuration5 | or higher | or less | more than | less than | |
| cpe:2.3:o:bachmann:mc212_firmware:*:*:*:*:*:*:*:* | 1.06.14 | ||||
| execution environment | |||||
| 1 | cpe:2.3:h:bachmann:mc212:-:*:*:*:*:*:*:* | ||||
| Configuration6 | or higher | or less | more than | less than | |
| cpe:2.3:o:bachmann:mc220_firmware:*:*:*:*:*:*:*:* | 1.06.14 | ||||
| execution environment | |||||
| 1 | cpe:2.3:h:bachmann:mc220:-:*:*:*:*:*:*:* | ||||
| Configuration7 | or higher | or less | more than | less than | |
| cpe:2.3:o:bachmann:mh230_firmware:*:*:*:*:*:*:*:* | 1.06.14 | ||||
| execution environment | |||||
| 1 | cpe:2.3:h:bachmann:mh230:-:*:*:*:*:*:*:* | ||||
| Configuration8 | or higher | or less | more than | less than | |
| cpe:2.3:o:bachmann:mc205_firmware:*:*:*:*:*:*:*:* | 1.06.14 | ||||
| execution environment | |||||
| 1 | cpe:2.3:h:bachmann:mc205:-:*:*:*:*:*:*:* | ||||
| Configuration9 | or higher | or less | more than | less than | |
| cpe:2.3:o:bachmann:mc210_firmware:*:*:*:*:*:*:*:* | 1.06.14 | ||||
| execution environment | |||||
| 1 | cpe:2.3:h:bachmann:mc210:-:*:*:*:*:*:*:* | ||||
| Configuration10 | or higher | or less | more than | less than | |
| cpe:2.3:o:bachmann:mh212_firmware:*:*:*:*:*:*:*:* | 1.06.14 | ||||
| execution environment | |||||
| 1 | cpe:2.3:h:bachmann:mh212:-:*:*:*:*:*:*:* | ||||
| Configuration11 | or higher | or less | more than | less than | |
| cpe:2.3:o:bachmann:me203_firmware:*:*:*:*:*:*:*:* | 1.06.14 | ||||
| execution environment | |||||
| 1 | cpe:2.3:h:bachmann:me203:-:*:*:*:*:*:*:* | ||||
| Configuration12 | or higher | or less | more than | less than | |
| cpe:2.3:o:bachmann:cs200_firmware:*:*:*:*:*:*:*:* | 1.06.14 | ||||
| execution environment | |||||
| 1 | cpe:2.3:h:bachmann:cs200:-:*:*:*:*:*:*:* | ||||
| Configuration13 | or higher | or less | more than | less than | |
| cpe:2.3:o:bachmann:mp213_firmware:*:*:*:*:*:*:*:* | 1.06.14 | ||||
| execution environment | |||||
| 1 | cpe:2.3:h:bachmann:mp213:-:*:*:*:*:*:*:* | ||||
| Configuration14 | or higher | or less | more than | less than | |
| cpe:2.3:o:bachmann:mp226_firmware:*:*:*:*:*:*:*:* | 1.06.14 | ||||
| execution environment | |||||
| 1 | cpe:2.3:h:bachmann:mp226:-:*:*:*:*:*:*:* | ||||
| Configuration15 | or higher | or less | more than | less than | |
| cpe:2.3:o:bachmann:mpc240_firmware:*:*:*:*:*:*:*:* | 1.06.14 | ||||
| execution environment | |||||
| 1 | cpe:2.3:h:bachmann:mpc240:-:*:*:*:*:*:*:* | ||||
| Configuration16 | or higher | or less | more than | less than | |
| cpe:2.3:o:bachmann:mpc265_firmware:*:*:*:*:*:*:*:* | 1.06.14 | ||||
| execution environment | |||||
| 1 | cpe:2.3:h:bachmann:mpc265:-:*:*:*:*:*:*:* | ||||
| Configuration17 | or higher | or less | more than | less than | |
| cpe:2.3:o:bachmann:mpc270_firmware:*:*:*:*:*:*:*:* | 1.06.14 | ||||
| execution environment | |||||
| 1 | cpe:2.3:h:bachmann:mpc270:-:*:*:*:*:*:*:* | ||||
| Configuration18 | or higher | or less | more than | less than | |
| cpe:2.3:o:bachmann:mpc293_firmware:*:*:*:*:*:*:*:* | 1.06.14 | ||||
| execution environment | |||||
| 1 | cpe:2.3:h:bachmann:mpc293:-:*:*:*:*:*:*:* | ||||
| Configuration19 | or higher | or less | more than | less than | |
| cpe:2.3:o:bachmann:mpe270_firmware:*:*:*:*:*:*:*:* | 1.06.14 | ||||
| execution environment | |||||
| 1 | cpe:2.3:h:bachmann:mpe270:-:*:*:*:*:*:*:* | ||||
| Configuration20 | or higher | or less | more than | less than | |
| cpe:2.3:o:bachmann:cpc210_firmware:*:*:*:*:*:*:*:* | 1.06.14 | ||||
| execution environment | |||||
| 1 | cpe:2.3:h:bachmann:cpc210:-:*:*:*:*:*:*:* | ||||
| Title | Bachmann Electronic 製 M1 System Processor Modules における強度が不十分なパスワードハッシュの使用の脆弱性 |
|---|---|
| Summary | Bachmann Electronic が提供する M1 System Processor Modules には強度が不十分なパスワードハッシュの使用 (CWE-916、CVE-2020-16231) が存在します。当該製品では、パスワードハッシュ化に MD5 が利用されています。またデフォルト設定である「Security Level 0」は、パスワードハッシュへのアクセスを認証なしで行える可能性があります。 |
| Possible impacts | 認証されたリモートの攻撃者、または当該機器に物理的にアクセス可能な認証されていない第三者によって、パスワードハッシュを取得され、復号化される可能性があります。 |
| Solution | [アップデートする] 開発者が提供する情報をもとに、最新版にアップデートしてください。 * バージョン 4.49-P1 * バージョン 3.95R-P8 [ワークアラウンドを実施する] 最新バージョンにアップデートできない場合、Bachmann Electronic は以下の回避策の適用を推奨しています。 * フィールド操作用の Bachmann ログインハンドラで使用するデフォルトのユーザ名とパスワードを更新する * LDAP、Radius といったログインハンドラを独自に実装する * 当該機器への物理的アクセスを許可された担当者のみに制限する * セキュリティレベル4 に設定をする |
| Publication Date | July 2, 2021, midnight |
| Registration Date | July 5, 2021, 3:32 p.m. |
| Last Update | June 18, 2024, 3:59 p.m. |
| Bachmann Electronic |
| M-Base オペレーティングシステムとミドルウェアおよび稼働機器 MSYSv1.06.14 以降 |
| No | Changed Details | Date of change |
|---|---|---|
| 1 | [2021年07月05日] 掲載 |
July 5, 2021, 3:32 p.m. |
| 4 | [2024年06月18日] CVSS による深刻度:内容を更新 参考情報:National Vulnerability Database (NVD) (CVE-2020-16231) を追加 |
June 18, 2024, 3:58 p.m. |