{"vulnerability": "CVE-2020-1450", "sightings": [{"uuid": "bc6aeb3b-84a0-45e3-929f-c1bfda63ab17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14500", "type": "seen", "source": "https://t.me/cKure/1568", "content": "\u25a0\u25a0\u25a0\u25a0\u25a0 ICS-SCADA: Aka BootHole, an industrial VPN Flaws Could Let Attackers Target Infrastructure nodes.\n\nCVE-2020-14500\nCVE-2020-14508\nCVE-2020-14510\nCVE-2020-14512\nCVE-2020-14511\nCVE-2020-14498\n\nhttps://thehackernews.com/2020/07/industrial-vpn-security.html", "creation_timestamp": "2020-07-31T07:51:27.000000Z"}, {"uuid": "f45c01d1-a1ed-458a-8f58-d21a40e5bf81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2020-14509", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-26-076-01", "content": "", "creation_timestamp": "2026-03-17T12:00:00.000000Z"}, {"uuid": "b91840b3-d580-4142-a8a1-6c4de4407ee7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14508", "type": "seen", "source": "https://t.me/cKure/1568", "content": "\u25a0\u25a0\u25a0\u25a0\u25a0 ICS-SCADA: Aka BootHole, an industrial VPN Flaws Could Let Attackers Target Infrastructure nodes.\n\nCVE-2020-14500\nCVE-2020-14508\nCVE-2020-14510\nCVE-2020-14512\nCVE-2020-14511\nCVE-2020-14498\n\nhttps://thehackernews.com/2020/07/industrial-vpn-security.html", "creation_timestamp": "2020-07-31T07:51:27.000000Z"}, {"uuid": "c99b0f55-3ef2-434e-a3fe-34b926a9a04a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14508", "type": "seen", "source": "https://t.me/Yemen_Shield/120", "content": "Multiple Critical Flaws Reported in Enterprise-Grade Industrial VPNs Could Let Remote Attackers Target Critical Infrastructures.\n\nDetails: https://thehackernews.com/2020/07/industrial-vpn-security.html\n\nReported Flaws Are:\nCVE-2020-14500\nCVE-2020-14508\nCVE-2020-14510\nCVE-2020-14512\nCVE-2020-14511\nCVE-2020-14498", "creation_timestamp": "2020-07-29T21:40:39.000000Z"}, {"uuid": "f545b4af-9b42-4af8-a6ab-1eb9f1eadef9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14500", "type": "seen", "source": "https://t.me/Yemen_Shield/120", "content": "Multiple Critical Flaws Reported in Enterprise-Grade Industrial VPNs Could Let Remote Attackers Target Critical Infrastructures.\n\nDetails: https://thehackernews.com/2020/07/industrial-vpn-security.html\n\nReported Flaws Are:\nCVE-2020-14500\nCVE-2020-14508\nCVE-2020-14510\nCVE-2020-14512\nCVE-2020-14511\nCVE-2020-14498", "creation_timestamp": "2020-07-29T21:40:39.000000Z"}, {"uuid": "7db100e5-4efc-484a-9122-c5a5a276db02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14504", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12312", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2020-14504\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The web interface of the 1734-AENTR communication module mishandles authentication for HTTP POST requests. A remote, unauthenticated attacker can send a crafted request that may allow for modification of the configuration settings.\n\ud83d\udccf Published: 2022-02-24T18:26:56.514Z\n\ud83d\udccf Modified: 2025-04-17T18:48:19.175Z\n\ud83d\udd17 References:\n1. https://www.cisa.gov/uscert/ics/advisories/icsa-21-063-01", "creation_timestamp": "2025-04-17T18:57:52.000000Z"}, {"uuid": "e8a84da8-1460-481f-9848-3a1822aa02b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14502", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12313", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2020-14502\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The web interface of the 1734-AENTR communication module is vulnerable to stored XSS. A remote, unauthenticated attacker could store a malicious script within the web interface that, when executed, could modify some string values on the homepage of the web interface.