Bently Nevada ADAPT 3701/4X Series and 60M100
Bently Nevada 3701/40, 3701/44, and 3701/46 machinery protection monitors contain hardcoded credentials in firmware and an unauthenticated diagnostics port. Bently Nevada 60M100 (3701/60) has a similar issue with Ethernet Port B enabling access to port 4001/TCP for diagnostics purposes. Both product lines are vulnerable to file manipulation, remote code execution, and denial-of-service attacks via these hardcoded credentials and unauthenticated ports. The 3701/4x series can be patched to Version 4.1.1712.0601 or higher, which disables the diagnostics port and removes hardcoded credentials. The 60M100 is approaching end-of-life with no patch planned; users should avoid connecting Port B during normal operation and plan migration to replacement equipment.
- Network access to port 4001/TCP (60M100) or port used by 3701/4x diagnostics port
- No credentials required; exploits hardcoded credentials in firmware or unauthenticated diagnostics interface
- Device must be reachable from the attacker's network position
Patching may require device reboot — plan for process interruption
/api/v1/advisories/cbd5e9ca-10a7-4738-b4be-4ebbe96ecc2b