{"vulnerability": "CVE-2020-1451", "sightings": [{"uuid": "d6934b6b-df55-4b98-842a-c6b4e14ab847", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1451", "type": "seen", "source": "Telegram/Km9gcRJ-PStd5h4tHMmt4rQnkSox9bnmGNHQu_1h5QIrVDU9", "content": "", "creation_timestamp": "2025-03-02T11:46:28.000000Z"}, {"uuid": "b8045484-7a89-4b19-b23c-2389a4104af2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2020-14513", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-26-076-01", "content": "", "creation_timestamp": "2026-03-17T12:00:00.000000Z"}, {"uuid": "20398293-601e-425b-81e3-f1812942f085", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2020-14515", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-26-076-01", "content": "", "creation_timestamp": "2026-03-17T12:00:00.000000Z"}, {"uuid": "72a1da71-b392-4d44-ba78-80f560bdc079", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2020-14517", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-26-076-01", "content": "", "creation_timestamp": "2026-03-17T12:00:00.000000Z"}, {"uuid": "e3e0a7c8-cd6f-4279-a5f5-4e7abd7253cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2020-14519", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-26-076-01", "content": "", "creation_timestamp": "2026-03-17T12:00:00.000000Z"}, {"uuid": "8c50c964-5afc-4317-a111-c7e6759806f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14510", "type": "seen", "source": "https://t.me/cKure/1568", "content": "\u25a0\u25a0\u25a0\u25a0\u25a0 ICS-SCADA: Aka BootHole, an industrial VPN Flaws Could Let Attackers Target Infrastructure nodes.\n\nCVE-2020-14500\nCVE-2020-14508\nCVE-2020-14510\nCVE-2020-14512\nCVE-2020-14511\nCVE-2020-14498\n\nhttps://thehackernews.com/2020/07/industrial-vpn-security.html", "creation_timestamp": "2020-07-31T07:51:27.000000Z"}, {"uuid": "b6fe390a-d7b6-4f3c-8755-dcdb1511e644", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14512", "type": "seen", "source": "https://t.me/cKure/1568", "content": "\u25a0\u25a0\u25a0\u25a0\u25a0 ICS-SCADA: Aka BootHole, an industrial VPN Flaws Could Let Attackers Target Infrastructure nodes.\n\nCVE-2020-14500\nCVE-2020-14508\nCVE-2020-14510\nCVE-2020-14512\nCVE-2020-14511\nCVE-2020-14498\n\nhttps://thehackernews.com/2020/07/industrial-vpn-security.html", "creation_timestamp": "2020-07-31T07:51:27.000000Z"}, {"uuid": "22e17a37-7692-43c5-81fa-666f03c7d95b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14510", "type": "seen", "source": "https://t.me/Yemen_Shield/120", "content": "Multiple Critical Flaws Reported in Enterprise-Grade Industrial VPNs Could Let Remote Attackers Target Critical Infrastructures.\n\nDetails: https://thehackernews.com/2020/07/industrial-vpn-security.html\n\nReported Flaws Are:\nCVE-2020-14500\nCVE-2020-14508\nCVE-2020-14510\nCVE-2020-14512\nCVE-2020-14511\nCVE-2020-14498", "creation_timestamp": "2020-07-29T21:40:39.000000Z"}, {"uuid": "a94d4c25-2b74-4354-93e7-ffdaef0be45e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14512", "type": "seen", "source": "https://t.me/Yemen_Shield/120", "content": "Multiple Critical Flaws Reported in Enterprise-Grade Industrial VPNs Could Let Remote Attackers Target Critical Infrastructures.\n\nDetails: https://thehackernews.com/2020/07/industrial-vpn-security.html\n\nReported Flaws Are:\nCVE-2020-14500\nCVE-2020-14508\nCVE-2020-14510\nCVE-2020-14512\nCVE-2020-14511\nCVE-2020-14498", "creation_timestamp": "2020-07-29T21:40:39.000000Z"}, {"uuid": "9c15b5cf-c9a5-4dc5-a4b5-b4761434a0f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14511", "type": "seen", "source": "https://t.me/cKure/1568", "content": "\u25a0\u25a0\u25a0\u25a0\u25a0 ICS-SCADA: Aka BootHole, an industrial VPN Flaws Could Let Attackers Target Infrastructure nodes.\n\nCVE-2020-14500\nCVE-2020-14508\nCVE-2020-14510\nCVE-2020-14512\nCVE-2020-14511\nCVE-2020-14498\n\nhttps://thehackernews.com/2020/07/industrial-vpn-security.html", "creation_timestamp": "2020-07-31T07:51:27.000000Z"}, {"uuid": "f4a64527-f32b-4375-9d30-d843a9939fe4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14511", "type": "seen", "source": "https://t.me/Yemen_Shield/120", "content": "Multiple Critical Flaws Reported in Enterprise-Grade Industrial VPNs Could Let Remote Attackers Target Critical Infrastructures.