\n\ud83d\udccf Published: 2022-02-24T18:26:57.475Z\n\ud83d\udccf Modified: 2025-04-17T18:48:11.572Z\n\ud83d\udd17 References:\n1. https://www.cisa.gov/uscert/ics/advisories/icsa-21-063-01", "creation_timestamp": "2025-04-17T18:57:53.000000Z"}, {"uuid": "f2deaf16-8367-4843-a227-579de2df5fc2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14500", "type": "seen", "source": "https://t.me/true_secator/802", "content": "\u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f Claroty, \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0437\u0438\u0440\u0443\u044e\u0449\u0430\u044f\u0441\u044f \u043d\u0430 \u043f\u0440\u043e\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u043e\u0442\u0447\u0435\u0442, \u0432 \u043a\u043e\u0442\u043e\u0440\u043e\u043c \u043e\u043f\u0438\u0441\u0430\u043b\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u043d\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u0440\u0435\u0448\u0435\u043d\u0438\u044f\u0445 VPN \u0434\u043b\u044f \u043f\u0440\u043e\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u044b\u0445 \u0441\u0435\u0442\u0435\u0439. \u041f\u043e\u0434\u043e\u0431\u043d\u044b\u0435 \u0440\u0435\u0448\u0435\u043d\u0438\u044f \u043e\u0440\u0438\u0435\u043d\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u044b, \u0432 \u043e\u0441\u043d\u043e\u0432\u043d\u043e\u043c, \u043d\u0430 \u0410\u0421\u0423 \u0422\u041f (ICS).\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u044b\u0435 VPN \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u044b \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442\u0441\u044f \u0432 \u043d\u0435\u0444\u0442\u044f\u043d\u043e\u0439 \u0438 \u0433\u0430\u0437\u043e\u0432\u043e\u0439 \u043e\u0442\u0440\u0430\u0441\u043b\u044f\u0445, \u0432\u043e\u0434\u043e- \u0438 \u044d\u043b\u0435\u043a\u0442\u0440\u043e\u0441\u043d\u0430\u0431\u0436\u0435\u043d\u0438\u0438 - \u0432 \u043e\u0431\u0449\u0435\u043c, \u0432 \u0431\u043e\u043b\u0435\u0435 \u0447\u0435\u043c \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u0441\u0444\u0435\u0440\u0430\u0445 \u0441\u043e\u0432\u0440\u0435\u043c\u0435\u043d\u043d\u043e\u0439 \u0436\u0438\u0437\u043d\u0438.\n\n\u041e\u0448\u0438\u0431\u043a\u0438 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u044b \u0432 Secomea GateManager, Moxa EDR-G902 \u0438 EDR-G903, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0432 VPN-\u043a\u043b\u0438\u0435\u043d\u0442\u0435 eCatcher \u0440\u0435\u0448\u0435\u043d\u0438\u044f eWon \u043e\u0442 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 HMS Networks.  \n\n\u0422\u0430\u043a, \u0432 Secomea GateManager \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2020-14500, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0432 \u0441\u0438\u043b\u0443 \u043d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u043e\u0439 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0438 \u0437\u0430\u0433\u043e\u043b\u043e\u0432\u043a\u043e\u0432 HTTP-\u0437\u0430\u043f\u0440\u043e\u0441\u043e\u0432 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0434\u043e\u0431\u0438\u0442\u044c\u0441\u044f \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043a\u043e\u0434\u0430 \u0432 \u0430\u0442\u0430\u043a\u0443\u0435\u043c\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u0435, \u043f\u0440\u0438\u0447\u0435\u043c \u0431\u0435\u0437 \u0432\u0441\u044f\u043a\u043e\u0433\u043e \u043f\u0440\u043e\u0445\u043e\u0436\u0434\u0435\u043d\u0438\u044f \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438.\n\n\u0412 Moxa EDR-G902 \u0438 EDR-G903 \u043d\u0430\u0439\u0434\u0435\u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2020-14511, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u0431\u0443\u0444\u0435\u0440\u0430 \u0432 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0435 \u043d\u0430\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0433\u043e HTTP-\u0437\u0430\u043f\u0440\u043e\u0441\u0430 \u0438 \u043e\u043f\u044f\u0442\u044c \u0436\u0435 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0445\u0430\u043a\u0435\u0440\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043a\u043e\u0434. \n\n\u041d\u0443 \u0438, CVE-2020-14498 \u0432 VPN-\u043a\u043b\u0438\u0435\u043d\u0442\u0435 eCatcher \u0442\u0430\u043a\u0436\u0435 \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u0431\u0443\u0444\u0435\u0440\u0430 \u0438 RCE.