Lucene search

K
cveIcscertCVE-2020-14502
HistoryFeb 24, 2022 - 7:15 p.m.

CVE-2020-14502

2022-02-2419:15:08
CWE-79
icscert
web.nvd.nist.gov
29
web interface
1734-aentr
communication module
stored xss
nvd

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

AI Score

6.2

Confidence

High

EPSS

0.001

Percentile

24.0%

The web interface of the 1734-AENTR communication module is vulnerable to stored XSS. A remote, unauthenticated attacker could store a malicious script within the web interface that, when executed, could modify some string values on the homepage of the web interface.

Affected configurations

Nvd
Node
rockwellautomation1734-aentr_point_i\/o_dual_port_network_adaptor_series_bMatch-
AND
rockwellautomation1734-aentr_point_i\/o_dual_port_network_adaptor_series_b_firmwareRange4.0014.005
OR
rockwellautomation1734-aentr_point_i\/o_dual_port_network_adaptor_series_b_firmwareRange5.0115.017
Node
rockwellautomation1734-aentr_point_i\/o_dual_port_network_adaptor_series_cMatch-
AND
rockwellautomation1734-aentr_point_i\/o_dual_port_network_adaptor_series_c_firmwareMatch6.011
OR
rockwellautomation1734-aentr_point_i\/o_dual_port_network_adaptor_series_c_firmwareMatch6.012
VendorProductVersionCPE
rockwellautomation1734-aentr_point_i\/o_dual_port_network_adaptor_series_b-cpe:2.3:h:rockwellautomation:1734-aentr_point_i\/o_dual_port_network_adaptor_series_b:-:*:*:*:*:*:*:*
rockwellautomation1734-aentr_point_i\/o_dual_port_network_adaptor_series_b_firmware*cpe:2.3:o:rockwellautomation:1734-aentr_point_i\/o_dual_port_network_adaptor_series_b_firmware:*:*:*:*:*:*:*:*
rockwellautomation1734-aentr_point_i\/o_dual_port_network_adaptor_series_c-cpe:2.3:h:rockwellautomation:1734-aentr_point_i\/o_dual_port_network_adaptor_series_c:-:*:*:*:*:*:*:*
rockwellautomation1734-aentr_point_i\/o_dual_port_network_adaptor_series_c_firmware6.011cpe:2.3:o:rockwellautomation:1734-aentr_point_i\/o_dual_port_network_adaptor_series_c_firmware:6.011:*:*:*:*:*:*:*
rockwellautomation1734-aentr_point_i\/o_dual_port_network_adaptor_series_c_firmware6.012cpe:2.3:o:rockwellautomation:1734-aentr_point_i\/o_dual_port_network_adaptor_series_c_firmware:6.012:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "1734-AENTR",
    "vendor": "Rockwell Automation",
    "versions": [
      {
        "status": "affected",
        "version": "Series B 4.001 to 4.005, and 5.011 to 5.017"
      },
      {
        "status": "affected",
        "version": "Series C 6.011 and 6.012"
      }
    ]
  }
]

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

AI Score

6.2

Confidence

High

EPSS

0.001

Percentile

24.0%

Related for CVE-2020-14502