CVE-2020-25193

By having access to the hard-coded cryptographic key for GE Reason RT430, RT431 & RT434 GNSS clocks in firmware versions prior to version 08A06, attackers would be able to intercept and decrypt encrypted traffic through an HTTPS connection.
References
Link Resource
https://www.gegridsolutions.com/app/DownloadFile.aspx?prod=RT430&type=21&file=5 Permissions Required
https://www.cisa.gov/uscert/ics/advisories/icsa-21-005-03 Mitigation Third Party Advisory US Government Resource
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:ge:rt430_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:ge:rt430:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:ge:rt431_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:ge:rt431:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:ge:rt434_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:ge:rt434:-:*:*:*:*:*:*:*

Information

Published : 2022-03-18 11:15

Updated : 2022-10-21 11:30


NVD link : CVE-2020-25193

Mitre link : CVE-2020-25193


JSON object : View

CWE
CWE-798

Use of Hard-coded Credentials

Advertisement

dedicated server usa

Products Affected

ge

  • rt430
  • rt434_firmware
  • rt431
  • rt431_firmware
  • rt434
  • rt430_firmware