CVE-2020-12017
Published Jun 2, 2020
Last updated 4 years ago
Overview
- Description
- GE Grid Solutions Reason RT Clocks, RT430, RT431, and RT434, all firmware versions prior to 08A05. The device’s vulnerability in the web application could allow multiple unauthenticated attacks that could cause serious impact. The vulnerability may allow an unauthenticated attacker to execute arbitrary commands and send a request to a specific URL that could cause the device to become unresponsive. The unauthenticated attacker may change the password of the 'configuration' user account, allowing the attacker to modify the configuration of the device via the web interface using the new password. This vulnerability may also allow an unauthenticated attacker to bypass the authentication required to configure the device and reboot the system.
- Source
- ics-cert@hq.dhs.gov
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
CVSS 2.0
- Type
- Primary
- Base score
- 9
- Impact score
- 8.5
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:C
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:rt430:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "0EB994D8-B52E-4375-8957-6B5F0866F5B3" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:rt430_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DD109DE7-1C72-4778-9B9E-268F2E731018", "versionEndExcluding": "08a05" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:rt431:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "366B4D1B-A8CB-4EA9-8C84-A4E3CCB4B22D" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:rt431_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C32D1CAD-1546-4229-AC62-80E5A2E7557C", "versionEndExcluding": "08a05" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:rt434:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "BCD38027-CE2E-45B0-98B2-922C64494745" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:rt434_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "10BC5948-A2D1-45B6-87B4-DD4524791F18", "versionEndExcluding": "08a05" } ], "operator": "OR" } ], "operator": "AND" } ]