Emerson OpenBSI
Emerson OpenBSI versions 5.9 SP3 and earlier contain two critical vulnerabilities: (1) CVE-2022-29959 - the User Management Tool uses weak or no credential validation, allowing unauthorized access to RTU credentials; and (2) CVE-2022-29960 - system credentials, engineering files, and utilities are protected with hardcoded DES encryption keys, allowing credential recovery. Both vulnerabilities can lead to remote code execution, controller configuration changes, or denial-of-service on RTU devices controlling critical infrastructure. No vendor patch is available; Emerson has discontinued support for OpenBSI and recommends removing the vulnerable User Management Tool utility.
- Network access to OpenBSI interface (HTTP/HTTPS port, typically 80 or 443)
- No valid credentials required if device is exposed to internet or untrusted network
- Device running vulnerable OpenBSI version 5.9 SP3 or earlier
Patching may require device reboot — plan for process interruption
/api/v1/advisories/e5b259b3-f5c7-451e-ba1e-099eb86bfad7Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.