CVE-2020-24673
high-risk
Published 2020-12-22
In S+ Operations and S+ Historian, a successful SQL injection exploit can read sensitive data from the database, modify database data (Insert/Update/Delete), execute administration operations on the database (such as shutdown the DBMS), recover the content of a given file present on the DBMS file system and in some cases issue commands to the operating system. This can lead to a loss of confidentiality and data integrity or even affect the product behavior and its availability.
Do I need to act?
-
0.40% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (10)
Symphony \+ Historian
Symphony \+ Historian
Symphony \+ Operations
Symphony \+ Operations
Symphony \+ Operations
Symphony \+ Operations
Symphony \+ Operations
Symphony \+ Operations
Symphony \+ Operations
Symphony \+ Operations
Affected Vendors
References (4)
50
/ 100
high-risk
Severity
32/34 · Critical
Exploitability
2/34 · Minimal
Exposure
16/34 · Moderate