CVE-2020-25180
moderate-risk
Published 2022-03-18
Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x includes the functionality of setting a password that is required to execute privileged commands. The password value passed to ISaGRAF Runtime is the result of encryption performed with a fixed key value using the tiny encryption algorithm (TEA) on an entered or saved password. A remote, unauthenticated attacker could pass their own encrypted password to the ISaGRAF 5 Runtime, which may result in information disclosure on the device.
Do I need to act?
-
0.10% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.3/10
Medium
NETWORK
/ HIGH complexity
Affected Products (20)
Easergy C5 Firmware
Micom C264 Firmware
Pacis Gtw Firmware
Pacis Gtw Firmware
Pacis Gtw Firmware
Pacis Gtw Firmware
Pacis Gtw Firmware
Saitel Dp Firmware
Epas Gtw Firmware
Epas Gtw Firmware
Saitel Dr Firmware
Scd2200 Firmware
Aadvance Controller
Isagraf Free Runtime
Isagraf Runtime
Micro810 Firmware
Micro820 Firmware
Micro830 Firmware
Micro850 Firmware
Affected Vendors
References (8)
Permissions Required
https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1131699
Third Party Advisory
https://www.cisa.gov/uscert/ics/advisories/icsa-20-280-01
Third Party Advisory
https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-mult...
Permissions Required
https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1131699
Third Party Advisory
https://www.cisa.gov/uscert/ics/advisories/icsa-20-280-01
Third Party Advisory
https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-mult...
37
/ 100
moderate-risk
Severity
17/34 · Moderate
Exploitability
0/34 · Minimal
Exposure
20/34 · Moderate