Lucene search

K
cveIcscertCVE-2020-14504
HistoryFeb 24, 2022 - 7:15 p.m.

CVE-2020-14504

2022-02-2419:15:08
CWE-287
CWE-284
icscert
web.nvd.nist.gov
33
cve-2020-14504
nvd
authentication
http post
remote attacker
configuration settings

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

AI Score

5.5

Confidence

High

EPSS

0.001

Percentile

27.8%

The web interface of the 1734-AENTR communication module mishandles authentication for HTTP POST requests. A remote, unauthenticated attacker can send a crafted request that may allow for modification of the configuration settings.

Affected configurations

Nvd
Node
rockwellautomation1734-aentr_point_i\/o_dual_port_network_adaptor_series_b_firmwareRange4.0014.005
OR
rockwellautomation1734-aentr_point_i\/o_dual_port_network_adaptor_series_b_firmwareRange5.0115.017
AND
rockwellautomation1734-aentr_point_i\/o_dual_port_network_adaptor_series_bMatch-
Node
rockwellautomation1734-aentr_point_i\/o_dual_port_network_adaptor_series_c_firmwareMatch6.011
OR
rockwellautomation1734-aentr_point_i\/o_dual_port_network_adaptor_series_c_firmwareMatch6.012
AND
rockwellautomation1734-aentr_point_i\/o_dual_port_network_adaptor_series_cMatch-
VendorProductVersionCPE
rockwellautomation1734-aentr_point_i\/o_dual_port_network_adaptor_series_b_firmware*cpe:2.3:o:rockwellautomation:1734-aentr_point_i\/o_dual_port_network_adaptor_series_b_firmware:*:*:*:*:*:*:*:*
rockwellautomation1734-aentr_point_i\/o_dual_port_network_adaptor_series_b-cpe:2.3:h:rockwellautomation:1734-aentr_point_i\/o_dual_port_network_adaptor_series_b:-:*:*:*:*:*:*:*
rockwellautomation1734-aentr_point_i\/o_dual_port_network_adaptor_series_c_firmware6.011cpe:2.3:o:rockwellautomation:1734-aentr_point_i\/o_dual_port_network_adaptor_series_c_firmware:6.011:*:*:*:*:*:*:*
rockwellautomation1734-aentr_point_i\/o_dual_port_network_adaptor_series_c_firmware6.012cpe:2.3:o:rockwellautomation:1734-aentr_point_i\/o_dual_port_network_adaptor_series_c_firmware:6.012:*:*:*:*:*:*:*
rockwellautomation1734-aentr_point_i\/o_dual_port_network_adaptor_series_c-cpe:2.3:h:rockwellautomation:1734-aentr_point_i\/o_dual_port_network_adaptor_series_c:-:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "1734-AENTR",
    "vendor": "Rockwell Automation",
    "versions": [
      {
        "status": "affected",
        "version": "Series B 4.001 to 4.005, and 5.011 to 5.017"
      },
      {
        "status": "affected",
        "version": "Series C 6.011 and 6.012"
      }
    ]
  }
]

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

AI Score

5.5

Confidence

High

EPSS

0.001

Percentile

27.8%

Related for CVE-2020-14504