CVE-2020-25193

By having access to the hard-coded cryptographic key for GE Reason RT430, RT431 & RT434 GNSS clocks in firmware versions prior to version 08A06, attackers would be able to intercept and decrypt encrypted traffic through an HTTPS connection.
References
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:ge:rt430_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:ge:rt430:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:ge:rt431_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:ge:rt431:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:ge:rt434_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:ge:rt434:-:*:*:*:*:*:*:*

History

21 Nov 2024, 05:17

Type Values Removed Values Added
References () https://www.cisa.gov/uscert/ics/advisories/icsa-21-005-03 - Mitigation, Third Party Advisory, US Government Resource () https://www.cisa.gov/uscert/ics/advisories/icsa-21-005-03 - Mitigation, Third Party Advisory, US Government Resource
References () https://www.gegridsolutions.com/app/DownloadFile.aspx?prod=RT430&type=21&file=5 - Permissions Required () https://www.gegridsolutions.com/app/DownloadFile.aspx?prod=RT430&type=21&file=5 - Permissions Required

Information

Published : 2022-03-18 18:15

Updated : 2024-11-21 05:17


NVD link : CVE-2020-25193

Mitre link : CVE-2020-25193

CVE.ORG link : CVE-2020-25193


JSON object : View

Products Affected

ge

  • rt434_firmware
  • rt434
  • rt430
  • rt431_firmware
  • rt431
  • rt430_firmware
CWE
CWE-321

Use of Hard-coded Cryptographic Key

CWE-798

Use of Hard-coded Credentials