First published: Fri Mar 18 2022(Updated: )
By having access to the hard-coded cryptographic key for GE Reason RT430, RT431 & RT434 GNSS clocks in firmware versions prior to version 08A06, attackers would be able to intercept and decrypt encrypted traffic through an HTTPS connection.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Ge Rt430 Firmware | <08a06 | |
Ge Rt430 | ||
Ge Rt431 Firmware | <08a06 | |
Ge Rt431 | ||
Ge Rt434 Firmware | <08a06 | |
Ge Rt434 | ||
GE RT430, RT431 & RT434: All firmware versions prior to Version 08A06 |
GE strongly recommends users of Reason RT43X products update their units to firmware Version 08A06 or greater to resolve these issues. The firmware update addresses both vulnerabilities as described in the Reason RT43X 08A06 Release Notes. Please see GE publication GES-2020-006 (login required) for more details on these issues.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-25193.
The severity of CVE-2020-25193 is medium, with a severity value of 5.3.
GE Reason RT430, RT431, and RT434 GNSS clocks with firmware versions prior to 08A06 are affected.
Attackers with access to the hard-coded cryptographic key can intercept and decrypt encrypted traffic through an HTTPS connection.
Update the firmware of GE Reason RT430, RT431, and RT434 GNSS clocks to version 08A06 or newer.