{"api_version":"1","generated_at":"2026-04-23T09:06:01+00:00","cve":"CVE-2022-29960","urls":{"html":"https://cve.report/CVE-2022-29960","api":"https://cve.report/api/cve/CVE-2022-29960.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-29960","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-29960"},"summary":{"title":"CVE-2022-29960","description":"Emerson OpenBSI through 2022-04-29 uses weak cryptography. It is an engineering environment for the ControlWave and Bristol Babcock line of RTUs. DES with hardcoded cryptographic keys is used for protection of certain system credentials, engineering files, and sensitive utilities.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2022-07-26 22:15:00","updated_at":"2022-08-16 17:55:00"},"problem_types":["CWE-327"],"metrics":[],"references":[{"url":"https://www.cisa.gov/uscert/ics/advisories/icsa-22-221-03","name":"https://www.cisa.gov/uscert/ics/advisories/icsa-22-221-03","refsource":"MISC","tags":[],"title":"Emerson OpenBSI | CISA","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cisa.gov/uscert/ics/advisories/icsa-22-181-03","name":"https://www.cisa.gov/uscert/ics/advisories/icsa-22-181-03","refsource":"MISC","tags":[],"title":"Emerson DeltaV Distributed Control System | CISA","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.forescout.com/blog/","name":"https://www.forescout.com/blog/","refsource":"MISC","tags":[],"title":"Blog - Forescout","mime":"text/html","httpstatus":"403","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-29960","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-29960","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"29960","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"emerson","cpe5":"openbsi","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"29960","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"emerson","cpe5":"openbsi","cpe6":"5.9","cpe7":"-","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"29960","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"emerson","cpe5":"openbsi","cpe6":"5.9","cpe7":"sp1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"29960","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"emerson","cpe5":"openbsi","cpe6":"5.9","cpe7":"sp2","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"29960","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"emerson","cpe5":"openbsi","cpe6":"5.9","cpe7":"sp3","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"29960","vulnerable":"1","versionEndIncluding":"2022-04-29","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"emerson","cpe5":"openbsi","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2022-29960","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Emerson OpenBSI through 2022-04-29 uses weak cryptography. It is an engineering environment for the ControlWave and Bristol Babcock line of RTUs. DES with hardcoded cryptographic keys is used for protection of certain system credentials, engineering files, and sensitive utilities."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"url":"https://www.forescout.com/blog/","refsource":"MISC","name":"https://www.forescout.com/blog/"},{"refsource":"MISC","name":"https://www.cisa.gov/uscert/ics/advisories/icsa-22-181-03","url":"https://www.cisa.gov/uscert/ics/advisories/icsa-22-181-03"},{"refsource":"MISC","name":"https://www.cisa.gov/uscert/ics/advisories/icsa-22-221-03","url":"https://www.cisa.gov/uscert/ics/advisories/icsa-22-221-03"}]}},"nvd":{"publishedDate":"2022-07-26 22:15:00","lastModifiedDate":"2022-08-16 17:55:00","problem_types":["CWE-327"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":5.5,"baseSeverity":"MEDIUM"},"exploitabilityScore":1.8,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:emerson:openbsi:5.9:sp1:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:emerson:openbsi:5.9:sp2:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:emerson:openbsi:5.9:sp3:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:emerson:openbsi:5.9:-:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:emerson:openbsi:*:*:*:*:*:*:*:*","versionEndExcluding":"5.9","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}