The affected Bachmann Electronic M-Base Controllers of version MSYS v1.06.14 and later use weak cryptography to protect device passwords. Affected controllers that are actively supported include MX207, MX213, MX220, MC206, MC212, MC220, and MH230 hardware controllers, and affected end-of-life controller include MC205, MC210, MH212, ME203, CS200, MP213, MP226, MPC240, MPC265, MPC270, MPC293, MPE270, and CPC210 hardware controllers. Security Level 0 is set at default from the manufacturer, which could allow an unauthenticated remote attacker to gain access to the password hashes. Security Level 4 is susceptible if an authenticated remote attacker or an unauthenticated person with physical access to the device reads and decrypts the password to conduct further attacks.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Bachmann
Subscribe
|
Cpc210
Subscribe
Cpc210 Firmware
Subscribe
Cs200
Subscribe
Cs200 Firmware
Subscribe
Mc205
Subscribe
Mc205 Firmware
Subscribe
Mc206
Subscribe
Mc206 Firmware
Subscribe
Mc210
Subscribe
Mc210 Firmware
Subscribe
Mc212
Subscribe
Mc212 Firmware
Subscribe
Mc220
Subscribe
Mc220 Firmware
Subscribe
Me203
Subscribe
Me203 Firmware
Subscribe
Mh212
Subscribe
Mh212 Firmware
Subscribe
Mh230
Subscribe
Mh230 Firmware
Subscribe
Mp213
Subscribe
Mp213 Firmware
Subscribe
Mp226
Subscribe
Mp226 Firmware
Subscribe
Mpc240
Subscribe
Mpc240 Firmware
Subscribe
Mpc265
Subscribe
Mpc265 Firmware
Subscribe
Mpc270
Subscribe
Mpc270 Firmware
Subscribe
Mpc293
Subscribe
Mpc293 Firmware
Subscribe
Mpe270
Subscribe
Mpe270 Firmware
Subscribe
Mx207
Subscribe
Mx207 Firmware
Subscribe
Mx213
Subscribe
Mx213 Firmware
Subscribe
Mx220
Subscribe
Mx220 Firmware
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-8197 | The affected Bachmann Electronic M-Base Controllers of version MSYS v1.06.14 and later use weak cryptography to protect device passwords. Affected controllers that are actively supported include MX207, MX213, MX220, MC206, MC212, MC220, and MH230 hardware controllers, and affected end-of-life controller include MC205, MC210, MH212, ME203, CS200, MP213, MP226, MPC240, MPC265, MPC270, MPC293, MPE270, and CPC210 hardware controllers. Security Level 0 is set at default from the manufacturer, which could allow an unauthenticated remote attacker to gain access to the password hashes. Security Level 4 is susceptible if an authenticated remote attacker or an unauthenticated person with physical access to the device reads and decrypts the password to conduct further attacks. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://www.cisa.gov/uscert/ics/advisories/icsa-21-026-02 |
|
History
Wed, 16 Apr 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-04-16T17:54:00.512Z
Reserved: 2020-07-31T00:00:00.000Z
Link: CVE-2020-16231
Updated: 2024-08-04T13:37:54.211Z
Status : Modified
Published: 2022-05-19T18:15:08.487
Modified: 2024-11-21T05:06:59.240
Link: CVE-2020-16231
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD