CVE-2019-13524 (GCVE-0-2019-13524)
Vulnerability from cvelistv5 – Published: 2020-01-16 17:53 – Updated: 2024-08-04 23:57
VLAI?
Summary
GE PACSystems RX3i CPE100/115: All versions prior to R9.85,CPE302/305/310/330/400/410: All versions prior to R9.90,CRU/320 All versions(End of Life) may allow an attacker sending specially manipulated packets to cause the module state to change to halt-mode, resulting in a denial-of-service condition. An operator must reboot the CPU module after removing battery or energy pack to recover from halt-mode.
Severity ?
No CVSS data available.
CWE
- CWE-20 - IMPROPER INPUT VALIDATION CWE-20
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | GE PACSystems RX3i |
Affected:
CPE100/115: All versions prior to R9.85,CPE302/305/310/330/400/410: All versions prior to R9.90,CRU320 All versions(End of Life)
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T23:57:39.193Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-014-01"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "GE PACSystems RX3i",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "CPE100/115: All versions prior to R9.85,CPE302/305/310/330/400/410: All versions prior to R9.90,CRU320 All versions(End of Life)"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "GE PACSystems RX3i CPE100/115: All versions prior to R9.85,CPE302/305/310/330/400/410: All versions prior to R9.90,CRU/320 All versions(End of Life) may allow an attacker sending specially manipulated packets to cause the module state to change to halt-mode, resulting in a denial-of-service condition. An operator must reboot the CPU module after removing battery or energy pack to recover from halt-mode."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "IMPROPER INPUT VALIDATION CWE-20",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-01-16T17:53:12",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-014-01"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2019-13524",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "GE PACSystems RX3i",
"version": {
"version_data": [
{
"version_value": "CPE100/115: All versions prior to R9.85,CPE302/305/310/330/400/410: All versions prior to R9.90,CRU320 All versions(End of Life)"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "GE PACSystems RX3i CPE100/115: All versions prior to R9.85,CPE302/305/310/330/400/410: All versions prior to R9.90,CRU/320 All versions(End of Life) may allow an attacker sending specially manipulated packets to cause the module state to change to halt-mode, resulting in a denial-of-service condition. An operator must reboot the CPU module after removing battery or energy pack to recover from halt-mode."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "IMPROPER INPUT VALIDATION CWE-20"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.us-cert.gov/ics/advisories/icsa-20-014-01",
"refsource": "MISC",
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-014-01"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2019-13524",
"datePublished": "2020-01-16T17:53:12",
"dateReserved": "2019-07-11T00:00:00",
"dateUpdated": "2024-08-04T23:57:39.193Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:emerson:rx3i_cpe100_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"r9.85\", \"matchCriteriaId\": \"A6387FCD-2DCF-463C-B33B-B358FB98B797\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:emerson:rx3i_cpe100:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"55AC3482-F413-46C1-B7A9-94AFD3FE74AF\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:emerson:rx3i_cpe115_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"r9.85\", \"matchCriteriaId\": \"BFB6F671-24FF-46FC-AF19-BE980D0D0CC5\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:emerson:rx3i_cpe115:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1E25E3A8-646C-49A8-BEDF-2D5571F052C0\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:emerson:rx3i_cpe302_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"r9.90\", \"matchCriteriaId\": \"1FD748AB-A839-4087-A3B0-D4CF3213070F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:emerson:rx3i_cpe302:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8D8DE37E-EDBF-4994-9718-1995ADA80FB3\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:emerson:rx3i_cpe305_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"r9.90\", \"matchCriteriaId\": \"668BB816-3332-4AFE-87F5-8667047EE44A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:emerson:rx3i_cpe305:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D08D1771-812D-45CA-ACCD-E02E0B029B46\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:emerson:rx3i_cpe310_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"r9.90\", \"matchCriteriaId\": \"7BCDEDD6-EAE9-4526-89DA-205BA8B7F149\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:emerson:rx3i_cpe310:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BF9F7EB1-11C7-4408-BE93-56E6E953B1BF\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:emerson:rx3i_cru320_firmware:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1AD9F7EB-7C85-4E6A-B19F-A8964C806670\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:emerson:rx3i_cru320:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"858CA8BB-40ED-4946-BC15-718B5DBF8526\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:emerson:rx3i_cpe330_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"r9.90\", \"matchCriteriaId\": \"2B32ACB2-96DE-487B-BD5C-C5E1668A2ADC\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:emerson:rx3i_cpe330:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"28E7B680-787B-49A7-8646-03D295BE8427\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:emerson:rx3i_cpe400_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"r9.90\", \"matchCriteriaId\": \"65386F51-7D4C-437F-BE1A-0711A24F1904\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:emerson:rx3i_cpe400:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"477CD97E-67F9-4BBB-A994-9773C0BCB6F7\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:emerson:rx3i_cpl410_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"r9.90\", \"matchCriteriaId\": \"E877E300-75E8-4DA9-A264-E3E3ACFB59CC\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:emerson:rx3i_cpl410:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DC1A8F15-A711-4CD1-9032-CB9C5DE37A83\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"GE PACSystems RX3i CPE100/115: All versions prior to R9.85,CPE302/305/310/330/400/410: All versions prior to R9.90,CRU/320 All versions(End of Life) may allow an attacker sending specially manipulated packets to cause the module state to change to halt-mode, resulting in a denial-of-service condition. An operator must reboot the CPU module after removing battery or energy pack to recover from halt-mode.\"}, {\"lang\": \"es\", \"value\": \"GE PACSystems versi\\u00f3n RX3i CPE100/115: todas las versiones anteriores a R9.85,CPE302/305/310/330/400/410: todas las versiones anteriores a R9.90,CRU/320, todas las versiones (End of Life), pueden permitir a un atacante enviar paquetes especialmente manipulados para causar que el estado del m\\u00f3dulo cambie al modo halt, resultando en una condici\\u00f3n de denegaci\\u00f3n de servicio. Un operador necesita reiniciar el m\\u00f3dulo de la CPU despu\\u00e9s de quitar la bater\\u00eda o el paquete de energ\\u00eda para recuperase del modo halt.\"}]",
