Schneider Electric TriStation 1131 4.10.1

CPE Details

Schneider Electric TriStation 1131 4.10.1
4.10.1
2021-11-09
14h30 +00:00
2021-11-09
17h15 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:schneider-electric:tristation_1131:4.10.1:*:*:*:*:*:*:*

Informations

Vendor

schneider-electric

Product

tristation_1131

Version

4.10.1

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2020-7484 2020-04-15 19h03 +00:00 **VERSION NOT SUPPORTED WHEN ASSIGNED** A vulnerability with the former 'password' feature could allow a denial of service attack if the user is not following documented guidelines pertaining to dedicated TriStation connection and key-switch protection. This vulnerability was discovered and remediated in versions v4.9.1 and v4.10.1 on May 30, 2013. This feature is not present in version v4.9.1 and v4.10.1 through current. Therefore, the vulnerability is not present in these versions.
7.5
High
CVE-2020-7483 2020-04-15 19h03 +00:00 **VERSION NOT SUPPORTED WHEN ASSIGNED** A vulnerability could cause certain data to be visible on the network when the 'password' feature is enabled. This vulnerability was discovered in and remediated in versions v4.9.1 and v4.10.1 on May 30, 2013. The 'password' feature is an additional optional check performed by TS1131 that it is connected to a specific controller. This data is sent as clear text and is visible on the network. This feature is not present in TriStation 1131 versions v4.9.1 and v4.10.1 through current. Therefore, the vulnerability is not present in these versions.
7.5
High