Endress+Hauser Ecograph T (Neutral/Private Label) (RSG35, ORSG35) and Memograph M (Neutral/Private Label) (RSG45, ORSG45) with Firmware version V2.0.0 and above is prone to exposure of sensitive information to an unauthorized actor. The firmware release has a dynamic token for each request submitted to the server, which makes repeating requests and analysis complex enough. Nevertheless, it's possible and during the analysis it was discovered that it also has an issue with the access-control matrix on the server-side. It was found that a user with low rights can get information from endpoints that should not be available to this user.
References
Link | Resource |
---|---|
https://cert.vde.com/en-us/advisories/vde-2020-022 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
History
No history.
Information
Published : 2020-11-19 18:15
Updated : 2024-02-04 21:23
NVD link : CVE-2020-12496
Mitre link : CVE-2020-12496
CVE.ORG link : CVE-2020-12496
JSON object : View
Products Affected
endress
- orsg45
- rsg45
- orsg35
- orsg45_firmware
- rsg35
- orsg35_firmware
- rsg35_firmware
- rsg45_firmware
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor