Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-7491

EPSS 0.25% · P48
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-7491

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
**VERSION NOT SUPPORTED WHEN ASSIGNED** A legacy debug port account in TCMs installed in Tricon system versions 10.2.0 through 10.5.3 is visible on the network and could allow inappropriate access. This vulnerability was remediated in TCM version 10.5.4.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Schneider Electric Tricon TCM Model 信息泄露漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Schneider Electric Tricon TCM Model 4351等都是法国施耐德电气(Schneider Electric)公司的一款通信模块。 Schneider Electric Tricon TCM Model中存在安全漏洞,该漏洞源于程序的旧版调试端口帐户在网络上可见。攻击者可利用该漏洞进行不正当访问。以下产品及版本受到影响:Schneider Electric Tricon TCM Model 4351(安装在Tricon v10.0版本至v10.5.3版本);4352(安装在T
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-Tricon system versions 10.2.0 through 10.5.3 Tricon system versions 10.2.0 through 10.5.3 -

II. Public POCs for CVE-2020-7491

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-7491

登录查看更多情报信息。

Same Patch Batch · n/a · 2020-07-23 · 29 CVEs total

CVE-2020-15917Claws Mail 安全漏洞
CVE-2020-15908Cauldron Development cbang 路径遍历漏洞
CVE-2020-15688Embedthis Software GoAhead 安全漏洞
CVE-2020-15887Munkireport Software Update SQL注入漏洞
CVE-2020-15886Munkireport reportdata SQL注入漏洞
CVE-2020-15885Munkireport comment 跨站脚本漏洞
CVE-2020-15884Munkireport SQL注入漏洞
CVE-2020-15883Munkireport managedinstalls 跨站脚本漏洞
CVE-2020-15882Munkireport 跨站请求伪造漏洞
CVE-2020-15881Munkireport munki_facts 跨站脚本漏洞
CVE-2020-11440Wind River Systems VxWorks WebCLI 信息泄露漏洞
CVE-2020-15912Tesla Model 3 安全漏洞
CVE-2020-12638多款Espressif产品授权问题漏洞
CVE-2020-15916Tenda AC15 AC1900 操作系统命令注入漏洞
CVE-2020-7519Schneider Electric Easergy Builder 安全漏洞
CVE-2019-18834WordPress WooCommerce Subscriptions 跨站脚本漏洞
CVE-2020-15391DevSpace 授权问题漏洞
CVE-2020-15477RaspberryTortoise WebControl 注入漏洞
CVE-2020-15492INNEO Solutions INNEO Startup TOOLS 2018 M040 路径遍历漏洞
CVE-2020-11623AvertX Auto focus Night Vision HD Indoor/Outdoor IP Dome Camera HD838和HD438 安全漏洞

Showing top 20 of 29 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2020-7491

No comments yet


Leave a comment