Description
A code injection vulnerability exists in one of the webpages in GE Reason RT430, RT431 & RT434 GNSS clocks in firmware versions prior to version 08A06 that could allow an authenticated remote attacker to execute arbitrary code on the system.
Published: 2022-03-18
Score: 9.8 Critical
EPSS: 3.6% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

GE strongly recommends users of Reason RT43X products update their units to firmware Version 08A06 or greater to resolve these issues. The firmware update addresses both vulnerabilities as described in the Reason RT43X 08A06 Release Notes. Please see GE publication GES-2020-006 (login required) for more details on these issues.


Vendor Workaround

GE recommends users evaluate current risk and implement appropriate network security mitigation measures as follows. The following mitigation actions do not ensure complete security but should be considered until the affected time synchronization product is upgraded: Use strong network and physical security protection to prevent an attacker from reaching the local network where Reason RT43X clocks are normally installed. Block TCP/IP Ports 80 and 443 to block the HTTP/HTTPS access to web interface with Reason RT43X products, avoiding all the vulnerabilities. This TCP/IP port blocking should be limited to the Ethernet port interface where the Reason RT43X clock is connected (e.g., using Access Control List (ACL)). Otherwise, other HTTP/HTTPS applications may be affected. Minimize network exposure for all control system devices and/or systems and ensure they are not accessible from the Internet. Analyze security events to early detect unexpected traffic/communication.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2020-17888 A code injection vulnerability exists in one of the webpages in GE Reason RT430, RT431 & RT434 GNSS clocks in firmware versions prior to version 08A06 that could allow an authenticated remote attacker to execute arbitrary code on the system.
History

Wed, 16 Apr 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Ge Rt430 Rt430 Firmware Rt431 Rt431 Firmware Rt434 Rt434 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-04-16T16:41:36.185Z

Reserved: 2020-09-04T00:00:00.000Z

Link: CVE-2020-25197

cve-icon Vulnrichment

Updated: 2024-08-04T15:33:05.272Z

cve-icon NVD

Status : Modified

Published: 2022-03-18T18:15:09.417

Modified: 2024-11-21T05:17:37.293

Link: CVE-2020-25197

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses