A buffer overflow vulnerability was found in some devices of Hirschmann Automation and Control HiOS and HiSecOS. The vulnerability is due to improper parsing of URL arguments. An attacker could exploit this vulnerability by specially crafting HTTP requests to overflow an internal buffer. The following devices using HiOS Version 07.0.02 and lower are affected: RSP, RSPE, RSPS, RSPL, MSP, EES, EES, EESX, GRS, OS, RED. The following devices using HiSecOS Version 03.2.00 and lower are affected: EAGLE20/30.
References
Link | Resource |
---|---|
https://www.us-cert.gov/ics/advisories/icsa-20-091-01 | Mitigation Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Information
Published : 2020-04-03 12:15
Updated : 2021-06-17 10:22
NVD link : CVE-2020-6994
Mitre link : CVE-2020-6994
JSON object : View
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Products Affected
belden
- hirschmann_hios
- hirschmann_rail_switch_power_enhanced
- hirschmann_mice_switch_power
- hirschmann_hisecos
- hirschmann_embedded_ethernet_switch_extended
- hirschmann_rail_switch_power
- hirschmann_rail_switch_power_lite
- hirschmann_embedded_ethernet_switch
- hirschmann_octopus
- hirschmann_eagle20
- hirschmann_prp_redbox
- hirschmann_greyhound_swtich
- hirschmann_eagle30
- hirschmann_rail_switch_power_smart