CVE-2020-12030
moderate-risk
Published 2021-09-29
There is a flaw in the code used to configure the internal gateway firewall when the gateway's VLAN feature is enabled. If a user enables the VLAN setting, the internal gateway firewall becomes disabled resulting in exposure of all ports used by the gateway.
Do I need to act?
-
0.29% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
10
CVSS 10.0/10
Critical
NETWORK
/ LOW complexity
Affected Products (3)
Wireless 1410 Gateway Firmware
Wireless 1420 Gateway Firmware
Wireless 1552Wu Gateway Firmware
Affected Vendors
References (2)
Third Party Advisory
https://us-cert.cisa.gov/ics/advisories/icsa-20-135-02
Third Party Advisory
https://us-cert.cisa.gov/ics/advisories/icsa-20-135-02
43
/ 100
moderate-risk
Severity
33/34 · Critical
Exploitability
1/34 · Minimal
Exposure
9/34 · Low