ID

VAR-202002-1226


CVE

CVE-2020-6970


TITLE

Emerson OpenEnterprise SCADA Server Buffer Overflow Vulnerability

Trust: 0.8

sources: IVD: 068866e6-31a8-4e1f-8661-0851e0aa77ef // CNVD: CNVD-2020-13044

DESCRIPTION

A Heap-based Buffer Overflow was found in Emerson OpenEnterprise SCADA Server 2.83 (if Modbus or ROC Interfaces have been installed and are in use) and all versions of OpenEnterprise 3.1 through 3.3.3, where a specially crafted script could execute code on the OpenEnterprise Server. Emerson OpenEnterprise SCADA Server Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Emerson Electric OpenEnterprise SCADA Server is a set of data acquisition and monitoring system (SCADA) servers for remote oil and gas applications from Emerson Electric. The vulnerability originates from a network system or product that incorrectly validates data boundaries when performing operations on memory, causing incorrect read and write operations to be performed on other associated memory locations. An attacker could use this vulnerability to cause a buffer overflow or heap overflow

Trust: 2.34

sources: NVD: CVE-2020-6970 // JVNDB: JVNDB-2020-002270 // CNVD: CNVD-2020-13044 // IVD: 068866e6-31a8-4e1f-8661-0851e0aa77ef

IOT TAXONOMY

category:['ICS', 'Network device']sub_category: -

Trust: 0.6

category:['ICS']sub_category: -

Trust: 0.2

sources: IVD: 068866e6-31a8-4e1f-8661-0851e0aa77ef // CNVD: CNVD-2020-13044

AFFECTED PRODUCTS

vendor:emersonmodel:openenterprise scada serverscope:gteversion:3.1

Trust: 1.0

vendor:emersonmodel:openenterprise scada serverscope:lteversion:3.3.3

Trust: 1.0

vendor:emersonmodel:openenterprise scada serverscope:eqversion:2.8.3

Trust: 1.0

vendor:emersonmodel:openenterprise scada serverscope:eqversion:2.83

Trust: 0.8

vendor:emersonmodel:openenterprise scada serverscope:eqversion:3.1 から 3.3.3

Trust: 0.8

vendor:emersonmodel:electric openenterprisescope:gteversion:3.1,<=3.3.3

Trust: 0.6

vendor:emersonmodel:electric openenterprise scada serverscope:eqversion:2.83

Trust: 0.6

vendor:openenterprise scada servermodel: - scope:eqversion:2.8.3

Trust: 0.2

vendor:openenterprise scada servermodel: - scope:eqversion:*

Trust: 0.2

sources: IVD: 068866e6-31a8-4e1f-8661-0851e0aa77ef // CNVD: CNVD-2020-13044 // JVNDB: JVNDB-2020-002270 // NVD: CVE-2020-6970

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-6970
value: CRITICAL

Trust: 1.0

NVD: JVNDB-2020-002270
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2020-13044
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202002-923
value: CRITICAL

Trust: 0.6

IVD: 068866e6-31a8-4e1f-8661-0851e0aa77ef
value: HIGH

Trust: 0.2

nvd@nist.gov: CVE-2020-6970
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: JVNDB-2020-002270
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2020-13044
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 068866e6-31a8-4e1f-8661-0851e0aa77ef
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

nvd@nist.gov: CVE-2020-6970
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: JVNDB-2020-002270
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: IVD: 068866e6-31a8-4e1f-8661-0851e0aa77ef // CNVD: CNVD-2020-13044 // JVNDB: JVNDB-2020-002270 // CNNVD: CNNVD-202002-923 // NVD: CVE-2020-6970

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.8

problemtype:CWE-122

Trust: 1.0

sources: JVNDB: JVNDB-2020-002270 // NVD: CVE-2020-6970

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202002-923

TYPE

Buffer error

Trust: 0.8

sources: IVD: 068866e6-31a8-4e1f-8661-0851e0aa77ef // CNNVD: CNNVD-202002-923

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-002270

PATCH

title:OpenEnterprise SCADA Systemsurl:https://www.emerson.com/en-us/catalog/emerson-openenterprise-scada-systems

Trust: 0.8

title:Patch for Emerson OpenEnterprise SCADA Server Buffer Overflow Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/203833

Trust: 0.6

title:Emerson Electric OpenEnterprise SCADA Server Buffer error vulnerability fixurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=110747

Trust: 0.6

sources: CNVD: CNVD-2020-13044 // JVNDB: JVNDB-2020-002270 // CNNVD: CNNVD-202002-923

EXTERNAL IDS

db:NVDid:CVE-2020-6970

Trust: 3.2

db:ICS CERTid:ICSA-20-049-02

Trust: 3.0

db:CNVDid:CNVD-2020-13044

Trust: 0.8

db:CNNVDid:CNNVD-202002-923

Trust: 0.8

db:JVNDBid:JVNDB-2020-002270

Trust: 0.8

db:AUSCERTid:ESB-2020.0626

Trust: 0.6

db:NSFOCUSid:47489

Trust: 0.6

db:IVDid:068866E6-31A8-4E1F-8661-0851E0AA77EF

Trust: 0.2

sources: IVD: 068866e6-31a8-4e1f-8661-0851e0aa77ef // CNVD: CNVD-2020-13044 // JVNDB: JVNDB-2020-002270 // CNNVD: CNNVD-202002-923 // NVD: CVE-2020-6970

REFERENCES

url:https://www.us-cert.gov/ics/advisories/icsa-20-049-02

Trust: 3.0

url:https://nvd.nist.gov/vuln/detail/cve-2020-6970

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-6970

Trust: 0.8

url:http://www.nsfocus.net/vulndb/47489

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.0626/

Trust: 0.6

sources: CNVD: CNVD-2020-13044 // JVNDB: JVNDB-2020-002270 // CNNVD: CNNVD-202002-923 // NVD: CVE-2020-6970

SOURCES

db:IVDid:068866e6-31a8-4e1f-8661-0851e0aa77ef
db:CNVDid:CNVD-2020-13044
db:JVNDBid:JVNDB-2020-002270
db:CNNVDid:CNNVD-202002-923
db:NVDid:CVE-2020-6970

LAST UPDATE DATE

2024-11-23T22:41:10.627000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2020-13044date:2020-02-24T00:00:00
db:JVNDBid:JVNDB-2020-002270date:2020-03-10T00:00:00
db:CNNVDid:CNNVD-202002-923date:2020-08-07T00:00:00
db:NVDid:CVE-2020-6970date:2024-11-21T05:36:24.560

SOURCES RELEASE DATE

db:IVDid:068866e6-31a8-4e1f-8661-0851e0aa77efdate:2020-02-18T00:00:00
db:CNVDid:CNVD-2020-13044date:2020-02-24T00:00:00
db:JVNDBid:JVNDB-2020-002270date:2020-03-10T00:00:00
db:CNNVDid:CNNVD-202002-923date:2020-02-18T00:00:00
db:NVDid:CVE-2020-6970date:2020-02-19T21:15:11.653