CVE-2020-16231

Published on: Not Yet Published

Last Modified on: 06/08/2022 02:47:00 PM UTC

CVE-2020-16231 - advisory for ICSA-21-026-02

Source: Mitre Source: NIST CVE.ORG Print: PDF PDF
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Certain versions of Cpc210 from Bachmann contain the following vulnerability:

The affected Bachmann Electronic M-Base Controllers of version MSYS v1.06.14 and later use weak cryptography to protect device passwords. Affected controllers that are actively supported include MX207, MX213, MX220, MC206, MC212, MC220, and MH230 hardware controllers, and affected end-of-life controller include MC205, MC210, MH212, ME203, CS200, MP213, MP226, MPC240, MPC265, MPC270, MPC293, MPE270, and CPC210 hardware controllers. Security Level 0 is set at default from the manufacturer, which could allow an unauthenticated remote attacker to gain access to the password hashes. Security Level 4 is susceptible if an authenticated remote attacker or an unauthenticated person with physical access to the device reads and decrypts the password to conduct further attacks.

  • CVE-2020-16231 has been assigned by URL Logo [email protected] to track the vulnerability - currently rated as HIGH severity.

CVSS3 Score: 8.8 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW LOW NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH HIGH

CVSS2 Score: 6.5 - MEDIUM

Access
Vector
Access
Complexity
Authentication
NETWORK LOW SINGLE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
PARTIAL PARTIAL PARTIAL

CVE References

Description Tags Link
All Bachmann M1 System Processor Modules | CISA www.cisa.gov
text/html
URL Logo MISC www.cisa.gov/uscert/ics/advisories/icsa-21-026-02

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
Hardware Device InfoBachmannCpc210-AllAllAll
Operating
System
BachmannCpc210 FirmwareAllAllAllAll
Hardware Device InfoBachmannCs200-AllAllAll
Operating
System
BachmannCs200 FirmwareAllAllAllAll
Hardware Device InfoBachmannMc205-AllAllAll
Operating
System
BachmannMc205 FirmwareAllAllAllAll
Hardware Device InfoBachmannMc206-AllAllAll
Operating
System
BachmannMc206 FirmwareAllAllAllAll
Hardware Device InfoBachmannMc210-AllAllAll
Operating
System
BachmannMc210 FirmwareAllAllAllAll
Hardware Device InfoBachmannMc212-AllAllAll
Operating
System
BachmannMc212 FirmwareAllAllAllAll
Hardware Device InfoBachmannMc220-AllAllAll
Operating
System
BachmannMc220 FirmwareAllAllAllAll
Hardware Device InfoBachmannMe203-AllAllAll
Operating
System
BachmannMe203 FirmwareAllAllAllAll
Hardware Device InfoBachmannMh212-AllAllAll
Operating
System
BachmannMh212 FirmwareAllAllAllAll
Hardware Device InfoBachmannMh230-AllAllAll
Operating
System
BachmannMh230 FirmwareAllAllAllAll
Hardware Device InfoBachmannMp213-AllAllAll
Operating
System
BachmannMp213 FirmwareAllAllAllAll
Hardware Device InfoBachmannMp226-AllAllAll
Operating
System
BachmannMp226 FirmwareAllAllAllAll
Hardware Device InfoBachmannMpc240-AllAllAll
Operating
System
BachmannMpc240 FirmwareAllAllAllAll
Hardware Device InfoBachmannMpc265-AllAllAll
Operating
System
BachmannMpc265 FirmwareAllAllAllAll
Hardware Device InfoBachmannMpc270-AllAllAll
Operating
System
BachmannMpc270 FirmwareAllAllAllAll
Hardware Device InfoBachmannMpc293-AllAllAll
Operating
System
BachmannMpc293 FirmwareAllAllAllAll
Hardware Device InfoBachmannMpe270-AllAllAll
Operating
System
BachmannMpe270 FirmwareAllAllAllAll
Hardware Device InfoBachmannMx207-AllAllAll
Operating
System
BachmannMx207 FirmwareAllAllAllAll
Hardware Device InfoBachmannMx213-AllAllAll
Operating
System
BachmannMx213 FirmwareAllAllAllAll
Hardware Device InfoBachmannMx220-AllAllAll
Operating
System
BachmannMx220 FirmwareAllAllAllAll
  • cpe:2.3:h:bachmann:cpc210:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:bachmann:cpc210_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:bachmann:cs200:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:bachmann:cs200_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:bachmann:mc205:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:bachmann:mc205_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:bachmann:mc206:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:bachmann:mc206_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:bachmann:mc210:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:bachmann:mc210_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:bachmann:mc212:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:bachmann:mc212_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:bachmann:mc220:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:bachmann:mc220_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:bachmann:me203:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:bachmann:me203_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:bachmann:mh212:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:bachmann:mh212_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:bachmann:mh230:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:bachmann:mh230_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:bachmann:mp213:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:bachmann:mp213_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:bachmann:mp226:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:bachmann:mp226_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:bachmann:mpc240:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:bachmann:mpc240_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:bachmann:mpc265:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:bachmann:mpc265_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:bachmann:mpc270:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:bachmann:mpc270_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:bachmann:mpc293:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:bachmann:mpc293_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:bachmann:mpe270:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:bachmann:mpe270_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:bachmann:mx207:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:bachmann:mx207_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:bachmann:mx213:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:bachmann:mx213_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:bachmann:mx220:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:bachmann:mx220_firmware:*:*:*:*:*:*:*:*:

Social Mentions

Source Title Posted (UTC)
Twitter Icon @CVEreport CVE-2020-16231 : The affected Bachmann Electronic M-Base Controllers of version MSYS v1.06.14 and later use weak cr… twitter.com/i/web/status/1… 2022-05-19 18:06:38
Twitter Icon @wvdsteen New vulnerability on the NVD: CVE-2020-16231 ift.tt/2BRvlpJ May 20, 2022 at 06:15AM 2022-05-19 20:12:00
Reddit Logo Icon /r/netcve CVE-2020-16231 2022-05-19 19:39:00
© CVE.report 2023 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report