6.5

CVE-2020-25180

Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x includes the functionality of setting a password that is required to execute privileged commands. The password value passed to ISaGRAF Runtime is the result of encryption performed with a fixed key value using the tiny encryption algorithm (TEA) on an entered or saved password. A remote, unauthenticated attacker could pass their own encrypted password to the ISaGRAF 5 Runtime, which may result in information disclosure on the device.

Data is provided by the National Vulnerability Database (NVD)
Schneider-electricPacis Gtw Firmware Version5.1 SwPlatformwindows
   Schneider-electricPacis Gtw Version-
Schneider-electricPacis Gtw Firmware Version5.2 SwPlatformwindows
   Schneider-electricPacis Gtw Version-
Schneider-electricPacis Gtw Firmware Version6.1 SwPlatformwindows
   Schneider-electricPacis Gtw Version-
Schneider-electricPacis Gtw Firmware Version6.3 SwPlatformlinux
   Schneider-electricPacis Gtw Version-
Schneider-electricPacis Gtw Firmware Version6.3 SwPlatformwindows
   Schneider-electricPacis Gtw Version-
Schneider-electricSaitel Dp Firmware Version <= 11.06.21
   Schneider-electricSaitel Dp Version-
Schneider-electricEpas Gtw Firmware Version6.4 SwPlatformlinux
   Schneider-electricEpas Gtw Version-
Schneider-electricEpas Gtw Firmware Version6.4 SwPlatformwindows
   Schneider-electricEpas Gtw Version-
Schneider-electricSaitel Dr Firmware Version <= 11.06.12
   Schneider-electricSaitel Dr Version-
Schneider-electricScd2200 Firmware Version <= 10024
   Schneider-electricCp-3 Version-
   Schneider-electricMc-31 Version-
RockwellautomationIsagraf Free Runtime SwPlatformisagraf6_workbench Version <= 6.6.8
RockwellautomationIsagraf Runtime Version >= 5.0 < 6.0
XylemMultismart Firmware Version < 3.2.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.1% 0.289
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 6.5 2.8 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
nvd@nist.gov 4.3 8.6 2.9
AV:N/AC:M/Au:N/C:P/I:N/A:N
ics-cert@hq.dhs.gov 5.3 1.6 3.6
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
CWE-321 Use of Hard-coded Cryptographic Key

The use of a hard-coded cryptographic key significantly increases the possibility that encrypted data may be recovered.

CWE-798 Use of Hard-coded Credentials

The product contains hard-coded credentials, such as a password or cryptographic key.