7.8

CVE-2019-13524

GE PACSystems RX3i CPE100/115: All versions prior to R9.85,CPE302/305/310/330/400/410: All versions prior to R9.90,CRU/320 All versions(End of Life) may allow an attacker sending specially manipulated packets to cause the module state to change to halt-mode, resulting in a denial-of-service condition. An operator must reboot the CPU module after removing battery or energy pack to recover from halt-mode.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
EmersonRx3i Cpe100 Firmware Version < r9.85
   EmersonRx3i Cpe100 Version-
EmersonRx3i Cpe115 Firmware Version < r9.85
   EmersonRx3i Cpe115 Version-
EmersonRx3i Cpe302 Firmware Version < r9.90
   EmersonRx3i Cpe302 Version-
EmersonRx3i Cpe305 Firmware Version < r9.90
   EmersonRx3i Cpe305 Version-
EmersonRx3i Cpe310 Firmware Version < r9.90
   EmersonRx3i Cpe310 Version-
EmersonRx3i Cpe330 Firmware Version < r9.90
   EmersonRx3i Cpe330 Version-
EmersonRx3i Cpe400 Firmware Version < r9.90
   EmersonRx3i Cpe400 Version-
EmersonRx3i Cpl410 Firmware Version < r9.90
   EmersonRx3i Cpl410 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.4% 0.6
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
nvd@nist.gov 7.8 10 6.9
AV:N/AC:L/Au:N/C:N/I:N/A:C
CWE-20 Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.