ID

VAR-202002-1232


CVE

CVE-2020-8768


TITLE

Phoenix Contact Emalytics Controller ILC 2050 BI and BI-L Vulnerability in improper permission assignment for critical resources in

Trust: 0.8

sources: JVNDB: JVNDB-2020-002273

DESCRIPTION

An issue was discovered on Phoenix Contact Emalytics Controller ILC 2050 BI before 1.2.3 and BI-L before 1.2.3 devices. There is an insecure mechanism for read and write access to the configuration of the device. The mechanism can be discovered by examining a link on the website of the device. Phoenix Contact Emalytics Controller ILC 2050 BI and BI-L Includes a vulnerability in improper permission assignment for critical resources.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. from Phoenix Contact, Germany

Trust: 2.34

sources: NVD: CVE-2020-8768 // JVNDB: JVNDB-2020-002273 // CNVD: CNVD-2020-15266 // IVD: 8f42ef3b-5420-40d4-8459-5e5d7f2ffa88

IOT TAXONOMY

category:['ICS', 'Network device']sub_category: -

Trust: 0.6

category:['ICS']sub_category: -

Trust: 0.2

sources: IVD: 8f42ef3b-5420-40d4-8459-5e5d7f2ffa88 // CNVD: CNVD-2020-15266

AFFECTED PRODUCTS

vendor:phoenixcontactmodel:ilc 2050 bi-lscope:ltversion:1.2.3

Trust: 1.0

vendor:phoenixcontactmodel:ilc 2050 biscope:ltversion:1.2.3

Trust: 1.0

vendor:phoenix contactmodel:ilc 2050 biscope:eqversion:1.2.3

Trust: 0.8

vendor:phoenix contactmodel:ilc 2050 bi-lscope:eqversion:1.2.3

Trust: 0.8

vendor:phoenixmodel:contact emalytics controller ilc biscope:eqversion:2050<1.2.3

Trust: 0.6

vendor:phoenixmodel:contact emalytics controller ilc bi-lscope:eqversion:2050<1.2.3

Trust: 0.6

vendor:phoenixcontactmodel:ilc 2050 bi-lscope:eqversion: -

Trust: 0.6

vendor:phoenixcontactmodel:ilc 2050 biscope:eqversion: -

Trust: 0.6

vendor:ilc 2050 bimodel: - scope:eqversion:*

Trust: 0.2

vendor:ilc 2050 bi lmodel: - scope:eqversion:*

Trust: 0.2

sources: IVD: 8f42ef3b-5420-40d4-8459-5e5d7f2ffa88 // CNVD: CNVD-2020-15266 // JVNDB: JVNDB-2020-002273 // CNNVD: CNNVD-202002-872 // NVD: CVE-2020-8768

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-8768
value: CRITICAL

Trust: 1.0

NVD: JVNDB-2020-002273
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2020-15266
value: HIGH

Trust: 0.6

CNNVD: CNNVD-202002-872
value: CRITICAL

Trust: 0.6

IVD: 8f42ef3b-5420-40d4-8459-5e5d7f2ffa88
value: HIGH

Trust: 0.2

nvd@nist.gov: CVE-2020-8768
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: JVNDB-2020-002273
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2020-15266
severity: HIGH
baseScore: 9.7
vectorString: AV:N/AC:L/AU:N/C:P/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 9.5
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 8f42ef3b-5420-40d4-8459-5e5d7f2ffa88
severity: HIGH
baseScore: 9.7
vectorString: AV:N/AC:L/AU:N/C:P/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 9.5
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

nvd@nist.gov: CVE-2020-8768
baseSeverity: CRITICAL
baseScore: 9.4
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.5
version: 3.1

Trust: 1.0

NVD: JVNDB-2020-002273
baseSeverity: CRITICAL
baseScore: 9.4
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: IVD: 8f42ef3b-5420-40d4-8459-5e5d7f2ffa88 // CNVD: CNVD-2020-15266 // JVNDB: JVNDB-2020-002273 // CNNVD: CNNVD-202002-872 // NVD: CVE-2020-8768

