← Back to CVEs
CVE-2020-25159
CRITICAL9.8
Description
499ES EtherNet/IP (ENIP) Adaptor Source Code is vulnerable to a stack-based buffer overflow, which may allow an attacker to send a specially crafted packet that may result in a denial-of-service condition or code execution.
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published11/24/2020
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
rtautomation:499es_ethernet\/ip_adaptorrtautomation:499es_ethernet\/ip_adaptor_firmware
Weaknesses (CWE)
CWE-121CWE-787
References
https://us-cert.cisa.gov/ics/advisories/icsa-20-324-03(ics-cert@hq.dhs.gov)
https://us-cert.cisa.gov/ics/advisories/icsa-20-324-03(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.