ID

VAR-202009-0219


CVE

CVE-2020-13500


TITLE

AVEVA eDNA Enterprise Data Historian SQL Injection Vulnerability (CNVD-2025-24160)

Trust: 0.6

sources: CNVD: CNVD-2025-24160

DESCRIPTION

SQL injection vulnerability exists in the CHaD.asmx web service functionality of eDNA Enterprise Data Historian 3.0.1.2/7.5.4989.33053. Specially crafted SOAP web requests can cause SQL injections resulting in data compromise. Parameter ClassName in CHaD.asmx is vulnerable to unauthenticated SQL injection attacks. Aveva eDNA Enterprise Data Historian is a real-time historical data management software from AVEVA (Aveva) in the UK. The software can collect, store, process, and display asset-related information to provide better information for decision-making. The vulnerability stems from the lack of validation of externally input SQL statements in database-based applications. An attacker can exploit this vulnerability to execute illegal SQL commands. A remote attacker could send specially-crafted SQL statements, which could allow the malicious user to view, add, modify or delete information in the back-end database

Trust: 2.07

sources: NVD: CVE-2020-13500 // CNVD: CNVD-2025-24160 // CNNVD: CNNVD-202009-669 // VULMON: CVE-2020-13500

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-24160

AFFECTED PRODUCTS

vendor:avevamodel:edna enterprise data historianscope:eqversion:3.0.1.2\/7.5.4989.33053

Trust: 1.0

vendor:avevamodel:edna enterprise data historianscope:eqversion:3.0.1.2/7.5.4989.33053

Trust: 0.6

sources: CNVD: CNVD-2025-24160 // NVD: CVE-2020-13500

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-13500
value: CRITICAL

Trust: 1.0

talos-cna@cisco.com: CVE-2020-13500
value: CRITICAL

Trust: 1.0

CNVD: CNVD-2025-24160
value: HIGH

Trust: 0.6

CNNVD: CNNVD-202009-669
value: CRITICAL

Trust: 0.6

VULMON: CVE-2020-13500
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2020-13500
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

CNVD: CNVD-2025-24160
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2020-13500
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

talos-cna@cisco.com: CVE-2020-13500
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.0

sources: CNVD: CNVD-2025-24160 // VULMON: CVE-2020-13500 // CNNVD: CNNVD-202009-669 // NVD: CVE-2020-13500 // NVD: CVE-2020-13500

PROBLEMTYPE DATA

problemtype:CWE-89

Trust: 1.0

sources: NVD: CVE-2020-13500

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202009-669

TYPE

SQL injection

Trust: 0.6

sources: CNNVD: CNNVD-202009-669

PATCH

title:Patch for AVEVA eDNA Enterprise Data Historian SQL Injection Vulnerability (CNVD-2025-24160)url:https://www.cnvd.org.cn/patchInfo/show/743386

Trust: 0.6

title:AVEVA Web sql Repair measures for injecting vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=128113

Trust: 0.6

sources: CNVD: CNVD-2025-24160 // CNNVD: CNNVD-202009-669

EXTERNAL IDS

db:NVDid:CVE-2020-13500

Trust: 2.3

db:TALOSid:TALOS-2020-1106

Trust: 1.7

db:ICS CERTid:ICSA-20-254-01

Trust: 1.7

db:CNVDid:CNVD-2025-24160

Trust: 0.6

db:AUSCERTid:ESB-2020.3141

Trust: 0.6

db:CNNVDid:CNNVD-202009-669

Trust: 0.6

db:VULMONid:CVE-2020-13500

Trust: 0.1

sources: CNVD: CNVD-2025-24160 // VULMON: CVE-2020-13500 // CNNVD: CNNVD-202009-669 // NVD: CVE-2020-13500

REFERENCES

url:https://talosintelligence.com/vulnerability_reports/talos-2020-1106

Trust: 2.3

url:https://us-cert.cisa.gov/ics/advisories/icsa-20-254-01

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2020-13500

Trust: 1.2

url:https://www.auscert.org.au/bulletins/esb-2020.3141/

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/89.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/188128

Trust: 0.1

sources: CNVD: CNVD-2025-24160 // VULMON: CVE-2020-13500 // CNNVD: CNNVD-202009-669 // NVD: CVE-2020-13500

CREDITS

Discovered by Yuri Kramarz of Cisco Talos.

Trust: 0.6

sources: CNNVD: CNNVD-202009-669

SOURCES

db:CNVDid:CNVD-2025-24160
db:VULMONid:CVE-2020-13500
db:CNNVDid:CNNVD-202009-669
db:NVDid:CVE-2020-13500

LAST UPDATE DATE

2025-12-19T22:48:37.875000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-24160date:2025-10-17T00:00:00
db:VULMONid:CVE-2020-13500date:2020-09-30T00:00:00
db:CNNVDid:CNNVD-202009-669date:2022-03-08T00:00:00
db:NVDid:CVE-2020-13500date:2024-11-21T05:01:23.213

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-24160date:2025-10-17T00:00:00
db:VULMONid:CVE-2020-13500date:2020-09-24T00:00:00
db:CNNVDid:CNNVD-202009-669date:2020-09-10T00:00:00
db:NVDid:CVE-2020-13500date:2020-09-24T15:15:13.377