PROBLEMTYPE DATA

problemtype:CWE-732

Trust: 1.8

sources: JVNDB: JVNDB-2020-002273 // NVD: CVE-2020-8768

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202002-872

TYPE

other

Trust: 0.8

sources: IVD: 8f42ef3b-5420-40d4-8459-5e5d7f2ffa88 // CNNVD: CNNVD-202002-872

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-002273

PATCH

title:VDE-2020-001url:https://cert.vde.com/de-de/advisories/vde-2020-001

Trust: 0.8

title:Patch for Phoenix Contact Emalytics Controller ILC 2050 BI and BI-L Permission Assignment Incorrect Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/206801

Trust: 0.6

title:Phoenix Contact Emalytics Controller ILC 2050 BI and BI-L Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=110738

Trust: 0.6

sources: CNVD: CNVD-2020-15266 // JVNDB: JVNDB-2020-002273 // CNNVD: CNNVD-202002-872

EXTERNAL IDS

db:NVDid:CVE-2020-8768

Trust: 3.2

db:ICS CERTid:ICSA-20-063-02

Trust: 2.4

db:CERT@VDEid:VDE-2020-001

Trust: 2.2

db:CNVDid:CNVD-2020-15266

Trust: 0.8

db:CNNVDid:CNNVD-202002-872

Trust: 0.8

db:JVNDBid:JVNDB-2020-002273

Trust: 0.8

db:NSFOCUSid:46076

Trust: 0.6

db:AUSCERTid:ESB-2020.0777

Trust: 0.6

db:IVDid:8F42EF3B-5420-40D4-8459-5E5D7F2FFA88

Trust: 0.2

sources: IVD: 8f42ef3b-5420-40d4-8459-5e5d7f2ffa88 // CNVD: CNVD-2020-15266 // JVNDB: JVNDB-2020-002273 // CNNVD: CNNVD-202002-872 // NVD: CVE-2020-8768

REFERENCES

url:https://www.us-cert.gov/ics/advisories/icsa-20-063-02

Trust: 2.4

url:https://cert.vde.com/de-de/advisories/vde-2020-001

Trust: 2.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-8768

Trust: 2.0

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-8768

Trust: 0.8

url:https://www.auscert.org.au/bulletins/esb-2020.0777/

Trust: 0.6

url:http://www.nsfocus.net/vulndb/46076

Trust: 0.6

sources: CNVD: CNVD-2020-15266 // JVNDB: JVNDB-2020-002273 // CNNVD: CNNVD-202002-872 // NVD: CVE-2020-8768

SOURCES

db:IVDid:8f42ef3b-5420-40d4-8459-5e5d7f2ffa88
db:CNVDid:CNVD-2020-15266
db:JVNDBid:JVNDB-2020-002273
db:CNNVDid:CNNVD-202002-872
db:NVDid:CVE-2020-8768

LAST UPDATE DATE

2024-11-23T21:51:38.941000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2020-15266date:2020-03-04T00:00:00
db:JVNDBid:JVNDB-2020-002273date:2020-03-26T00:00:00
db:CNNVDid:CNNVD-202002-872date:2020-03-12T00:00:00
db:NVDid:CVE-2020-8768date:2024-11-21T05:39:24.313

SOURCES RELEASE DATE

db:IVDid:8f42ef3b-5420-40d4-8459-5e5d7f2ffa88date:2020-02-17T00:00:00
db:CNVDid:CNVD-2020-15266date:2020-03-04T00:00:00
db:JVNDBid:JVNDB-2020-002273date:2020-03-10T00:00:00
db:CNNVDid:CNNVD-202002-872date:2020-02-17T00:00:00
db:NVDid:CVE-2020-8768date:2020-02-17T21:15:13.587