The Bently Nevada 3700 series of condition monitoring equipment through 2022-04-29 has a maintenance interface on port 4001/TCP with undocumented, hardcoded credentials. An attacker capable of connecting to this interface can thus trivially take over its functionality.
Threat-Mapped Scoring
Score: 0.0
Priority: Unclassified
EPSS
Score: 0.00097Percentile:
0.28025
CVSS Scoring
CVSS v3.1 Score: 9.8
Severity: CRITICAL
Mapped CWE(s)
CWE-798
: Use of Hard-coded Credentials
All CAPEC(s)
CAPEC-191 : Read Sensitive Constants Within an Executable
CAPEC-70 : Try Common or Default Usernames and Passwords
CAPEC(s) with Mapped TTPs
CAPEC-191 : Read Sensitive Constants Within an Executable
Mapped TTPs:
CAPEC-70 : Try Common or Default Usernames and Passwords
Mapped TTPs:
Mapped ATT&CK TTPs
T1552.001
: Credentials In Files
Kill Chain: credential-access
T1078.001
: Default Accounts
Kill Chain: defense-evasion
Malware
APTs Threat Group Associations
Campaigns
Leviathan Australian Intrusions
HomeLand Justice
Affected Products
cpe:2.3:o:bakerhughes:bently_nevada_3701\/40_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:bakerhughes:bently_nevada_3701\/44_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:bakerhughes:bently_nevada_3701\/46_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:bakerhughes:bently_nevada_60m100_firmware:-:*:*:*:*:*:*:*
← Back to Home
BrownCoat Threat Intelligence Platform | 2025 Steve Gray — You Can’t Take the Sky from Me