Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2020-12017

Опубликовано: 02 июн. 2020
Источник: nvd
CVSS3: 9.8
CVSS2: 9
EPSS Низкий

Описание

GE Grid Solutions Reason RT Clocks, RT430, RT431, and RT434, all firmware versions prior to 08A05. The device’s vulnerability in the web application could allow multiple unauthenticated attacks that could cause serious impact. The vulnerability may allow an unauthenticated attacker to execute arbitrary commands and send a request to a specific URL that could cause the device to become unresponsive. The unauthenticated attacker may change the password of the 'configuration' user account, allowing the attacker to modify the configuration of the device via the web interface using the new password. This vulnerability may also allow an unauthenticated attacker to bypass the authentication required to configure the device and reboot the system.

Ссылки

Уязвимые конфигурации

Конфигурация 1

Одновременно

cpe:2.3:o:ge:rt430_firmware:*:*:*:*:*:*:*:*
Версия до 08a05 (исключая)
cpe:2.3:h:ge:rt430:-:*:*:*:*:*:*:*
Конфигурация 2

Одновременно

cpe:2.3:o:ge:rt431_firmware:*:*:*:*:*:*:*:*
Версия до 08a05 (исключая)
cpe:2.3:h:ge:rt431:-:*:*:*:*:*:*:*
Конфигурация 3

Одновременно

cpe:2.3:o:ge:rt434_firmware:*:*:*:*:*:*:*:*
Версия до 08a05 (исключая)
cpe:2.3:h:ge:rt434:-:*:*:*:*:*:*:*

EPSS

Процентиль: 70%
0.00653
Низкий

9.8 Critical

CVSS3

9 Critical

CVSS2

Дефекты

CWE-306
CWE-306

Связанные уязвимости

github
больше 3 лет назад

GE Grid Solutions Reason RT Clocks, RT430, RT431, and RT434, all firmware versions prior to 08A05. The device’s vulnerability in the web application could allow multiple unauthenticated attacks that could cause serious impact. The vulnerability may allow an unauthenticated attacker to execute arbitrary commands and send a request to a specific URL that could cause the device to become unresponsive. The unauthenticated attacker may change the password of the 'configuration' user account, allowing the attacker to modify the configuration of the device via the web interface using the new password. This vulnerability may also allow an unauthenticated attacker to bypass the authentication required to configure the device and reboot the system.

EPSS

Процентиль: 70%
0.00653
Низкий

9.8 Critical

CVSS3

9 Critical

CVSS2

Дефекты

CWE-306
CWE-306