Vulnerability Details : CVE-2020-8809
Potential exploit
Gurux GXDLMS Director prior to 8.5.1905.1301 downloads updates to add-ins and OBIS code over an unencrypted HTTP connection. A man-in-the-middle attacker can prompt the user to download updates by modifying the contents of gurux.fi/obis/files.xml and gurux.fi/updates/updates.xml. Then, the attacker can modify the contents of downloaded files. In the case of add-ins (if the user is using those), this will lead to code execution. In case of OBIS codes (which the user is always using as they are needed to communicate with the energy meters), this can lead to code execution when combined with CVE-2020-8810.
Products affected by CVE-2020-8809
- cpe:2.3:a:gurux:device_language_message_specification_director:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-8809
0.25%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 47 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-8809
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST | |
8.1
|
HIGH | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
2.2
|
5.9
|
NIST |
CWE ids for CVE-2020-8809
-
The product downloads source code or an executable from a remote location and executes the code without sufficiently verifying the origin and integrity of the code.Assigned by: nvd@nist.gov (Primary)
References for CVE-2020-8809
-
https://seqred.pl/en/cve-gurux-gxdlms-director/
Multiple vulnerabilities in Gurux GXDLMS Director – remote code execution | SEQREDExploit;Third Party Advisory
-
https://github.com/seqred-s-a/gxdlmsdirector-cve
GitHub - seqred-s-a/gxdlmsdirector-cve: CVE-2020-8809 and CVE-2020-8810Exploit;Third Party Advisory
Jump to