Vulnerability Details : CVE-2020-6655
The Eaton's easySoft software v7.xx prior to v7.22 are susceptible to Out-of-bounds remote code execution vulnerability. A malicious entity can execute a malicious code or make the application crash by tricking user to upload the malformed .E70 file in the application. The vulnerability arises due to improper validation and parsing of the E70 file content by the application.
Vulnerability category: Input validationExecute code
Products affected by CVE-2020-6655
- cpe:2.3:a:eaton:easysoft:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-6655
0.61%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 67 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-6655
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST | |
5.8
|
MEDIUM | CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:L |
1.0
|
4.7
|
Eaton | |
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2020-6655
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: CybersecurityCOE@eaton.com (Secondary)
-
The product reads data past the end, or before the beginning, of the intended buffer.Assigned by:
- CybersecurityCOE@eaton.com (Secondary)
- nvd@nist.gov (Primary)
References for CVE-2020-6655
-
https://www.zerodayinitiative.com/advisories/ZDI-20-1443/
ZDI-20-1443 | Zero Day InitiativeThird Party Advisory;VDB Entry
-
https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/easySoft-eaton-vulnerability-advisory.pdf
Vendor Advisory
-
https://us-cert.cisa.gov/ics/advisories/icsa-21-007-03
Eaton EASYsoft | CISAThird Party Advisory;US Government Resource
Jump to