All Bachmann M1 System Processor Modules Use of Password Hash with Insufficient Computational Effort (CVE-2020-16231)

high Tenable OT Security Plugin ID 500654


The remote OT asset is affected by a vulnerability.


The affected Bachmann Electronic M-Base Controllers of version MSYS v1.06.14 and later use weak cryptography to protect device passwords.
Affected controllers that are actively supported include MX207, MX213, MX220, MC206, MC212, MC220, and MH230 hardware controllers, and affected end-of-life controller include MC205, MC210, MH212, ME203, CS200, MP213, MP226, MPC240, MPC265, MPC270, MPC293, MPE270, and CPC210 hardware controllers. Security Level 0 is set at default from the manufacturer, which could allow an unauthenticated remote attacker to gain access to the password hashes. Security Level 4 is susceptible if an authenticated remote attacker or an unauthenticated person with physical access to the device reads and decrypts the password to conduct further attacks.

This plugin only works with Tenable.ot.
Please visit for more information.


The following text was originally created by the Cybersecurity and Infrastructure Security Agency (CISA). The original can be found at

Bachmann recommends its direct users and original equipment manufacturers (OEM) update to Version 4.49-P1, which is available under item number 00036634-90. To obtain Version 3.95R-P8 the end user is required to contact their key account manager or technical support agent at Bachmann. Asset owners should contact their OEM or reseller for patches.
Bachmann does not provide support directly to asset owners. Please refer to the Bachmann Customer Information Note for more details. The password “_pC5#3fS@Y8s” is required to access.

If asset owners are unable to update to the latest version or a patch is not available from the OEM or reseller, Bachmann recommends the following mitigations to be put in place:

- Update the default username and password in the default Bachmann login handler for field operations.
- Direct users or OEMs may utilize their own login handler (e.g., LDAP, Radius, etc.) to circumvent the default authentication handler. Security Level 4 is still recommended for field operations.
- Restrict physical access to the device to authorized personnel only.

Default Security Level 0 within Bachmann controllers is inherently insecure and should not be used in field operations.
Security Levels 1, 2, and 3 are also not recommended for field operations. The use of Telnet, FTP, and Console access during field operations may result in the exploitation of inherent vulnerabilities such as unauthenticated access or exposure of sensitive information. Bachmann strongly recommends users apply Security Level 4, where communication with the device is limited to TLS protected services and all insecure services are disabled.

See Also

Plugin Details

Severity: High

ID: 500654

Version: 1.10

Type: remote

Family: Tenable.ot

Published: 6/14/2022

Updated: 3/4/2024

Supported Sensors: Tenable OT Security

Risk Information


Risk Factor: Medium

Score: 5.9


Risk Factor: Medium

Base Score: 6.5

Temporal Score: 4.8

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P

CVSS Score Source: CVE-2020-16231


Risk Factor: High

Base Score: 8.8

Temporal Score: 7.7

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:bachmann:cpc210_firmware, cpe:/o:bachmann:cs200_firmware, cpe:/o:bachmann:mc205_firmware, cpe:/o:bachmann:mc206_firmware, cpe:/o:bachmann:mc210_firmware, cpe:/o:bachmann:mc212_firmware, cpe:/o:bachmann:mc220_firmware, cpe:/o:bachmann:me203_firmware, cpe:/o:bachmann:mh212_firmware, cpe:/o:bachmann:mh230_firmware, cpe:/o:bachmann:mp213_firmware, cpe:/o:bachmann:mp226_firmware, cpe:/o:bachmann:mpc240_firmware, cpe:/o:bachmann:mpc265_firmware, cpe:/o:bachmann:mpc270_firmware, cpe:/o:bachmann:mpc293_firmware, cpe:/o:bachmann:mpe270_firmware, cpe:/o:bachmann:mx207_firmware, cpe:/o:bachmann:mx213_firmware, cpe:/o:bachmann:mx220_firmware

Required KB Items: Tenable.ot/Bachmann

Exploit Ease: No known exploits are available

Patch Publication Date: 5/19/2022

Vulnerability Publication Date: 5/19/2022

Reference Information

CVE: CVE-2020-16231

CWE: 916