Lucene search

K
cve[email protected]CVE-2020-12496
HistoryNov 19, 2020 - 6:15 p.m.

CVE-2020-12496

2020-11-1918:15:13
CWE-200
web.nvd.nist.gov
15
cve-2020-12496
endress+hauser
ecograph t
memograph m
firmware vulnerability
access control
information exposure
nvd

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

6.3 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

28.4%

Endress+Hauser Ecograph T (Neutral/Private Label) (RSG35, ORSG35) and Memograph M (Neutral/Private Label) (RSG45, ORSG45) with Firmware version V2.0.0 and above is prone to exposure of sensitive information to an unauthorized actor. The firmware release has a dynamic token for each request submitted to the server, which makes repeating requests and analysis complex enough. Nevertheless, it’s possible and during the analysis it was discovered that it also has an issue with the access-control matrix on the server-side. It was found that a user with low rights can get information from endpoints that should not be available to this user.

Affected configurations

NVD
Node
endressrsg35_firmwareRange<2.0.0
AND
endressrsg35Match-
Node
endressrsg45_firmwareRange<2.0.0
AND
endressrsg45Match-
Node
endressorsg35_firmwareRange<2.0.0
AND
endressorsg35Match-
Node
endressorsg45_firmwareRange<2.0.0
AND
endressorsg45Match-

CNA Affected

[
  {
    "product": "RSG35 - Ecograph T",
    "vendor": "Endress+Hauser",
    "versions": [
      {
        "lessThan": "*",
        "status": "affected",
        "version": "V2.0.0",
        "versionType": "custom"
      }
    ]
  },
  {
    "product": "ORSG35 - Ecograph T Neutral/Private Label",
    "vendor": "Endress+Hauser",
    "versions": [
      {
        "lessThan": "*",
        "status": "affected",
        "version": "V2.0.0",
        "versionType": "custom"
      }
    ]
  },
  {
    "product": "RSG45 - Memograph M",
    "vendor": "Endress+Hauser",
    "versions": [
      {
        "lessThan": "*",
        "status": "affected",
        "version": "V2.0.0",
        "versionType": "custom"
      }
    ]
  },
  {
    "product": "ORSG45 - Memograph M Neutral/Private Label",
    "vendor": "Endress+Hauser",
    "versions": [
      {
        "lessThan": "*",
        "status": "affected",
        "version": "V2.0.0",
        "versionType": "custom"
      }
    ]
  }
]

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

6.3 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

28.4%

Related for CVE-2020-12496