\n\n\u041a \u0441\u0447\u0430\u0441\u0442\u044c\u044e, \u0432\u0441\u0435 \u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0438 \u043e\u0448\u0438\u0431\u043e\u043a \u0431\u044b\u043b\u0438 \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u044b \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0430\u043c \u0438 \u043a \u043d\u0430\u0441\u0442\u043e\u044f\u0449\u0435\u043c\u0443 \u0432\u0440\u0435\u043c\u0435\u043d\u0438 \u043e\u043d\u0438 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u044b. \u041d\u043e, \u0432\u043e-\u043f\u0435\u0440\u0432\u044b\u0445,  \u043a\u0430\u043a \u043c\u044b \u0437\u043d\u0430\u0435\u043c, \u0434\u0430\u043b\u0435\u043a\u043e \u043d\u0435 \u0432\u0441\u0435 \u041f\u041e \u0441\u0432\u043e\u0435\u0432\u0440\u0435\u043c\u0435\u043d\u043d\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u043c\u0438 \u043b\u0438\u0446\u0430\u043c\u0438. \u0410 \u0432\u043e-\u0432\u0442\u043e\u0440\u044b\u0445, \u0441\u043a\u043e\u043b\u044c\u043a\u043e \u0435\u0449\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0438\u043c\u0435\u0435\u0442\u0441\u044f \u0432 \u043f\u0440\u043e\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0445 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f - \u043e\u0434\u043d\u043e\u043c\u0443 \u041c\u0438\u0442\u043d\u0438\u043a\u0443 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u043e.", "creation_timestamp": "2020-07-29T18:15:25.000000Z"}, {"uuid": "5c61a115-3af4-4faf-b4fb-385a3e68f082", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1450", "type": "seen", "source": "Telegram/Km9gcRJ-PStd5h4tHMmt4rQnkSox9bnmGNHQu_1h5QIrVDU9", "content": "", "creation_timestamp": "2025-03-02T11:46:28.000000Z"}, {"uuid": "25625934-1da6-460b-83f6-6acbbf757c30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1450", "type": "seen", "source": "Telegram/ddGcu0PbjdPFti98YC4iBSnigFXoQU08u0uyhA05vZPyYFv5", "content": "", "creation_timestamp": "2025-03-02T11:46:28.000000Z"}, {"uuid": "6a177555-c78a-4869-8dec-619f1508224d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14500", "type": "seen", "source": "https://t.me/thehackernews/786", "content": "Multiple Critical Flaws Reported in Enterprise-Grade Industrial VPNs Could Let Remote Attackers Target Critical Infrastructures.\n\nDetails: https://thehackernews.com/2020/07/industrial-vpn-security.html\n\nReported Flaws Are:\nCVE-2020-14500\nCVE-2020-14508\nCVE-2020-14510\nCVE-2020-14512\nCVE-2020-14511\nCVE-2020-14498", "creation_timestamp": "2020-07-29T13:18:51.000000Z"}, {"uuid": "093e9327-094b-4653-9aad-31fc48b93963", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14504", "type": "seen", "source": "https://t.me/cibsecurity/38056", "content": "\u203c CVE-2020-14504 \u203c\n\nThe web interface of the 1734-AENTR communication module mishandles authentication for HTTP POST requests. A remote, unauthenticated attacker can send a crafted request that may allow for modification of the configuration settings.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-24T22:15:16.000000Z"}, {"uuid": "b6f1a201-0cb5-4f5f-94d2-fcd3673e9079", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14502", "type": "seen", "source": "https://t.me/cibsecurity/38055", "content": "\u203c CVE-2020-14502 \u203c\n\nThe web interface of the 1734-AENTR communication module is vulnerable to stored XSS. A remote, unauthenticated attacker could store a malicious script within the web interface that, when executed, could modify some string values on the homepage of the web interface.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-24T22:15:14.000000Z"}, {"uuid": "b43db726-ba3c-4d8e-a04a-d88d68ae5116", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14508", "type": "seen", "source": "https://t.me/thehackernews/786", "content": "Multiple Critical Flaws Reported in Enterprise-Grade Industrial VPNs Could Let Remote Attackers Target Critical Infrastructures.\n\nDetails: https://thehackernews.com/2020/07/industrial-vpn-security.html\n\nReported Flaws Are:\nCVE-2020-14500\nCVE-2020-14508\nCVE-2020-14510\nCVE-2020-14512\nCVE-2020-14511\nCVE-2020-14498", "creation_timestamp": "2020-07-29T13:18:51.000000Z"}]}