{"api_version":"1","generated_at":"2026-04-23T10:56:50+00:00","cve":"CVE-2020-10640","urls":{"html":"https://cve.report/CVE-2020-10640","api":"https://cve.report/api/cve/CVE-2020-10640.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2020-10640","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2020-10640"},"summary":{"title":"CVE-2020-10640","description":"Emerson OpenEnterprise versions through 3.3.4 may allow an attacker to run an arbitrary commands with system privileges or perform remote code execution via a specific communication service.","state":"PUBLIC","assigner":"ics-cert@hq.dhs.gov","published_at":"2022-02-24 19:15:00","updated_at":"2022-03-04 18:22:00"},"problem_types":["CWE-306"],"metrics":[],"references":[{"url":"https://www.cisa.gov/uscert/ics/advisories/icsa-20-140-02","name":"https://www.cisa.gov/uscert/ics/advisories/icsa-20-140-02","refsource":"CONFIRM","tags":[],"title":"Emerson OpenEnterprise | CISA","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2020-10640","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-10640","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"LEGACY","value":"Roman Lozko of Kaspersky reported these vulnerabilities to Emerson.","lang":""}],"nvd_cpes":[{"cve_year":"2020","cve_id":"10640","vulnerable":"1","versionEndIncluding":"3.3.4","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"emerson","cpe5":"openenterprise_scada_server","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"ics-cert@hq.dhs.gov","ID":"CVE-2020-10640","STATE":"PUBLIC","TITLE":"ICSA-20-140-02 Emerson OpenEnterprise"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"OpenEnterprise SCADA Software","version":{"version_data":[{"version_affected":"<=","version_value":"3.3.4"}]}}]},"vendor_name":"Emerson"}]}},"credit":[{"lang":"eng","value":"Roman Lozko of Kaspersky reported these vulnerabilities to Emerson."}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Emerson OpenEnterprise versions through 3.3.4 may allow an attacker to run an arbitrary commands with system privileges or perform remote code execution via a specific communication service."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":10,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-306: Missing Authentication for Critical Function"}]}]},"references":{"reference_data":[{"name":"https://www.cisa.gov/uscert/ics/advisories/icsa-20-140-02","refsource":"CONFIRM","url":"https://www.cisa.gov/uscert/ics/advisories/icsa-20-140-02"}]},"solution":[{"lang":"eng","value":"Emerson recommends all users upgrade to OpenEnterprise 3.3, Service Pack 5 (3.3.5), to resolve these issues. OpenEnterprise Service Packs are available to users with access to the Emerson SupportNet system (login required). Details will be found in the downloads area.\n\nPlease send any questions via a SupportNet ticket or by contacting Emerson at US 800-537-9313. For users outside of the United States, please use international toll-free numbers."}],"source":{"advisory":"ICSA-20-140-02","discovery":"EXTERNAL"}},"nvd":{"publishedDate":"2022-02-24 19:15:00","lastModifiedDate":"2022-03-04 18:22:00","problem_types":["CWE-306"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE","baseScore":10},"severity":"HIGH","exploitabilityScore":10,"impactScore":10,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:emerson:openenterprise_scada_server:*:*:*:*:*:*:*:*","versionEndIncluding":"3.3.4","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2020","CveId":"10640","Ordinal":"171059","Title":"CVE-2020-10640","CVE":"CVE-2020-10640","Year":"2020"},"notes":[{"CveYear":"2020","CveId":"10640","Ordinal":"1","NoteData":"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","Type":"Description","Title":null}]}}}