By having access to the hard-coded cryptographic key for GE Reason RT430, RT431 & RT434 GNSS clocks in firmware versions prior to version 08A06, attackers would be able to intercept and decrypt encrypted traffic through an HTTPS connection.
References
Link | Resource |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-21-005-03 | Mitigation Third Party Advisory US Government Resource |
https://www.gegridsolutions.com/app/DownloadFile.aspx?prod=RT430&type=21&file=5 | Permissions Required |
https://www.cisa.gov/uscert/ics/advisories/icsa-21-005-03 | Mitigation Third Party Advisory US Government Resource |
https://www.gegridsolutions.com/app/DownloadFile.aspx?prod=RT430&type=21&file=5 | Permissions Required |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
History
21 Nov 2024, 05:17
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.cisa.gov/uscert/ics/advisories/icsa-21-005-03 - Mitigation, Third Party Advisory, US Government Resource | |
References | () https://www.gegridsolutions.com/app/DownloadFile.aspx?prod=RT430&type=21&file=5 - Permissions Required |
Information
Published : 2022-03-18 18:15
Updated : 2024-11-21 05:17
NVD link : CVE-2020-25193
Mitre link : CVE-2020-25193
CVE.ORG link : CVE-2020-25193
JSON object : View
Products Affected
ge
- rt434_firmware
- rt434
- rt430
- rt431_firmware
- rt431
- rt430_firmware