Vulnerability Details : CVE-2020-6994
A buffer overflow vulnerability was found in some devices of Hirschmann Automation and Control HiOS and HiSecOS. The vulnerability is due to improper parsing of URL arguments. An attacker could exploit this vulnerability by specially crafting HTTP requests to overflow an internal buffer. The following devices using HiOS Version 07.0.02 and lower are affected: RSP, RSPE, RSPS, RSPL, MSP, EES, EES, EESX, GRS, OS, RED. The following devices using HiSecOS Version 03.2.00 and lower are affected: EAGLE20/30.
Vulnerability category: Overflow
Products affected by CVE-2020-6994
- cpe:2.3:o:belden:hirschmann_hios:*:*:*:*:*:*:*:*
- cpe:2.3:o:belden:hirschmann_hisecos:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-6994
0.24%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 61 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-6994
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2020-6994
-
An ASP .NET application must enable custom error pages in order to prevent attackers from mining information from the framework's built-in responses.Assigned by: ics-cert@hq.dhs.gov (Secondary)
-
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.Assigned by: nvd@nist.gov (Primary)
References for CVE-2020-6994
-
https://www.us-cert.gov/ics/advisories/icsa-20-091-01
Hirschmann Automation and Control HiOS and HiSecOS Products | CISAMitigation;Third Party Advisory;US Government Resource
Jump to