Vulnerability Details : CVE-2020-7561
A CWE-306: Missing Authentication for Critical Function vulnerability exists in Easergy T300 (with firmware 2.7 and older) that could cause a wide range of problems, including information exposure, denial of service, and command execution when access to a resource from an attacker is not restricted or incorrectly restricted.
Vulnerability category: BypassGain privilegeDenial of service
Products affected by CVE-2020-7561
- cpe:2.3:o:schneider-electric:easergy_t300_firmware:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-7561
1.59%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 80 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-7561
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2020-7561
-
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.Assigned by: cybersecurity@se.com (Primary)
-
The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.Assigned by: nvd@nist.gov (Secondary)
References for CVE-2020-7561
-
https://www.se.com/ww/en/download/document/SEVD-2020-315-06/
Security Notification - Easergy T300 | Schneider ElectricPatch;Product;Vendor Advisory
-
https://us-cert.cisa.gov/ics/advisories/icsa-20-343-03
Schneider Electric Easergy T300 | CISAThird Party Advisory;US Government Resource
Jump to