"id": "CVE-2019-13524",
"lastModified": "2024-11-21T04:25:04.417",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:C\", \"baseScore\": 7.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2020-01-16T18:15:11.463",
"references": "[{\"url\": \"https://www.us-cert.gov/ics/advisories/icsa-20-014-01\", \"source\": \"ics-cert@hq.dhs.gov\", \"tags\": [\"Patch\", \"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"https://www.us-cert.gov/ics/advisories/icsa-20-014-01\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\", \"US Government Resource\"]}]",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"ics-cert@hq.dhs.gov\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-20\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-20\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2019-13524\",\"sourceIdentifier\":\"ics-cert@hq.dhs.gov\",\"published\":\"2020-01-16T18:15:11.463\",\"lastModified\":\"2024-11-21T04:25:04.417\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"GE PACSystems RX3i CPE100/115: All versions prior to R9.85,CPE302/305/310/330/400/410: All versions prior to R9.90,CRU/320 All versions(End of Life) may allow an attacker sending specially manipulated packets to cause the module state to change to halt-mode, resulting in a denial-of-service condition. An operator must reboot the CPU module after removing battery or energy pack to recover from halt-mode.\"},{\"lang\":\"es\",\"value\":\"GE PACSystems versi\u00f3n RX3i CPE100/115: todas las versiones anteriores a R9.85,CPE302/305/310/330/400/410: todas las versiones anteriores a R9.90,CRU/320, todas las versiones (End of Life), pueden permitir a un atacante enviar paquetes especialmente manipulados para causar que el estado del m\u00f3dulo cambie al modo halt, resultando en una condici\u00f3n de denegaci\u00f3n de servicio. Un operador necesita reiniciar el m\u00f3dulo de la CPU despu\u00e9s de quitar la bater\u00eda o el paquete de energ\u00eda para recuperase del modo halt.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":7.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:emerson:rx3i_cpe100_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"r9.85\",\"matchCriteriaId\":\"A6387FCD-2DCF-463C-B33B-B358FB98B797\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:emerson:rx3i_cpe100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55AC3482-F413-46C1-B7A9-94AFD3FE74AF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:emerson:rx3i_cpe115_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"r9.85\",\"matchCriteriaId\":\"BFB6F671-24FF-46FC-AF19-BE980D0D0CC5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:emerson:rx3i_cpe115:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E25E3A8-646C-49A8-BEDF-2D5571F052C0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:emerson:rx3i_cpe302_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"r9.90\",\"matchCriteriaId\":\"1FD748AB-A839-4087-A3B0-D4CF3213070F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:emerson:rx3i_cpe302:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D8DE37E-EDBF-4994-9718-1995ADA80FB3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:emerson:rx3i_cpe305_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"r9.90\",\"matchCriteriaId\":\"668BB816-3332-4AFE-87F5-8667047EE44A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:emerson:rx3i_cpe305:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D08D1771-812D-45CA-ACCD-E02E0B029B46\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:emerson:rx3i_cpe310_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"r9.90\",\"matchCriteriaId\":\"7BCDEDD6-EAE9-4526-89DA-205BA8B7F149\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:emerson:rx3i_cpe310:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF9F7EB1-11C7-4408-BE93-56E6E953B1BF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:emerson:rx3i_cru320_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AD9F7EB-7C85-4E6A-B19F-A8964C806670\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:emerson:rx3i_cru320:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"858CA8BB-40ED-4946-BC15-718B5DBF8526\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:emerson:rx3i_cpe330_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"r9.90\",\"matchCriteriaId\":\"2B32ACB2-96DE-487B-BD5C-C5E1668A2ADC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:emerson:rx3i_cpe330:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28E7B680-787B-49A7-8646-03D295BE8427\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:emerson:rx3i_cpe400_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"r9.90\",\"matchCriteriaId\":\"65386F51-7D4C-437F-BE1A-0711A24F1904\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:emerson:rx3i_cpe400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"477CD97E-67F9-4BBB-A994-9773C0BCB6F7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:emerson:rx3i_cpl410_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"r9.90\",\"matchCriteriaId\":\"E877E300-75E8-4DA9-A264-E3E3ACFB59CC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:emerson:rx3i_cpl410:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC1A8F15-A711-4CD1-9032-CB9C5DE37A83\"}]}]}],\"references\":[{\"url\":\"https://www.us-cert.gov/ics/advisories/icsa-20-014-01\",\"source\":\"ics-cert@hq.dhs.gov\",\"tags\":[\"Patch\",\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://www.us-cert.gov/ics/advisories/icsa-20-014-01\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\",\"US Government Resource\"]}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…