First published: Thu Feb 24 2022(Updated: )
The web interface of the 1734-AENTR communication module is vulnerable to stored XSS. A remote, unauthenticated attacker could store a malicious script within the web interface that, when executed, could modify some string values on the homepage of the web interface.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Rockwell Automation Series B | ||
Rockwell Automation Series C | ||
Rockwell Automation 1734-AENTR Point I/O Dual Port Network Adapter Series B Firmware | >=4.001<=4.005 | |
Rockwell Automation 1734-AENTR Point I/O Dual Port Network Adapter Series B Firmware | >=5.011<=5.017 | |
Rockwell Automation 1734-AENTR Point I/O Dual Port Network Adaptor Series B | ||
Rockwell Automation 1734-AENTR Point I/O Dual Port Network Adaptor Series C Firmware | =6.011 | |
Rockwell Automation 1734-AENTR Point I/O Dual Port Network Adaptor Series C Firmware | =6.012 | |
Rockwell Automation 1734-AENTR Point I/O Dual Port Network Adaptor Series C |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-14502 has a high severity due to its stored XSS vulnerability allowing remote, unauthenticated attackers to manipulate the web interface.
To fix CVE-2020-14502, update the firmware of the affected Rockwell Automation devices to versions outside the vulnerable ranges.
CVE-2020-14502 affects Rockwell Automation's 1734-AENTR communication module, specifically Series B firmware versions 4.001 to 4.005 and 5.011 to 5.017.
Yes, attackers can exploit CVE-2020-14502 without authentication, allowing them to execute malicious scripts stored in the web interface.
The potential impacts of CVE-2020-14502 include altering the presentation of the web interface and potentially executing harmful scripts on users' browsers.