Risk | High |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2020-12030 |
CWE-ID | CWE-284 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
Wireless 1410 Gateway Hardware solutions / Other hardware appliances Wireless 1420 Gateway Hardware solutions / Other hardware appliances Wireless 1552WU Gateway Hardware solutions / Other hardware appliances |
Vendor | Emerson |
Security Bulletin
This security bulletin contains one high risk vulnerability.
EUVDB-ID: #VU27948
Risk: High
CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2020-12030
CWE-ID:
CWE-284 - Improper Access Control
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to a flaw in the code used to configure the internal gateway firewall when the gateway's VLAN feature is enabled. If a user enables the VLAN setting, the internal gateway firewall becomes disabled resulting in exposure of all ports used by the gateway. A remote attacker can issue specific commands to the gateway, which could then be forwarded on to the end user's wireless devices.
MitigationInstall updates from vendor's website.
Vulnerable software versionsWireless 1410 Gateway: 4.6.43 - 4.7.84
Wireless 1420 Gateway: 4.6.43 - 4.7.84
Wireless 1552WU Gateway: 4.6.43 - 4.7.84
CPE2.3https://ics-cert.us-cert.gov/advisories/icsa-20-135-02
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.