Vulnerability identifier: #VU27948
Vulnerability risk: High
CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2020-12030
CWE-ID:
CWE-284
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Wireless 1410 Gateway
Hardware solutions /
Other hardware appliances
Wireless 1420 Gateway
Hardware solutions /
Other hardware appliances
Wireless 1552WU Gateway
Hardware solutions /
Other hardware appliances
Vendor: Emerson
Description
The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to a flaw in the code used to configure the internal gateway firewall when the gateway's VLAN feature is enabled. If a user enables the VLAN setting, the internal gateway firewall becomes disabled resulting in exposure of all ports used by the gateway. A remote attacker can issue specific commands to the gateway, which could then be forwarded on to the end user's wireless devices.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
Wireless 1410 Gateway: 4.6.43 - 4.7.84
Wireless 1420 Gateway: 4.6.43 - 4.7.84
Wireless 1552WU Gateway: 4.6.43 - 4.7.84
External links
https://ics-cert.us-cert.gov/advisories/icsa-20-135-02
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.