\n\nDetails: https://thehackernews.com/2020/07/industrial-vpn-security.html\n\nReported Flaws Are:\nCVE-2020-14500\nCVE-2020-14508\nCVE-2020-14510\nCVE-2020-14512\nCVE-2020-14511\nCVE-2020-14498", "creation_timestamp": "2020-07-29T21:40:39.000000Z"}, {"uuid": "2530d155-e6e1-466b-a5d4-144fc8263d06", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1451", "type": "seen", "source": "Telegram/ddGcu0PbjdPFti98YC4iBSnigFXoQU08u0uyhA05vZPyYFv5", "content": "", "creation_timestamp": "2025-03-02T11:46:28.000000Z"}, {"uuid": "7e1417cc-aade-48d7-8f66-adaf4013a3a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14511", "type": "seen", "source": "https://t.me/true_secator/802", "content": "\u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f Claroty, \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0437\u0438\u0440\u0443\u044e\u0449\u0430\u044f\u0441\u044f \u043d\u0430 \u043f\u0440\u043e\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u043e\u0442\u0447\u0435\u0442, \u0432 \u043a\u043e\u0442\u043e\u0440\u043e\u043c \u043e\u043f\u0438\u0441\u0430\u043b\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u043d\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u0440\u0435\u0448\u0435\u043d\u0438\u044f\u0445 VPN \u0434\u043b\u044f \u043f\u0440\u043e\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u044b\u0445 \u0441\u0435\u0442\u0435\u0439. \u041f\u043e\u0434\u043e\u0431\u043d\u044b\u0435 \u0440\u0435\u0448\u0435\u043d\u0438\u044f \u043e\u0440\u0438\u0435\u043d\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u044b, \u0432 \u043e\u0441\u043d\u043e\u0432\u043d\u043e\u043c, \u043d\u0430 \u0410\u0421\u0423 \u0422\u041f (ICS).\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u044b\u0435 VPN \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u044b \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442\u0441\u044f \u0432 \u043d\u0435\u0444\u0442\u044f\u043d\u043e\u0439 \u0438 \u0433\u0430\u0437\u043e\u0432\u043e\u0439 \u043e\u0442\u0440\u0430\u0441\u043b\u044f\u0445, \u0432\u043e\u0434\u043e- \u0438 \u044d\u043b\u0435\u043a\u0442\u0440\u043e\u0441\u043d\u0430\u0431\u0436\u0435\u043d\u0438\u0438 - \u0432 \u043e\u0431\u0449\u0435\u043c, \u0432 \u0431\u043e\u043b\u0435\u0435 \u0447\u0435\u043c \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u0441\u0444\u0435\u0440\u0430\u0445 \u0441\u043e\u0432\u0440\u0435\u043c\u0435\u043d\u043d\u043e\u0439 \u0436\u0438\u0437\u043d\u0438.\n\n\u041e\u0448\u0438\u0431\u043a\u0438 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u044b \u0432 Secomea GateManager, Moxa EDR-G902 \u0438 EDR-G903, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0432 VPN-\u043a\u043b\u0438\u0435\u043d\u0442\u0435 eCatcher \u0440\u0435\u0448\u0435\u043d\u0438\u044f eWon \u043e\u0442 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 HMS Networks.  \n\n\u0422\u0430\u043a, \u0432 Secomea GateManager \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2020-14500, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0432 \u0441\u0438\u043b\u0443 \u043d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u043e\u0439 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0438 \u0437\u0430\u0433\u043e\u043b\u043e\u0432\u043a\u043e\u0432 HTTP-\u0437\u0430\u043f\u0440\u043e\u0441\u043e\u0432 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0434\u043e\u0431\u0438\u0442\u044c\u0441\u044f \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043a\u043e\u0434\u0430 \u0432 \u0430\u0442\u0430\u043a\u0443\u0435\u043c\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u0435, \u043f\u0440\u0438\u0447\u0435\u043c \u0431\u0435\u0437 \u0432\u0441\u044f\u043a\u043e\u0433\u043e \u043f\u0440\u043e\u0445\u043e\u0436\u0434\u0435\u043d\u0438\u044f \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438.