CVE-2020-12496

ENDRESS+HAUSER: Ecograph T utilizing Webserver firmware version 2.x exposures sensitive information to an unauthorized actor

Description

Endress+Hauser Ecograph T (Neutral/Private Label) (RSG35, ORSG35) and Memograph M (Neutral/Private Label) (RSG45, ORSG45) with Firmware version V2.0.0 and above is prone to exposure of sensitive information to an unauthorized actor. The firmware release has a dynamic token for each request submitted to the server, which makes repeating requests and analysis complex enough. Nevertheless, it's possible and during the analysis it was discovered that it also has an issue with the access-control matrix on the server-side. It was found that a user with low rights can get information from endpoints that should not be available to this user.

Remediation

Solution:

  • Endress+Hauser will not change this behavior. Customers are recommended to take the measures for Temporary Fix / Mitigation as described above.

Workaround:

  • Customers should configure a perimeter firewall to block traffic from untrusted networks and users to the device. These recommendations will be incorporated into the device documentation (operating instructions) Change default password for operator, service and admin account.

Category

6.5
CVSS
Severity: Medium
CVSS 3.1 •
CVSS 2.0 •
EPSS 0.33%
Vendor Advisory vde.com
Affected: Endress+Hauser RSG35 - Ecograph T
Affected: Endress+Hauser ORSG35 - Ecograph T Neutral/Private Label
Affected: Endress+Hauser RSG45 - Memograph M
Affected: Endress+Hauser ORSG45 - Memograph M Neutral/Private Label
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2020-12496?
CVE-2020-12496 has been scored as a medium severity vulnerability.
How to fix CVE-2020-12496?
To fix CVE-2020-12496: Endress+Hauser will not change this behavior. Customers are recommended to take the measures for Temporary Fix / Mitigation as described above.
Is CVE-2020-12496 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2020-12496 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2020-12496?
CVE-2020-12496 affects Endress+Hauser RSG35 - Ecograph T, Endress+Hauser ORSG35 - Ecograph T Neutral/Private Label, Endress+Hauser RSG45 - Memograph M, Endress+Hauser ORSG45 - Memograph M Neutral/Private Label.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.