First published: Fri Jun 26 2020(Updated: )
ControlEdge PLC (R130.2, R140, R150, and R151) and RTU (R101, R110, R140, R150, and R151) exposes a session token on the network.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Honeywell Controledge Plc Firmware | =r130.2 | |
Honeywell Controledge Plc Firmware | =r140 | |
Honeywell Controledge Plc Firmware | =r150 | |
Honeywell Controledge Plc Firmware | =r151 | |
Honeywell ControlEdge PLC | ||
Honeywell Controledge Rtu Firmware | =r101 | |
Honeywell Controledge Rtu Firmware | =r110 | |
Honeywell Controledge Rtu Firmware | =r140 | |
Honeywell Controledge Rtu Firmware | =r150 | |
Honeywell Controledge Rtu Firmware | =r151 | |
Honeywell Controledge Rtu |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-10624.
CVE-2020-10624 has a severity rating of high with a value of 7.5.
ControlEdge PLC versions R130.2, R140, R150, and R151, as well as RTU versions R101, R110, R140, R150, and R151 are affected by CVE-2020-10624.
CVE-2020-10624 is a vulnerability in ControlEdge PLC and RTU devices that exposes a session token on the network.
You can find more information about CVE-2020-10624 on the US-CERT website at https://www.us-cert.gov/ics/advisories/icsa-20-175-02.