ID CVE-2020-16244
Summary GE Digital APM Classic, Versions 4.4 and prior. Salt is not used for hash calculation of passwords, making it possible to decrypt passwords. This design flaw, along with the IDOR vulnerability, puts the entire platform at high risk because an authenticated user can retrieve all user account data and then retrieve the actual passwords.
References
Vulnerable Configurations
  • cpe:2.3:a:ge:asset_performance_management_classic:4.4:*:*:*:*:*:*:*
    cpe:2.3:a:ge:asset_performance_management_classic:4.4:*:*:*:*:*:*:*
CVSS
Base: 4.0 (as of 22-11-2021 - 16:27)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW SINGLE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
cvss-vector via4 AV:N/AC:L/Au:S/C:P/I:N/A:N
refmap via4
misc https://us-cert.cisa.gov/ics/advisories/icsa-20-266-01
Last major update 22-11-2021 - 16:27
Published 23-09-2020 - 14:15
Last modified 22-11-2021 - 16:27
Back to Top