Lucene search

K
cve[email protected]CVE-2020-12017
HistoryJun 02, 2020 - 7:15 p.m.

CVE-2020-12017

2020-06-0219:15:11
CWE-306
web.nvd.nist.gov
40
cve-2020-12017
ge grid solutions
reason rt clocks
rt430
rt431
rt434
firmware
web application
unauthenticated attacks
arbitrary commands
password change
authentication bypass
nvd

9 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:P/I:P/A:C

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.9 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

62.3%

GE Grid Solutions Reason RT Clocks, RT430, RT431, and RT434, all firmware versions prior to 08A05. The device’s vulnerability in the web application could allow multiple unauthenticated attacks that could cause serious impact. The vulnerability may allow an unauthenticated attacker to execute arbitrary commands and send a request to a specific URL that could cause the device to become unresponsive. The unauthenticated attacker may change the password of the ‘configuration’ user account, allowing the attacker to modify the configuration of the device via the web interface using the new password. This vulnerability may also allow an unauthenticated attacker to bypass the authentication required to configure the device and reboot the system.

Affected configurations

NVD
Node
gert430Match-
AND
gert430_firmwareRange<08a05
Node
gert431Match-
AND
gert431_firmwareRange<08a05
Node
gert434Match-
AND
gert434_firmwareRange<08a05

CNA Affected

[
  {
    "product": "GE Grid Solutions Reason RT Clocks",
    "vendor": "n/a",
    "versions": [
      {
        "status": "affected",
        "version": "RT430, RT431, and RT434, all firmware versions prior to 08A05"
      }
    ]
  }
]

9 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:P/I:P/A:C

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.9 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

62.3%

Related for CVE-2020-12017