A buffer overflow vulnerability was found in some devices of Hirschmann Automation and Control HiOS and HiSecOS. The vulnerability is due to improper parsing of URL arguments. An attacker could exploit this vulnerability by specially crafting HTTP requests to overflow an internal buffer. The following devices using HiOS Version 07.0.02 and lower are affected: RSP, RSPE, RSPS, RSPL, MSP, EES, EES, EESX, GRS, OS, RED. The following devices using HiSecOS Version 03.2.00 and lower are affected: EAGLE20/30.
References
Link | Resource |
---|---|
https://www.us-cert.gov/ics/advisories/icsa-20-091-01 | Mitigation Third Party Advisory US Government Resource |
https://www.us-cert.gov/ics/advisories/icsa-20-091-01 | Mitigation Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
History
21 Nov 2024, 05:36
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.us-cert.gov/ics/advisories/icsa-20-091-01 - Mitigation, Third Party Advisory, US Government Resource |
17 Jun 2021, 17:22
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:h:hirschmann:prp_redbox:-:*:*:*:*:*:*:* cpe:2.3:h:hirschmann:rail_switch_power_enhanced:-:*:*:*:*:*:*:* cpe:2.3:h:hirschmann:greyhound_swtich:-:*:*:*:*:*:*:* cpe:2.3:o:hirschmann:hisecos:*:*:*:*:*:*:*:* cpe:2.3:h:hirschmann:octopus:-:*:*:*:*:*:*:* cpe:2.3:h:hirschmann:mice_switch_power:-:*:*:*:*:*:*:* cpe:2.3:h:hirschmann:rail_switch_power_smart:-:*:*:*:*:*:*:* cpe:2.3:h:hirschmann:eagle20:-:*:*:*:*:*:*:* cpe:2.3:h:hirschmann:embedded_ethernet_switch:-:*:*:*:*:*:*:* cpe:2.3:h:hirschmann:eagle30:-:*:*:*:*:*:*:* cpe:2.3:h:hirschmann:rail_switch_power_lite:-:*:*:*:*:*:*:* cpe:2.3:o:hirschmann:hios:*:*:*:*:*:*:*:* cpe:2.3:h:hirschmann:rail_switch_power:-:*:*:*:*:*:*:* |
cpe:2.3:h:belden:hirschmann_rail_switch_power:-:*:*:*:*:*:*:* cpe:2.3:h:belden:hirschmann_eagle20:-:*:*:*:*:*:*:* cpe:2.3:h:belden:hirschmann_octopus:-:*:*:*:*:*:*:* cpe:2.3:o:belden:hirschmann_hisecos:*:*:*:*:*:*:*:* cpe:2.3:o:belden:hirschmann_hios:*:*:*:*:*:*:*:* cpe:2.3:h:belden:hirschmann_rail_switch_power_enhanced:-:*:*:*:*:*:*:* cpe:2.3:h:belden:hirschmann_rail_switch_power_lite:-:*:*:*:*:*:*:* cpe:2.3:h:belden:hirschmann_prp_redbox:-:*:*:*:*:*:*:* cpe:2.3:h:belden:hirschmann_rail_switch_power_smart:-:*:*:*:*:*:*:* cpe:2.3:h:belden:hirschmann_greyhound_swtich:-:*:*:*:*:*:*:* cpe:2.3:h:belden:hirschmann_mice_switch_power:-:*:*:*:*:*:*:* cpe:2.3:h:belden:hirschmann_embedded_ethernet_switch:-:*:*:*:*:*:*:* cpe:2.3:h:belden:hirschmann_embedded_ethernet_switch_extended:-:*:*:*:*:*:*:* cpe:2.3:h:belden:hirschmann_eagle30:-:*:*:*:*:*:*:* |
Information
Published : 2020-04-03 19:15
Updated : 2024-11-21 05:36
NVD link : CVE-2020-6994
Mitre link : CVE-2020-6994
CVE.ORG link : CVE-2020-6994
JSON object : View
Products Affected
belden
- hirschmann_rail_switch_power
- hirschmann_hisecos
- hirschmann_prp_redbox
- hirschmann_rail_switch_power_lite
- hirschmann_rail_switch_power_smart
- hirschmann_rail_switch_power_enhanced
- hirschmann_eagle20
- hirschmann_hios
- hirschmann_embedded_ethernet_switch_extended
- hirschmann_mice_switch_power
- hirschmann_greyhound_swtich
- hirschmann_octopus
- hirschmann_embedded_ethernet_switch
- hirschmann_eagle30