4 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:S/C:P/I:N/A:N
6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
6.3 Medium
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
28.4%
Endress+Hauser Ecograph T (Neutral/Private Label) (RSG35, ORSG35) and Memograph M (Neutral/Private Label) (RSG45, ORSG45) with Firmware version V2.0.0 and above is prone to exposure of sensitive information to an unauthorized actor. The firmware release has a dynamic token for each request submitted to the server, which makes repeating requests and analysis complex enough. Nevertheless, it’s possible and during the analysis it was discovered that it also has an issue with the access-control matrix on the server-side. It was found that a user with low rights can get information from endpoints that should not be available to this user.
CPE | Name | Operator | Version |
---|---|---|---|
endress:rsg35_firmware | endress rsg35 firmware | lt | 2.0.0 |
[
{
"product": "RSG35 - Ecograph T",
"vendor": "Endress+Hauser",
"versions": [
{
"lessThan": "*",
"status": "affected",
"version": "V2.0.0",
"versionType": "custom"
}
]
},
{
"product": "ORSG35 - Ecograph T Neutral/Private Label",
"vendor": "Endress+Hauser",
"versions": [
{
"lessThan": "*",
"status": "affected",
"version": "V2.0.0",
"versionType": "custom"
}
]
},
{
"product": "RSG45 - Memograph M",
"vendor": "Endress+Hauser",
"versions": [
{
"lessThan": "*",
"status": "affected",
"version": "V2.0.0",
"versionType": "custom"
}
]
},
{
"product": "ORSG45 - Memograph M Neutral/Private Label",
"vendor": "Endress+Hauser",
"versions": [
{
"lessThan": "*",
"status": "affected",
"version": "V2.0.0",
"versionType": "custom"
}
]
}
]
4 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:S/C:P/I:N/A:N
6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
6.3 Medium
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
28.4%