A code injection vulnerability exists in one of the webpages in GE Reason RT430, RT431 & RT434 GNSS clocks in firmware versions prior to version 08A06 that could allow an authenticated remote attacker to execute arbitrary code on the system.
Advisories
Source ID Title
EUVD EUVD EUVD-2020-17888 A code injection vulnerability exists in one of the webpages in GE Reason RT430, RT431 & RT434 GNSS clocks in firmware versions prior to version 08A06 that could allow an authenticated remote attacker to execute arbitrary code on the system.
Fixes

Solution

GE strongly recommends users of Reason RT43X products update their units to firmware Version 08A06 or greater to resolve these issues. The firmware update addresses both vulnerabilities as described in the Reason RT43X 08A06 Release Notes. Please see GE publication GES-2020-006 (login required) for more details on these issues.


Workaround

GE recommends users evaluate current risk and implement appropriate network security mitigation measures as follows. The following mitigation actions do not ensure complete security but should be considered until the affected time synchronization product is upgraded: Use strong network and physical security protection to prevent an attacker from reaching the local network where Reason RT43X clocks are normally installed. Block TCP/IP Ports 80 and 443 to block the HTTP/HTTPS access to web interface with Reason RT43X products, avoiding all the vulnerabilities. This TCP/IP port blocking should be limited to the Ethernet port interface where the Reason RT43X clock is connected (e.g., using Access Control List (ACL)). Otherwise, other HTTP/HTTPS applications may be affected. Minimize network exposure for all control system devices and/or systems and ensure they are not accessible from the Internet. Analyze security events to early detect unexpected traffic/communication.

History

Wed, 16 Apr 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-04-16T16:41:36.185Z

Reserved: 2020-09-04T00:00:00.000Z

Link: CVE-2020-25197

cve-icon Vulnrichment

Updated: 2024-08-04T15:33:05.272Z

cve-icon NVD

Status : Modified

Published: 2022-03-18T18:15:09.417

Modified: 2024-11-21T05:17:37.293

Link: CVE-2020-25197

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.