6.5
CVE-2020-25180
- EPSS 0.1%
- Published 18.03.2022 18:15:09
- Last modified 21.11.2024 05:17:34
- Source ics-cert@hq.dhs.gov
- Teams watchlist Login
- Open Login
Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x includes the functionality of setting a password that is required to execute privileged commands. The password value passed to ISaGRAF Runtime is the result of encryption performed with a fixed key value using the tiny encryption algorithm (TEA) on an entered or saved password. A remote, unauthenticated attacker could pass their own encrypted password to the ISaGRAF 5 Runtime, which may result in information disclosure on the device.
Data is provided by the National Vulnerability Database (NVD)
Schneider-electric ≫ Easergy T300 Firmware Version <= 2.7.1
Schneider-electric ≫ Easergy C5 Firmware Version < 1.1.0
Schneider-electric ≫ Micom C264 Firmware Version < d6.1
Schneider-electric ≫ Pacis Gtw Firmware Version5.1 SwPlatformwindows
Schneider-electric ≫ Pacis Gtw Firmware Version5.2 SwPlatformwindows
Schneider-electric ≫ Pacis Gtw Firmware Version6.1 SwPlatformwindows
Schneider-electric ≫ Pacis Gtw Firmware Version6.3 SwPlatformlinux
Schneider-electric ≫ Pacis Gtw Firmware Version6.3 SwPlatformwindows
Schneider-electric ≫ Saitel Dp Firmware Version <= 11.06.21
Schneider-electric ≫ Epas Gtw Firmware Version6.4 SwPlatformlinux
Schneider-electric ≫ Epas Gtw Firmware Version6.4 SwPlatformwindows
Schneider-electric ≫ Saitel Dr Firmware Version <= 11.06.12
Schneider-electric ≫ Scd2200 Firmware Version <= 10024
Rockwellautomation ≫ Aadvance Controller Version <= 1.40
Rockwellautomation ≫ Isagraf Free Runtime SwPlatformisagraf6_workbench Version <= 6.6.8
Rockwellautomation ≫ Isagraf Runtime Version >= 5.0 < 6.0
Rockwellautomation ≫ Micro810 Firmware Version-
Rockwellautomation ≫ Micro820 Firmware Version-
Rockwellautomation ≫ Micro830 Firmware Version-
Rockwellautomation ≫ Micro850 Firmware Version-
Rockwellautomation ≫ Micro870 Firmware Version-
Xylem ≫ Multismart Firmware Version < 3.2.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.1% | 0.289 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 6.5 | 2.8 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
|
nvd@nist.gov | 4.3 | 8.6 | 2.9 |
AV:N/AC:M/Au:N/C:P/I:N/A:N
|
ics-cert@hq.dhs.gov | 5.3 | 1.6 | 3.6 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
|
CWE-321 Use of Hard-coded Cryptographic Key
The use of a hard-coded cryptographic key significantly increases the possibility that encrypted data may be recovered.
CWE-798 Use of Hard-coded Credentials
The product contains hard-coded credentials, such as a password or cryptographic key.