Emerson DeltaV Distributed Control System
A vulnerability in Emerson DeltaV Smart Switch authentication allows an attacker with high-level administrative or engineering credentials on the DeltaV network to gain unauthorized administrative access to the switches. The vulnerability is rooted in insecure credential handling (CWE-798). Exploitation requires local or adjacent network access and cannot be performed remotely. Successful exploitation could allow an attacker to modify process control logic, alter setpoints, or disrupt normal operations of the DeltaV DCS. Affected versions include DeltaV DCS 11.3.x and 12.3.x.
- High-privilege user credentials (engineering or administrator account) on the DeltaV system
- Network access to the DeltaV control network where Smart Switches are connected
- Local or adjacent network position; not remotely exploitable from the Internet
Patching may require device reboot — plan for process interruption
/api/v1/advisories/910adf36-880e-4157-b0c5-2fb07bcfa2a4Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.