\n\n\u0412 Moxa EDR-G902 \u0438 EDR-G903 \u043d\u0430\u0439\u0434\u0435\u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2020-14511, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u0431\u0443\u0444\u0435\u0440\u0430 \u0432 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0435 \u043d\u0430\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0433\u043e HTTP-\u0437\u0430\u043f\u0440\u043e\u0441\u0430 \u0438 \u043e\u043f\u044f\u0442\u044c \u0436\u0435 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0445\u0430\u043a\u0435\u0440\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043a\u043e\u0434. \n\n\u041d\u0443 \u0438, CVE-2020-14498 \u0432 VPN-\u043a\u043b\u0438\u0435\u043d\u0442\u0435 eCatcher \u0442\u0430\u043a\u0436\u0435 \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u0431\u0443\u0444\u0435\u0440\u0430 \u0438 RCE.\n\n\u041a \u0441\u0447\u0430\u0441\u0442\u044c\u044e, \u0432\u0441\u0435 \u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0438 \u043e\u0448\u0438\u0431\u043e\u043a \u0431\u044b\u043b\u0438 \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u044b \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0430\u043c \u0438 \u043a \u043d\u0430\u0441\u0442\u043e\u044f\u0449\u0435\u043c\u0443 \u0432\u0440\u0435\u043c\u0435\u043d\u0438 \u043e\u043d\u0438 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u044b. \u041d\u043e, \u0432\u043e-\u043f\u0435\u0440\u0432\u044b\u0445,  \u043a\u0430\u043a \u043c\u044b \u0437\u043d\u0430\u0435\u043c, \u0434\u0430\u043b\u0435\u043a\u043e \u043d\u0435 \u0432\u0441\u0435 \u041f\u041e \u0441\u0432\u043e\u0435\u0432\u0440\u0435\u043c\u0435\u043d\u043d\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u043c\u0438 \u043b\u0438\u0446\u0430\u043c\u0438. \u0410 \u0432\u043e-\u0432\u0442\u043e\u0440\u044b\u0445, \u0441\u043a\u043e\u043b\u044c\u043a\u043e \u0435\u0449\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0438\u043c\u0435\u0435\u0442\u0441\u044f \u0432 \u043f\u0440\u043e\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0445 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f - \u043e\u0434\u043d\u043e\u043c\u0443 \u041c\u0438\u0442\u043d\u0438\u043a\u0443 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u043e.", "creation_timestamp": "2020-07-29T18:15:25.000000Z"}, {"uuid": "2ef1313d-b4de-443e-91a5-ed4cc9068db3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14516", "type": "seen", "source": "https://t.me/cibsecurity/25141", "content": "\u203c CVE-2020-14516 \u203c\n\nIn Rockwell Automation FactoryTalk Services Platform Versions 6.10.00 and 6.11.00, there is an issue with the implementation of the SHA-256 hashing algorithm with FactoryTalk Services Platform that prevents the user password from being hashed properly.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-03-18T21:32:29.000000Z"}, {"uuid": "00eb7c91-93b8-4488-9dd0-b4b043dc8d85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14511", "type": "seen", "source": "https://t.me/thehackernews/786", "content": "Multiple Critical Flaws Reported in Enterprise-Grade Industrial VPNs Could Let Remote Attackers Target Critical Infrastructures.\n\nDetails: https://thehackernews.com/2020/07/industrial-vpn-security.html\n\nReported Flaws Are:\nCVE-2020-14500\nCVE-2020-14508\nCVE-2020-14510\nCVE-2020-14512\nCVE-2020-14511\nCVE-2020-14498", "creation_timestamp": "2020-07-29T13:18:51.000000Z"}, {"uuid": "d2f0b2ee-bf7e-48b7-8f0f-663a24b40188", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14512", "type": "seen", "source": "https://t.me/thehackernews/786", "content": "Multiple Critical Flaws Reported in Enterprise-Grade Industrial VPNs Could Let Remote Attackers Target Critical Infrastructures.\n\nDetails: https://thehackernews.com/2020/07/industrial-vpn-security.html\n\nReported Flaws Are:\nCVE-2020-14500\nCVE-2020-14508\nCVE-2020-14510\nCVE-2020-14512\nCVE-2020-14511\nCVE-2020-14498", "creation_timestamp": "2020-07-29T13:18:51.000000Z"}, {"uuid": "9586bfaa-091b-4124-99d4-c07d73b50976", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14510", "type": "seen", "source": "https://t.me/thehackernews/786", "content": "Multiple Critical Flaws Reported in Enterprise-Grade Industrial VPNs Could Let Remote Attackers Target Critical Infrastructures.\n\nDetails: https://thehackernews.com/2020/07/industrial-vpn-security.html\n\nReported Flaws Are:\nCVE-2020-14500\nCVE-2020-14508\nCVE-2020-14510\nCVE-2020-14512\nCVE-2020-14511\nCVE-2020-14498", "creation_timestamp": "2020-07-29T13:18:51.000000Z"}]}