CVE-2018-11691

9.8 CRITICAL

📋 TL;DR

This vulnerability in Emerson DeltaV Smart Switch Command Center prevents changing management passwords on DeltaV Smart Switches after commissioning, leaving them with default credentials. Affected systems include DeltaV versions 11.3.x and 12.3.1. The vulnerability allows attackers to gain unauthorized access to industrial network switches.

💻 Affected Systems

Products:
  • Emerson DeltaV Smart Switch Command Center
Versions: 11.3.x and 12.3.1
Operating Systems: Windows (DeltaV workstation OS)
Default Config Vulnerable: ⚠️ Yes
Notes: DeltaV versions 13.3+ use Network Device Command Center which is not affected. The vulnerability only exists during/after commissioning when password changes fail.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain persistent access to industrial control network switches, enabling network manipulation, traffic interception, or disruption of industrial processes.

🟠

Likely Case

Unauthorized users access switch management interfaces using default credentials, potentially reconfiguring network settings or monitoring traffic.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the management network segment only.

🌐 Internet-Facing: LOW (Industrial control systems should not be internet-facing)
🏢 Internal Only: HIGH (Default credentials persist on internal network devices)

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires network access to switch management interface and knowledge of default credentials. No authentication bypass needed since default credentials remain active.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Patches available for DeltaV workstations (specific versions not specified)

Vendor Advisory: Refer to DeltaV Security Notification DSN19003 (KBA NK-1900-0808)

Restart Required: Yes

Instructions:

1. Download patches from Emerson Guardian Support Portal. 2. Apply patches to DeltaV workstations. 3. Either commission DeltaV Smart Switches or change passwords using the tool. 4. Restart affected systems.

🔧 Temporary Workarounds

Manual Password Reset

all

Manually change DeltaV Smart Switch management passwords using alternative methods

Network Segmentation

all

Isolate DeltaV Smart Switch management interfaces from general network access

🧯 If You Can't Patch

  • Implement strict network access controls to limit access to switch management interfaces
  • Manually verify and change all DeltaV Smart Switch passwords using console or alternative management methods

🔍 How to Verify

Check if Vulnerable:

Check if DeltaV Smart Switch Command Center version is 11.3.x or 12.3.1 and test if password changes persist after commissioning

Check Version:

Check DeltaV workstation software version through Emerson DeltaV interface or system properties

Verify Fix Applied:

Verify patch installation and test that password changes now work correctly in the Smart Switch Command Center

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts to switch management interfaces
  • Successful logins with default credentials
  • Configuration changes to network switches

Network Indicators:

  • Unexpected traffic to switch management ports (typically 22, 23, 80, 443)
  • Traffic patterns indicating switch configuration changes

SIEM Query:

source="network_switches" AND (event_type="authentication" AND (username="default" OR username="admin")) OR (event_type="configuration_change")

🔗 References

📤 Share & Export