{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-09T15:57:19.621","vulnerabilities":[{"cve":{"id":"CVE-2020-12496","sourceIdentifier":"info@cert.vde.com","published":"2020-11-19T18:15:13.850","lastModified":"2024-11-21T04:59:48.160","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Endress+Hauser Ecograph T (Neutral/Private Label) (RSG35, ORSG35) and Memograph M (Neutral/Private Label) (RSG45, ORSG45) with Firmware version V2.0.0 and above is prone to exposure of sensitive information to an unauthorized actor. The firmware release has a dynamic token for each request submitted to the server, which makes repeating requests and analysis complex enough. Nevertheless, it's possible and during the analysis it was discovered that it also has an issue with the access-control matrix on the server-side. It was found that a user with low rights can get information from endpoints that should not be available to this user."},{"lang":"es","value":"Endress + Hauser Ecograph T (Neutral/Private Label) (RSG35, ORSG35) y Memograph M (Neutral/Private Label) (RSG45, ORSG45) con la versión de firmware V2.0.0 y superior, es propenso a exponer información confidencial a un actor no autorizado.&#xa0;La versión de firmware posee un token dinámico para cada petición enviada al servidor, lo que hace que las peticiones repetidas y el análisis sean lo suficientemente complejos.&#xa0;Sin embargo, es posible y durante el análisis se detectó que también tiene un problema con la matriz de control de acceso en el lado del servidor.&#xa0;Se encontró que un usuario con pocos derechos puede obtener información de los endpoints que no debería estar disponible para este usuario"}],"metrics":{"cvssMetricV31":[{"source":"info@cert.vde.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:N/A:N","baseScore":4.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"info@cert.vde.com","type":"Secondary","description":[{"lang":"en","value":"CWE-200"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-200"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:endress:rsg35_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"2.0.0","matchCriteriaId":"09972345-A856-4BCC-B649-EB93AEC89AB7"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:endress:rsg35:-:*:*:*:*:*:*:*","matchCriteriaId":"2FD4C836-D775-49B1-997C-5F1BE2DA3422"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:endress:rsg45_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"2.0.0","matchCriteriaId":"A2917E2E-DF23-419A-B1CF-AD39A49DC535"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:endress:rsg45:-:*:*:*:*:*:*:*","matchCriteriaId":"5BE8DDCA-3704-41B9-BE65-467DC0C832E3"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:endress:orsg35_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"2.0.0","matchCriteriaId":"47846DD8-45BF-4ECD-87C7-77E9CF32689F"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:endress:orsg35:-:*:*:*:*:*:*:*","matchCriteriaId":"BACEE257-8D0A-4EC7-9DC1-D7BFA2606717"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:endress:orsg45_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"2.0.0","matchCriteriaId":"EF6DB41B-E6A6-4E0B-B87E-EDD8FC9AF068"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:endress:orsg45:-:*:*:*:*:*:*:*","matchCriteriaId":"DF859810-2537-4704-91FD-35353063C562"}]}]}],"references":[{"url":"https://cert.vde.com/en-us/advisories/vde-2020-022","source":"info@cert.vde.com","tags":["Vendor Advisory"]},{"url":"https://cert.vde.com/en-us/advisories/vde-2020-022","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}