{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-34437","assignerOrgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","state":"PUBLISHED","assignerShortName":"icscert","dateReserved":"2023-07-21T16:52:22.731Z","datePublished":"2023-10-18T23:25:25.969Z","dateUpdated":"2025-01-16T21:29:21.547Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Bently Nevada 3500 System","vendor":"Baker Hughes - Bently Nevada","versions":[{"status":"affected","version":"5.05"}]}],"credits":[{"lang":"en","type":"finder","user":"00000000-0000-4000-9000-000000000000","value":"Diego Zaffaroni of Nozomi Networks"}],"datePublic":"2023-09-26T14:53:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<span style=\"background-color: rgb(255, 255, 255);\">\n\n<span style=\"background-color: rgb(255, 255, 255);\">Baker Hughes – Bently Nevada 3500 System TDI Firmware version 5.05</span>\n\n contains&nbsp;<span style=\"background-color: rgb(255, 255, 255);\">a vulnerability in their password retrieval functionality which could allow an attacker to access passwords stored on the device.</span></span>"}],"value":"Baker Hughes – Bently Nevada 3500 System TDI Firmware version 5.05\n\n contains a vulnerability in their password retrieval functionality which could allow an attacker to access passwords stored on the device."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-732","description":"CWE-732 Incorrect Permission Assignment for Critical Resource","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","shortName":"icscert","dateUpdated":"2024-11-13T17:00:35.343Z"},"references":[{"url":"https://www.cisa.gov/news-events/ics-advisories/icsa-23-269-05"}],"source":{"advisory":"ICSA-23-269-05","discovery":"EXTERNAL"},"title":"Baker Hughes Bently Nevada 3500 System  Incorrect Permission Assignment for Critical Resource","workarounds":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Baker Hughes – Bently Nevada recommends that users follow their \nhardening guidelines to reduce the risk of exploitation. Customers who \nhave registered for access to Baker Hughes DAM may directly access the \nhardening guideline at <a target=\"_blank\" rel=\"nofollow\" href=\"https://dam.bakerhughes.com/media/?mediaId=32F7FC2F-9F22-4C69-BB847565B7834D08\">https://dam.bakerhughes.com/media/?mediaId=32F7FC2F-9F22-4C69-BB847565B7834D08</a><span style=\"background-color: var(--wht);\">.</span><p>For customers that do not have access to Baker Hughes DAM may send an email to <a target=\"_blank\" rel=\"nofollow\">bentlysupport@bakerhughes.com</a><span style=\"background-color: var(--wht);\">&nbsp;to request document 106M9733.</span></p>"}],"value":"Baker Hughes – Bently Nevada recommends that users follow their \nhardening guidelines to reduce the risk of exploitation. Customers who \nhave registered for access to Baker Hughes DAM may directly access the \nhardening guideline at  https://dam.bakerhughes.com/media/?mediaId=32F7FC2F-9F22-4C69-BB847565B7834D08 .For customers that do not have access to Baker Hughes DAM may send an email to bentlysupport@bakerhughes.com to request document 106M9733."}],"x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T16:10:07.079Z"},"title":"CVE Program Container","references":[{"url":"https://www.cisa.gov/news-events/ics-advisories/icsa-23-269-05","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-01-16T21:20:45.523486Z","id":"CVE-2023-34437","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-01-16T21:29:21.547Z"}}]}}