First published: Tue Oct 20 2020(Updated: )
The affected Reason S20 Ethernet Switch is vulnerable to cross-site scripting (XSS), which may allow attackers to trick users into following a link or navigating to a page that posts a malicious JavaScript statement to the vulnerable site, causing the malicious JavaScript to be rendered by the site and executed by the victim client.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Ge S2020 Firmware | <07a06 | |
GE S2020 | ||
Ge S2024 Firmware | <07a06 | |
Ge S2024 | ||
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-16246 is a vulnerability in the Reason S20 Ethernet Switch that allows attackers to execute malicious JavaScript on the vulnerable site through cross-site scripting (XSS) attacks.
CVE-2020-16246 works by tricking users into visiting a page or following a link that contains a malicious JavaScript statement, which is then rendered by the vulnerable site.
CVE-2020-16246 has a severity rating of 6.1, which is considered medium.
The Ge S2020 and Ge S2024 Ethernet Switches with firmware versions up to 07a06 are affected by CVE-2020-16246.
No, the Ge S2020 and Ge S2024 Ethernet Switches themselves are not vulnerable.
To fix CVE-2020-16246, it is recommended to update the firmware of the affected Reason S20 Ethernet Switch to a version that is not vulnerable.
You can find more information about CVE-2020-16246 at the following link: [https://us-cert.cisa.gov/ics/advisories/icsa-20-266-02](https://us-cert.cisa.gov/ics/advisories/icsa-20-266-02)