Description
This vulnerability allows remote attackers to execute arbitrary code on affected installations of C-MORE HMI EA9 Firmware version 6.52 touch screen panels. Authentication is not required to exploit this vulnerability. The specific flaw exists within the control service, which listens on TCP port 9999 by default. The issue results from the lack of authentication prior to allowing alterations to the system configuration. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-10493.
Published: 2020-07-23
Score: 9.8 Critical
EPSS: 21.6% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

No history.

Subscriptions

Automationdirect C-more Hmi Ea9 Firmware Ea9-pgmsw Ea9-rhmi Ea9-t10cl Ea9-t10wcl Ea9-t12cl Ea9-t15cl Ea9-t15cl-r Ea9-t6cl Ea9-t6cl-r Ea9-t7cl Ea9-t7cl-r Ea9-t8cl
cve-icon MITRE

Status: PUBLISHED

Assigner: zdi

Published:

Updated: 2024-08-04T11:14:15.788Z

Reserved: 2020-03-24T00:00:00.000Z

Link: CVE-2020-10920

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-07-23T16:15:12.257

Modified: 2024-11-21T04:56:22.320

Link: CVE-2020-10920

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses