Lucene search

K
nvd[email protected]NVD:CVE-2020-10918
HistoryJul 23, 2020 - 4:15 p.m.

CVE-2020-10918

2020-07-2316:15:12
CWE-287
web.nvd.nist.gov
4
cve-2020-10918
c-more hmi ea9
firmware v6.52
remote attackers
authentication bypass
insufficient authentication
privilege escalation
zdi-can-10182

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS

0.009

Percentile

83.0%

This vulnerability allows remote attackers to bypass authentication on affected installations of C-MORE HMI EA9 Firmware version 6.52 touch screen panels. Authentication is not required to exploit this vulnerability. The specific flaw exists within the authentication mechanism. The issue is due to insufficient authentication on post-authentication requests. An attacker can leverage this vulnerability to escalate privileges to resources normally protected from unauthenticated users. Was ZDI-CAN-10182.

Affected configurations

Nvd
Node
automationdirectea9-pgmswMatch-
OR
automationdirectea9-rhmiMatch-
OR
automationdirectea9-t10clMatch-
OR
automationdirectea9-t10wclMatch-
OR
automationdirectea9-t12clMatch-
OR
automationdirectea9-t15clMatch-
OR
automationdirectea9-t15cl-rMatch-
OR
automationdirectea9-t6clMatch-
OR
automationdirectea9-t6cl-rMatch-
OR
automationdirectea9-t7clMatch-
OR
automationdirectea9-t7cl-rMatch-
OR
automationdirectea9-t8clMatch-
AND
automationdirectc-more_hmi_ea9_firmwareMatch6.52
VendorProductVersionCPE
automationdirectea9-pgmsw-cpe:2.3:h:automationdirect:ea9-pgmsw:-:*:*:*:*:*:*:*
automationdirectea9-rhmi-cpe:2.3:h:automationdirect:ea9-rhmi:-:*:*:*:*:*:*:*
automationdirectea9-t10cl-cpe:2.3:h:automationdirect:ea9-t10cl:-:*:*:*:*:*:*:*
automationdirectea9-t10wcl-cpe:2.3:h:automationdirect:ea9-t10wcl:-:*:*:*:*:*:*:*
automationdirectea9-t12cl-cpe:2.3:h:automationdirect:ea9-t12cl:-:*:*:*:*:*:*:*
automationdirectea9-t15cl-cpe:2.3:h:automationdirect:ea9-t15cl:-:*:*:*:*:*:*:*
automationdirectea9-t15cl-r-cpe:2.3:h:automationdirect:ea9-t15cl-r:-:*:*:*:*:*:*:*
automationdirectea9-t6cl-cpe:2.3:h:automationdirect:ea9-t6cl:-:*:*:*:*:*:*:*
automationdirectea9-t6cl-r-cpe:2.3:h:automationdirect:ea9-t6cl-r:-:*:*:*:*:*:*:*
automationdirectea9-t7cl-cpe:2.3:h:automationdirect:ea9-t7cl:-:*:*:*:*:*:*:*
Rows per page:
1-10 of 131

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS

0.009

Percentile

83.0%

Related for NVD:CVE-2020-10918