Endress+Hauser Ecograph T (Neutral/Private Label) (RSG35, ORSG35) with Firmware version prior to V2.0.0 is prone to improper privilege management. The affected device has a web-based user interface with a role-based access system. Users with different roles have different write and read privileges. The access system is based on dynamic "tokens". The vulnerability is that user sessions are not closed correctly and a user with fewer rights is assigned the higher rights when he logs on.
Advisories
Source ID Title
EUVD EUVD EUVD-2020-4797 Endress+Hauser Ecograph T (Neutral/Private Label) (RSG35, ORSG35) with Firmware version prior to V2.0.0 is prone to improper privilege management. The affected device has a web-based user interface with a role-based access system. Users with different roles have different write and read privileges. The access system is based on dynamic "tokens". The vulnerability is that user sessions are not closed correctly and a user with fewer rights is assigned the higher rights when he logs on.
Fixes

Solution

Endress+Hauser will not change this behavior. Customers are recommended to take the measures for Temporary Fix / Mitigation as described above.


Workaround

Customers should configure a perimeter firewall to block traffic from untrusted networks and users to the device. These recommendations will be incorporated into the device documentation (operating instructions). Change default password for operator, service and admin account.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: CERTVDE

Published:

Updated: 2024-09-16T18:19:18.832Z

Reserved: 2020-04-30T00:00:00

Link: CVE-2020-12495

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-11-19T18:15:13.740

Modified: 2024-11-21T04:59:48.040

Link: CVE-2020-12495

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.