CVE-2023-34437

7.5 HIGH

📋 TL;DR

This vulnerability in Baker Hughes Bently Nevada 3500 System TDI firmware allows attackers to retrieve stored passwords from the device. Affected systems are industrial control systems running vulnerable firmware versions, potentially compromising critical infrastructure security.

💻 Affected Systems

Products:
  • Baker Hughes Bently Nevada 3500 System TDI
Versions: Firmware version 5.05
Operating Systems: Embedded/Proprietary
Default Config Vulnerable: ⚠️ Yes
Notes: Industrial control system used in critical infrastructure sectors including energy, manufacturing, and utilities.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of industrial control systems, unauthorized access to critical infrastructure, potential physical damage to equipment, and disruption of industrial processes.

🟠

Likely Case

Unauthorized access to system configuration, potential manipulation of monitoring systems, and theft of sensitive operational data.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent attackers from reaching vulnerable systems.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Vulnerability involves password retrieval functionality, suggesting relatively straightforward exploitation once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in advisory - contact vendor for updated firmware

Vendor Advisory: https://www.cisa.gov/news-events/ics-advisories/icsa-23-269-05

Restart Required: Yes

Instructions:

1. Contact Baker Hughes for updated firmware. 2. Schedule maintenance window. 3. Backup current configuration. 4. Apply firmware update following vendor instructions. 5. Verify system functionality.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate vulnerable systems from untrusted networks and implement strict access controls.

Access Control Hardening

all

Implement strong authentication mechanisms and limit administrative access to essential personnel only.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate vulnerable systems
  • Monitor for unauthorized access attempts and implement compensating controls

🔍 How to Verify

Check if Vulnerable:

Check firmware version on Bently Nevada 3500 System TDI devices via system interface or management console.

Check Version:

Check via device management interface or consult system documentation for version verification procedure.

Verify Fix Applied:

Verify firmware version has been updated to vendor-recommended version and test password retrieval functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to password retrieval functions
  • Multiple failed authentication attempts followed by successful access

Network Indicators:

  • Unusual network traffic to/from industrial control systems
  • Access from unauthorized IP addresses to management interfaces

SIEM Query:

source="industrial_control_system" AND (event_type="authentication" OR event_type="password_retrieval") AND result="success"

🔗 References

📤 Share & Export