{"api_version":"1","generated_at":"2026-04-23T10:56:51+00:00","cve":"CVE-2020-10632","urls":{"html":"https://cve.report/CVE-2020-10632","api":"https://cve.report/api/cve/CVE-2020-10632.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2020-10632","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2020-10632"},"summary":{"title":"CVE-2020-10632","description":"Inadequate folder security permissions in Emerson OpenEnterprise versions through 3.3.4 may allow modification of important configuration files, which could cause the system to fail or behave in an unpredictable manner.","state":"PUBLIC","assigner":"ics-cert@hq.dhs.gov","published_at":"2022-02-24 19:15:00","updated_at":"2022-03-07 19:58:00"},"problem_types":["NVD-CWE-Other"],"metrics":[],"references":[{"url":"https://www.cisa.gov/uscert/ics/advisories/icsa-20-140-02","name":"https://www.cisa.gov/uscert/ics/advisories/icsa-20-140-02","refsource":"CONFIRM","tags":[],"title":"Emerson OpenEnterprise | CISA","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2020-10632","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-10632","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"LEGACY","value":"Roman Lozko of Kaspersky reported these vulnerabilities to Emerson.","lang":""}],"nvd_cpes":[{"cve_year":"2020","cve_id":"10632","vulnerable":"1","versionEndIncluding":"3.3.4","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"emerson","cpe5":"openenterprise_scada_server","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"ics-cert@hq.dhs.gov","ID":"CVE-2020-10632","STATE":"PUBLIC","TITLE":"ICSA-20-140-02 Emerson OpenEnterprise"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"OpenEnterprise SCADA Software","version":{"version_data":[{"version_affected":"<=","version_value":"3.3.4"}]}}]},"vendor_name":"Emerson"}]}},"credit":[{"lang":"eng","value":"Roman Lozko of Kaspersky reported these vulnerabilities to Emerson."}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Inadequate folder security permissions in Emerson OpenEnterprise versions through 3.3.4 may allow modification of important configuration files, which could cause the system to fail or behave in an unpredictable manner."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-282: Improper Ownership Management"}]}]},"references":{"reference_data":[{"name":"https://www.cisa.gov/uscert/ics/advisories/icsa-20-140-02","refsource":"CONFIRM","url":"https://www.cisa.gov/uscert/ics/advisories/icsa-20-140-02"}]},"solution":[{"lang":"eng","value":"Emerson recommends all users upgrade to OpenEnterprise 3.3, Service Pack 5 (3.3.5), to resolve these issues. OpenEnterprise Service Packs are available to users with access to the Emerson SupportNet system (login required). Details will be found in the downloads area.\n\nPlease send any questions via a SupportNet ticket or by contacting Emerson at US 800-537-9313. For users outside of the United States, please use international toll-free numbers."}],"source":{"advisory":"ICSA-20-140-02","discovery":"EXTERNAL"}},"nvd":{"publishedDate":"2022-02-24 19:15:00","lastModifiedDate":"2022-03-07 19:58:00","problem_types":["NVD-CWE-Other"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":5.3,"baseSeverity":"MEDIUM"},"exploitabilityScore":3.9,"impactScore":1.4},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":5},"severity":"MEDIUM","exploitabilityScore":10,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:emerson:openenterprise_scada_server:*:*:*:*:*:*:*:*","versionEndIncluding":"3.3.4","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2020","CveId":"10632","Ordinal":"171051","Title":"CVE-2020-10632","CVE":"CVE-2020-10632","Year":"2020"},"notes":[{"CveYear":"2020","CveId":"10632","Ordinal":"1","NoteData":"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","Type":"Description","Title":null}]}}}