Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2020-14504


The web interface of the 1734-AENTR communication module mishandles authentication for HTTP POST requests. A remote, unauthenticated attacker can send a crafted request that may allow for modification of the configuration settings.


Published

2022-02-24T19:15:08.943

Last Modified

2025-04-17T19:15:50.580

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 5.3 (MEDIUM)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:N/I:P/A:N

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: PARTIAL
  • Availability Impact: NONE
Exploitability Score

10.0

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-284
  • Type: Secondary
    CWE-287
  • Type: Primary
    CWE-287

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System rockwellautomation 1734-aentr_point_i\/o_dual_port_network_adaptor_series_b_firmware ≤ 4.005 Yes
Operating System rockwellautomation 1734-aentr_point_i\/o_dual_port_network_adaptor_series_b_firmware ≤ 5.017 Yes
Hardware rockwellautomation 1734-aentr_point_i\/o_dual_port_network_adaptor_series_b - No
Operating System rockwellautomation 1734-aentr_point_i\/o_dual_port_network_adaptor_series_c_firmware 6.011 Yes
Operating System rockwellautomation 1734-aentr_point_i\/o_dual_port_network_adaptor_series_c_firmware 6.012 Yes
Hardware rockwellautomation 1734-aentr_point_i\/o_dual_port_network_adaptor_series_c - No

References