CVE-2020-25180

Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x includes the functionality of setting a password that is required to execute privileged commands. The password value passed to ISaGRAF Runtime is the result of encryption performed with a fixed key value using the tiny encryption algorithm (TEA) on an entered or saved password. A remote, unauthenticated attacker could pass their own encrypted password to the ISaGRAF 5 Runtime, which may result in information disclosure on the device.
Configurations

Configuration 1

cpe:2.3:a:rockwellautomation:isagraf_free_runtime:*:*:*:*:*:isagraf6_workbench:*:*
cpe:2.3:a:rockwellautomation:aadvance_controller:*:*:*:*:*:*:*:*
cpe:2.3:a:rockwellautomation:isagraf_runtime:*:*:*:*:*:*:*:*
cpe:2.3:o:xylem:multismart_firmware:*:*:*:*:*:*:*:*

Information

Published : 2022-03-18 06:15

Updated : 2022-04-04 08:59


NVD link : CVE-2020-25180

Mitre link : CVE-2020-25180

Products Affected
No products.
CWE