Skip to main content

CVE-2022-3010: CWE-1391 Use of Weak Credentials in Priva TopControl Suite - Bacnet

High
VulnerabilityCVE-2022-3010cvecve-2022-3010cwe-1391
Published: Tue Jan 02 2024 (01/02/2024, 18:32:22 UTC)
Source: CVE Database V5
Vendor/Project: Priva
Product: TopControl Suite - Bacnet

Description

The Priva TopControl Suite contains predictable credentials for the SSH service, based on the Serial number. Which makes it possible for an attacker to calculate the login credentials for the Priva TopControll suite.

AI-Powered Analysis

AILast updated: 07/04/2025, 07:11:54 UTC

Technical Analysis

CVE-2022-3010 is a high-severity vulnerability affecting the Priva TopControl Suite - Bacnet, specifically all versions prior to 8.7.8.0. The vulnerability arises from the use of predictable SSH credentials that are derived from the device's serial number. This weak credential scheme allows an attacker to calculate or guess the SSH login credentials without any prior authentication or user interaction. The vulnerability is classified under CWE-1391, which pertains to the use of weak or predictable credentials. The CVSS 3.1 base score of 7.5 reflects the network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality (C:H) but no impact on integrity or availability (I:N/A:N). Exploiting this vulnerability would enable an attacker to gain unauthorized SSH access to the TopControl Suite, potentially exposing sensitive configuration data or enabling further lateral movement within the network. Although no known exploits are currently reported in the wild, the ease of exploitation and the critical nature of the affected systems make this a significant security concern. The Priva TopControl Suite is used for building management and automation, often controlling HVAC and other critical infrastructure systems via the BACnet protocol, making unauthorized access potentially impactful on operational technology environments.

Potential Impact

For European organizations, this vulnerability poses a significant risk, particularly for those in sectors relying on building automation and critical infrastructure management, such as commercial real estate, healthcare, education, and government facilities. Unauthorized SSH access could lead to exposure of sensitive operational data, unauthorized changes to building control systems, or serve as a foothold for further attacks within the network. Given the high confidentiality impact, attackers could harvest credentials or system configurations, potentially leading to espionage or sabotage. The lack of required privileges or user interaction lowers the barrier for exploitation, increasing the threat level. Disruption or manipulation of building management systems could also indirectly affect availability of services or safety systems, although the vulnerability itself does not directly impact integrity or availability. European organizations with extensive deployments of Priva TopControl Suite are at risk of targeted attacks, especially in environments where network segmentation and monitoring are insufficient.

Mitigation Recommendations

Organizations should prioritize upgrading the Priva TopControl Suite to version 8.7.8.0 or later, where this vulnerability is presumably addressed. Until patching is possible, network-level mitigations should be implemented, including isolating the TopControl Suite devices on dedicated VLANs with strict access controls and firewall rules to limit SSH access only to trusted administrators. Employ network monitoring and anomaly detection to identify unauthorized SSH login attempts or unusual access patterns. If possible, disable SSH access or change default credentials to strong, unique passwords that do not derive from predictable information such as serial numbers. Implement multi-factor authentication for administrative access where supported. Conduct regular audits of device credentials and access logs. Additionally, organizations should review and enhance their asset inventory to identify all affected devices and ensure timely remediation. Vendor engagement for further guidance and monitoring for any emerging exploits is also recommended.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
DIVD
Date Reserved
2022-08-26T14:53:53.087Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683f0dc1182aa0cae27ff2db

Added to database: 6/3/2025, 2:59:13 PM

Last enriched: 7/4/2025, 7:11:54 AM

Last updated: 7/27/2025, 12:37:08 AM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats