383
VMScore

CVE-2020-25180

Published: 18/03/2022 Updated: 04/04/2022
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x includes the functionality of setting a password that is required to execute privileged commands. The password value passed to ISaGRAF Runtime is the result of encryption performed with a fixed key value using the tiny encryption algorithm (TEA) on an entered or saved password. A remote, unauthenticated attacker could pass their own encrypted password to the ISaGRAF 5 Runtime, which may result in information disclosure on the device.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

schneider-electric easergy_t300_firmware

schneider-electric easergy_c5_firmware

schneider-electric micom_c264_firmware

schneider-electric pacis_gtw_firmware 5.1

schneider-electric pacis_gtw_firmware 5.2

schneider-electric pacis_gtw_firmware 6.1

schneider-electric pacis_gtw_firmware 6.3

schneider-electric saitel_dp_firmware

schneider-electric epas_gtw_firmware 6.4

schneider-electric saitel_dr_firmware

schneider-electric scd2200_firmware

rockwellautomation aadvance controller

rockwellautomation isagraf free runtime

rockwellautomation isagraf runtime

rockwellautomation micro810_firmware -

rockwellautomation micro820_firmware -

rockwellautomation micro830_firmware -

rockwellautomation micro850_firmware -

rockwellautomation micro870_firmware -

xylem multismart firmware