Lucene search

K
cve[email protected]CVE-2020-12495
HistoryNov 19, 2020 - 6:15 p.m.

CVE-2020-12495

2020-11-1918:15:13
CWE-269
web.nvd.nist.gov
14
cve
2020
12495
endress+hauser
ecograph t
firmware
privilege
management
vulnerability
web-based
interface
role-based
access system
user sessions
nvd

6.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H

8.5 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

42.8%

Endress+Hauser Ecograph T (Neutral/Private Label) (RSG35, ORSG35) with Firmware version prior to V2.0.0 is prone to improper privilege management. The affected device has a web-based user interface with a role-based access system. Users with different roles have different write and read privileges. The access system is based on dynamic “tokens”. The vulnerability is that user sessions are not closed correctly and a user with fewer rights is assigned the higher rights when he logs on.

Affected configurations

NVD
Node
endressrsg35Match-
AND
endressrsg35_firmwareRange<2.0.0
Node
endressrsg45Match-
AND
endressrsg45_firmwareRange<2.0.0
Node
endressorsg35Match-
AND
endressorsg35_firmwareRange<2.0.0
Node
endressorsg45Match-
AND
endressorsg45_firmwareRange<2.0.0

CNA Affected

[
  {
    "product": "RSG35 - Ecograph T",
    "vendor": "Endress+Hauser",
    "versions": [
      {
        "lessThan": "V2.0.0",
        "status": "affected",
        "version": "V1.0.0",
        "versionType": "custom"
      }
    ]
  },
  {
    "product": "ORSG35 - Ecograph T Neutral/Private Label",
    "vendor": "Endress+Hauser",
    "versions": [
      {
        "lessThan": "V2.0.0",
        "status": "affected",
        "version": "V1.0.0",
        "versionType": "custom"
      }
    ]
  }
]

6.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H

8.5 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

42.8%

Related for CVE-2020-12495