By having access to the hard-coded cryptographic key for GE Reason RT430, RT431 & RT434 GNSS clocks in firmware versions prior to version 08A06, attackers would be able to intercept and decrypt encrypted traffic through an HTTPS connection.
References
Link | Resource |
---|---|
https://www.gegridsolutions.com/app/DownloadFile.aspx?prod=RT430&type=21&file=5 | Permissions Required |
https://www.cisa.gov/uscert/ics/advisories/icsa-21-005-03 | Mitigation Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Information
Published : 2022-03-18 11:15
Updated : 2022-10-21 11:30
NVD link : CVE-2020-25193
Mitre link : CVE-2020-25193
JSON object : View
CWE
CWE-798
Use of Hard-coded Credentials
Products Affected
ge
- rt430
- rt434_firmware
- rt431
- rt431_firmware
- rt434
- rt430_firmware