Lucene search

K
cve[email protected]CVE-2020-7485
HistoryApr 16, 2020 - 7:15 p.m.

CVE-2020-7485

2020-04-1619:15:34
web.nvd.nist.gov
33
cve-2020-7485
nvd
tristation
software
security
vulnerability

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

61.8%

VERSION NOT SUPPORTED WHEN ASSIGNED A legacy support account in the TriStation software version v4.9.0 and earlier could cause improper access to the TriStation host machine. This was addressed in TriStation version v4.9.1 and v4.10.1 released on May 30, 2013.1

Affected configurations

NVD
Node
microsoftwindows_7Match-
OR
microsoftwindows_ntMatch-
OR
microsoftwindows_xpMatch-
AND
schneider-electrictristation_1131Range1.0.04.9.0
OR
schneider-electrictristation_1131Match4.10.0
OR
schneider-electrictristation_1131Match4.12.0

CNA Affected

[
  {
    "product": "TriStation TS1131 (v4.0.0 to v4.9.0, v4.10.0)",
    "vendor": "n/a",
    "versions": [
      {
        "status": "affected",
        "version": "TriStation TS1131 (v4.0.0 to v4.9.0, v4.10.0)"
      }
    ]
  }
]

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

61.8%

Related for CVE-2020-7485