CVE-2020-25193

By having access to the hard-coded cryptographic key for GE Reason RT430, RT431 & RT434 GNSS clocks in firmware versions prior to version 08A06, attackers would be able to intercept and decrypt encrypted traffic through an HTTPS connection.
References
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:ge:rt430_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:ge:rt430:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:ge:rt431_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:ge:rt431:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:ge:rt434_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:ge:rt434:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2022-03-18 18:15

Updated : 2024-11-21 05:17


NVD link : CVE-2020-25193

Mitre link : CVE-2020-25193

CVE.ORG link : CVE-2020-25193


JSON object : View

Products Affected

ge

  • rt431_firmware
  • rt430_firmware
  • rt430
  • rt434
  • rt434_firmware
  • rt431
CWE
CWE-321

Use of Hard-coded Cryptographic Key

CWE-798

Use of Hard-coded Credentials