Lucene search

K
cveCERTVDECVE-2020-12517
HistoryDec 17, 2020 - 11:15 p.m.

CVE-2020-12517

2020-12-1723:15:12
CWE-79
CERTVDE
web.nvd.nist.gov
29
phoenix contact
plcnext
control devices
cve-2020-12517
security vulnerability
admin rights
local privilege escalation

CVSS2

6

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:P/I:P/A:P

CVSS3

9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H

AI Score

9

Confidence

High

EPSS

0.001

Percentile

41.4%

On Phoenix Contact PLCnext Control Devices versions before 2021.0 LTS an authenticated low privileged user could embed malicious Javascript code to gain admin rights when the admin user visits the vulnerable website (local privilege escalation).

Affected configurations

Nvd
Node
phoenixcontactaxc_f_1152Match-
AND
phoenixcontactplcnext_firmwareRange<2021.0long_term_support
Node
phoenixcontactaxc_f_2152Match-
AND
phoenixcontactplcnext_firmwareRange<2021.0long_term_support
Node
phoenixcontactaxc_f_3152Match-
AND
phoenixcontactplcnext_firmwareRange<2021.0long_term_support
Node
phoenixcontactrfc_4072sMatch-
AND
phoenixcontactplcnext_firmwareRange<2021.0long_term_support
Node
phoenixcontactaxc_f_2152_starterkitMatch-
AND
phoenixcontactplcnext_firmwareRange<2021.0long_term_support
Node
phoenixcontactplcnext_technology_starterkitMatch-
AND
phoenixcontactplcnext_firmwareRange<2021.0long_term_support
VendorProductVersionCPE
phoenixcontactaxc_f_1152-cpe:2.3:h:phoenixcontact:axc_f_1152:-:*:*:*:*:*:*:*
phoenixcontactplcnext_firmware*cpe:2.3:o:phoenixcontact:plcnext_firmware:*:*:*:*:long_term_support:*:*:*
phoenixcontactaxc_f_2152-cpe:2.3:h:phoenixcontact:axc_f_2152:-:*:*:*:*:*:*:*
phoenixcontactaxc_f_3152-cpe:2.3:h:phoenixcontact:axc_f_3152:-:*:*:*:*:*:*:*
phoenixcontactrfc_4072s-cpe:2.3:h:phoenixcontact:rfc_4072s:-:*:*:*:*:*:*:*
phoenixcontactaxc_f_2152_starterkit-cpe:2.3:h:phoenixcontact:axc_f_2152_starterkit:-:*:*:*:*:*:*:*
phoenixcontactplcnext_technology_starterkit-cpe:2.3:h:phoenixcontact:plcnext_technology_starterkit:-:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "AXC F 1152 (1151412)",
    "vendor": "Phoenix Contact",
    "versions": [
      {
        "lessThan": "2021.0 LTS",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  },
  {
    "product": "AXC F 2152 (2404267)",
    "vendor": "Phoenix Contact",
    "versions": [
      {
        "lessThan": "2021.0 LTS",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  },
  {
    "product": "AXC F 3152 (1069208)",
    "vendor": "Phoenix Contact",
    "versions": [
      {
        "lessThan": "2021.0 LTS",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  },
  {
    "product": "RFC 4072S (1051328",
    "vendor": "Phoenix Contact",
    "versions": [
      {
        "lessThan": "2021.0 LTS",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  },
  {
    "product": "AXC F 2152 Starterkit (1046568)",
    "vendor": "Phoenix Contact",
    "versions": [
      {
        "lessThan": "2021.0 LTS",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  },
  {
    "product": "PLCnext Technology Starterkit (1188165)",
    "vendor": "Phoenix Contact",
    "versions": [
      {
        "lessThan": "2021.0 LTS",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  }
]

CVSS2

6

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:P/I:P/A:P

CVSS3

9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H

AI Score

9

Confidence

High

EPSS

0.001

Percentile

41.4%

Related for CVE-2020-12517