The integrated server of the ZGR TPS200 NG on its 2.00 firmware version and 1.01 hardware version, allows a remote attacker to perform actions with the permissions of a victim user. For this to happen, the victim user has to have an active session and triggers the malicious request.
References
Link | Resource |
---|---|
https://www.incibe-cert.es/en/early-warning/ics-advisories/multiple-vulnerabilities-zgr-tps200-ng | Third Party Advisory VDB Entry |
https://www.incibe-cert.es/en/early-warning/ics-advisories/multiple-vulnerabilities-zgr-tps200-ng | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 05:39
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.incibe-cert.es/en/early-warning/ics-advisories/multiple-vulnerabilities-zgr-tps200-ng - Third Party Advisory, VDB Entry | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.6 |
Information
Published : 2022-10-17 22:15
Updated : 2024-11-21 05:39
NVD link : CVE-2020-8976
Mitre link : CVE-2020-8976
CVE.ORG link : CVE-2020-8976
JSON object : View
Products Affected
zigor
- zgr_tps200_ng_firmware
- zgr_tps200_ng
CWE
CWE-352
Cross-Site Request Forgery (CSRF)