{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-36857","assignerOrgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","state":"PUBLISHED","assignerShortName":"icscert","dateReserved":"2023-07-21T16:52:22.735Z","datePublished":"2023-10-18T23:27:31.794Z","dateUpdated":"2025-01-16T21:29:13.101Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Bently Nevada 3500 System","vendor":"Baker Hughes - Bently Nevada","versions":[{"status":"affected","version":"5.05"}]}],"credits":[{"lang":"en","type":"finder","user":"00000000-0000-4000-9000-000000000000","value":"Diego Zaffaroni of Nozomi Networks"}],"datePublic":"2023-09-26T14:53:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"\n\n<span style=\"background-color: rgb(255, 255, 255);\">\n\n<span style=\"background-color: rgb(255, 255, 255);\">Baker Hughes – Bently Nevada 3500 System TDI Firmware version 5.05</span>\n\n contains&nbsp;<span style=\"background-color: rgb(255, 255, 255);\">a replay vulnerability which could allow an attacker to \n\n<span style=\"background-color: rgb(255, 255, 255);\">\n\n<span style=\"background-color: rgb(255, 255, 255);\">replay older captured packets of traffic to the device to gain access.</span>\n\n</span>\n\n</span></span>"}],"value":"\n\n\nBaker Hughes – Bently Nevada 3500 System TDI Firmware version 5.05\n\n contains a replay vulnerability which could allow an attacker to \n\n\n\nreplay older captured packets of traffic to the device to gain access.\n\n\n\n"}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"ADJACENT_NETWORK","availabilityImpact":"NONE","baseScore":5.4,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-294","description":"CWE-294 Authentication Bypass by Capture-replay","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","shortName":"icscert","dateUpdated":"2023-10-18T23:27:31.794Z"},"references":[{"url":"https://www.cisa.gov/news-events/ics-advisories/icsa-23-269-05"}],"source":{"advisory":"ICSA-23-269-05","discovery":"EXTERNAL"},"title":"Baker Hughes Bently Nevada 3500 System Authentication Bypass by Capture-replay","workarounds":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"\nBaker Hughes – Bently Nevada recommends that users follow their \nhardening guidelines to reduce the risk of exploitation. Customers who \nhave registered for access to Baker Hughes DAM may directly access the \nhardening guideline at <a target=\"_blank\" rel=\"nofollow\" href=\"https://dam.bakerhughes.com/media/?mediaId=32F7FC2F-9F22-4C69-BB847565B7834D08\">https://dam.bakerhughes.com/media/?mediaId=32F7FC2F-9F22-4C69-BB847565B7834D08</a><span style=\"background-color: var(--wht);\">.</span><p>For customers that do not have access to Baker Hughes DAM may send an email to <a target=\"_blank\" rel=\"nofollow\">bentlysupport@bakerhughes.com</a><span style=\"background-color: var(--wht);\">&nbsp;to request document 106M9733.</span></p>"}],"value":"Baker Hughes – Bently Nevada recommends that users follow their \nhardening guidelines to reduce the risk of exploitation. Customers who \nhave registered for access to Baker Hughes DAM may directly access the \nhardening guideline at  https://dam.bakerhughes.com/media/?mediaId=32F7FC2F-9F22-4C69-BB847565B7834D08 https://dam.bakerhughes.com/media/ .For customers that do not have access to Baker Hughes DAM may send an email to bentlysupport@bakerhughes.com to request document 106M9733.\n\n"}],"x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T17:01:09.636Z"},"title":"CVE Program Container","references":[{"url":"https://www.cisa.gov/news-events/ics-advisories/icsa-23-269-05","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-01-16T21:18:59.973503Z","id":"CVE-2023-36857","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-01-16T21:29:13.101Z"}}]}}