Vulnerability Details : CVE-2020-12496
Endress+Hauser Ecograph T (Neutral/Private Label) (RSG35, ORSG35) and Memograph M (Neutral/Private Label) (RSG45, ORSG45) with Firmware version V2.0.0 and above is prone to exposure of sensitive information to an unauthorized actor. The firmware release has a dynamic token for each request submitted to the server, which makes repeating requests and analysis complex enough. Nevertheless, it's possible and during the analysis it was discovered that it also has an issue with the access-control matrix on the server-side. It was found that a user with low rights can get information from endpoints that should not be available to this user.
Vulnerability category: Information leak
Products affected by CVE-2020-12496
- cpe:2.3:o:endress:rsg35_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:endress:rsg45_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:endress:orsg35_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:endress:orsg45_firmware:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-12496
0.07%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 27 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-12496
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.0
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:N/A:N |
8.0
|
2.9
|
NIST | |
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N |
2.8
|
3.6
|
CERT VDE | |
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
2.8
|
3.6
|
NIST |
CWE ids for CVE-2020-12496
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by:
- info@cert.vde.com (Secondary)
- nvd@nist.gov (Primary)
References for CVE-2020-12496
-
https://cert.vde.com/en-us/advisories/vde-2020-022
ENDRESS+HAUSER: Ecograph T utilizing Webserver firmware version 2.x — English (USA)Vendor Advisory
Jump to