Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-14483

EPSS 0.05% · P16
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-14483

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
A timeout during a TLS handshake can result in the connection failing to terminate. This can result in a Niagara thread hanging and requires a manual restart of Niagara (Versions 4.6.96.28, 4.7.109.20, 4.7.110.32, 4.8.0.110) and Niagara Enterprise Security (Versions 2.4.31, 2.4.45, 4.8.0.35) to correct.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
远程资源无超时同步访问
Source: NVD (National Vulnerability Database)
Vulnerability Title
Tridium Niagara和Niagara Enterprise Security 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Niagara是一套用于支持设备和应用程序连接的平台。 Tridium Niagara和Niagara Enterprise Security中存在安全漏洞,该漏洞源于在TLS握手期间超时,程序无法中断连接。攻击者可利用该漏洞导致Niagara线程挂起。以下产品及版本受到影响:Tridium Niagara 4.6.96.28版本,4.7.109.20版本,4.7.10.32版本,4.8.0.110版本;Niagara Enterprise Security 2.4.31版本,2.4.45版本,4.8.0
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-Niagara Niagara: Versions 4.6.96.28, 4.7.109.20, 4.7.110.32, 4.8.0.110 and Niagara Enterprise Security: Versions 2.4.31, 2.4.45, 4.8.0.35 -

II. Public POCs for CVE-2020-14483

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-14483

登录查看更多情报信息。

Same Patch Batch · n/a · 2020-08-13 · 97 CVEs total

CVE-2020-8708Intel Server Board、Server System和Compute Module 授权问题漏洞
CVE-2020-8707Intel Server Board、Server System和Compute Module 缓冲区错误漏洞
CVE-2020-8721Intel Server Board、Server System和Compute Module 输入验证错误漏洞
CVE-2020-8718Intel Server Board、Server System和Compute Module 缓冲区错误漏洞
CVE-2020-8722Intel Server Board、Server System和Compute Module 安全漏洞
CVE-2020-8732Intel Server Board、Server System和Compute Module 缓冲区错误漏洞
CVE-2020-8709Intel Server Board、Server System和Compute Module 授权问题漏洞
CVE-2020-8723Intel Server Board、Server System和Compute Module 跨站脚本漏洞
CVE-2020-8712Intel Server Board、Server System和Compute Module 缓冲区错误漏洞
CVE-2020-8730Intel Server Board、Server System和Compute Module 缓冲区错误漏洞
CVE-2020-8731Intel Server Board、Server System和Compute Module 安全漏洞
CVE-2020-8733Intel Server Board M10JNP2SB 缓冲区错误漏洞
CVE-2020-8736Intel Computing Improvement Program 安全漏洞
CVE-2020-8742Intel NUCs 输入验证错误漏洞
CVE-2020-8743Intel Mailbox Interface 安全漏洞
CVE-2020-8763Intel RealSense D400 Series Universal 安全漏洞
CVE-2020-12287Intel Distribution of OpenVINO(TM) Toolkit 安全漏洞
CVE-2020-17538Artifex Software Ghostscript 缓冲区错误漏洞
CVE-2020-16310Artifex Software Ghostscript 数字错误漏洞
CVE-2020-16309Artifex Software Ghostscript 缓冲区错误漏洞

Showing top 20 of 97 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2020-14483

No comments yet


Leave a comment