9.8
CVSSv3

CVE-2020-24683

Published: 22/12/2020 Updated: 07/10/2021
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The affected versions of S+ Operations (version 2.1 SP1 and previous versions) used an approach for user authentication which relies on validation at the client node (client-side authentication). This is not as secure as having the server validate a client application before allowing a connection. Therefore, if the network communication or endpoints for these applications are not protected, unauthorized actors can bypass authentication and make unauthorized connections to the server application.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

abb symphony \\+ historian 3.0

abb symphony \\+ historian 3.1

abb symphony \\+ operations 1.1

abb symphony \\+ operations 2.0

abb symphony \\+ operations 2.1

abb symphony \\+ operations 3.0

abb symphony \\+ operations 3.1

abb symphony \\+ operations 3.2

abb symphony \\+ operations 3.3