{"containers":{"cna":{"affected":[{"product":"FactoryTalk View SE","vendor":"Rockwell Automation","versions":[{"lessThanOrEqual":"9.0","status":"affected","version":"unspecified","versionType":"custom"},{"status":"affected","version":"10.0"}]}],"datePublic":"2020-06-25T00:00:00.000Z","descriptions":[{"lang":"en","value":"The DeskLock tool provided with FactoryTalk View SE uses a weak encryption algorithm that may allow a local, authenticated attacker to decipher user credentials, including the Windows user or Windows DeskLock passwords. If the compromised user has an administrative account, an attacker could gain full access to the user’s operating system and certain components of FactoryTalk View SE."}],"problemTypes":[{"descriptions":[{"cweId":"CWE-261","description":"CWE-261 Weak Cryptography for Passwords","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-02-24T18:27:13.000Z","orgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","shortName":"icscert"},"references":[{"tags":["x_refsource_MISC"],"url":"https://www.cisa.gov/uscert/ics/advisories/icsa-20-177-03"}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 0.0.9"},"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"ics-cert@hq.dhs.gov","DATE_PUBLIC":"2020-06-25T16:00:00.000Z","ID":"CVE-2020-14481","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"FactoryTalk View SE","version":{"version_data":[{"version_affected":"<=","version_value":"9.0"},{"version_affected":"=","version_value":"10.0"}]}}]},"vendor_name":"Rockwell Automation"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The DeskLock tool provided with FactoryTalk View SE uses a weak encryption algorithm that may allow a local, authenticated attacker to decipher user credentials, including the Windows user or Windows DeskLock passwords. If the compromised user has an administrative account, an attacker could gain full access to the user’s operating system and certain components of FactoryTalk View SE."}]},"generator":{"engine":"Vulnogram 0.0.9"},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-261 Weak Cryptography for Passwords"}]}]},"references":{"reference_data":[{"name":"https://www.cisa.gov/uscert/ics/advisories/icsa-20-177-03","refsource":"MISC","url":"https://www.cisa.gov/uscert/ics/advisories/icsa-20-177-03"}]},"source":{"discovery":"UNKNOWN"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T12:46:34.655Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.cisa.gov/uscert/ics/advisories/icsa-20-177-03"}]},{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":7.8,"attackVector":"LOCAL","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"LOW","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-04-17T17:50:09.307435Z","id":"CVE-2020-14481","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-17T18:47:56.750Z"}}]},"cveMetadata":{"assignerOrgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","assignerShortName":"icscert","cveId":"CVE-2020-14481","datePublished":"2022-02-24T18:27:13.935Z","dateReserved":"2020-06-19T00:00:00.000Z","dateUpdated":"2025-04-17T18:47:56.750Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}