6.5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:P/I:P/A:P
9.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
8.5 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
42.8%
Endress+Hauser Ecograph T (Neutral/Private Label) (RSG35, ORSG35) with Firmware version prior to V2.0.0 is prone to improper privilege management. The affected device has a web-based user interface with a role-based access system. Users with different roles have different write and read privileges. The access system is based on dynamic “tokens”. The vulnerability is that user sessions are not closed correctly and a user with fewer rights is assigned the higher rights when he logs on.
CPE | Name | Operator | Version |
---|---|---|---|
endress:rsg35_firmware | endress rsg35 firmware | lt | 2.0.0 |
[
{
"product": "RSG35 - Ecograph T",
"vendor": "Endress+Hauser",
"versions": [
{
"lessThan": "V2.0.0",
"status": "affected",
"version": "V1.0.0",
"versionType": "custom"
}
]
},
{
"product": "ORSG35 - Ecograph T Neutral/Private Label",
"vendor": "Endress+Hauser",
"versions": [
{
"lessThan": "V2.0.0",
"status": "affected",
"version": "V1.0.0",
"versionType": "custom"
}
]
}
]
6.5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:P/I:P/A:P
9.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
8.5 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
42.8%