First published: Wed Apr 15 2020(Updated: )
**VERSION NOT SUPPORTED WHEN ASSIGNED** A vulnerability with the former 'password' feature could allow a denial of service attack if the user is not following documented guidelines pertaining to dedicated TriStation connection and key-switch protection. This vulnerability was discovered and remediated in versions v4.9.1 and v4.10.1 on May 30, 2013. This feature is not present in version v4.9.1 and v4.10.1 through current. Therefore, the vulnerability is not present in these versions.
Credit: cybersecurity@se.com
Affected Software | Affected Version | How to fix |
---|---|---|
Schneider-electric Tristation 1131 | >=1.0<4.13.0 | |
Microsoft Windows 7 | ||
Microsoft Windows NT | ||
Microsoft Windows XP | ||
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2020-7484.
The severity rating of CVE-2020-7484 is high, with a value of 7.5.
The Schneider-electric Tristation 1131 software versions from 1.0 to 4.13.0 are affected by CVE-2020-7484.
If the user is not following the documented guidelines pertaining to dedicated TriStation connection and key-switch protection, a denial of service attack could occur.
You can find more information about CVE-2020-7484 at the following references: [US-CERT Advisory](https://us-cert.cisa.gov/ics/advisories/icsa-20-205-01) and [Schneider Electric Security Bulletin](https://www.se.com/ww/en/download/document/SESB-2020-105-01).