// For flags

CVE-2020-19417

Emerson Smart Wireless Gateway 1420 4.6.59 Privilege Escalation

Severity Score

8.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Emerson Smart Wireless Gateway 1420 4.6.59 allows non-privileged users (such as the default account 'maint') to perform administrative tasks by sending specially crafted HTTP requests to the application.

Emerson Smart Wireless Gateway versión 1420 4.6.59, permite a usuarios no privilegiados (como la cuenta predeterminada "maint") llevar a cabo tareas administrativas mediante el envío de peticiones HTTP especialmente diseñadas a la aplicación

Emerson Smart Wireless Gateway version 1420 4.6.59 suffers from a privilege escalation vulnerability.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-08-13 CVE Reserved
  • 2021-03-09 CVE Published
  • 2024-01-31 EPSS Updated
  • 2024-08-04 CVE Updated
  • 2024-08-04 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Emerson
Search vendor "Emerson"
Wireless 1420 Gateway Firmware
Search vendor "Emerson" for product "Wireless 1420 Gateway Firmware"
4.6.59
Search vendor "Emerson" for product "Wireless 1420 Gateway Firmware" and version "4.6.59"
-
Affected
in Emerson
Search vendor "Emerson"
Wireless 1420 Gateway
Search vendor "Emerson" for product "Wireless 1420 Gateway"
--
Safe