Severity: Medium
ID: 500626
Version: 1.1
Type: remote
Family: Tenable.ot
Published: 4/4/2022
Updated: 4/4/2022
Risk Factor: Low
Score: 3
Risk Factor: Medium
Base Score: 4.3
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
CVSS Score Source: CVE-2020-14502
Risk Factor: Medium
Base Score: 6.1
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CPE: cpe:/o:rockwellautomation:1734-aentr_point_i%2fo_dual_port_network_adaptor_series_b_firmware, cpe:/o:rockwellautomation:1734-aentr_point_i%2fo_dual_port_network_adaptor_series_c_firmware:6.011, cpe:/o:rockwellautomation:1734-aentr_point_i%2fo_dual_port_network_adaptor_series_c_firmware:6.012
Required KB Items: Tenable.ot/Rockwell
Exploit Ease: No known exploits are available
Patch Publication Date: 2/24/2022
Vulnerability Publication Date: 2/24/2022
CVE: CVE-2020-14502
CWE: 79