{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-06T21:40:37.471","vulnerabilities":[{"cve":{"id":"CVE-2020-7485","sourceIdentifier":"cybersecurity@se.com","published":"2020-04-16T19:15:34.777","lastModified":"2024-11-21T05:37:14.350","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"**VERSION NOT SUPPORTED WHEN ASSIGNED** A legacy support account in the TriStation software version v4.9.0 and earlier could cause improper access to the TriStation host machine. This was addressed in TriStation version v4.9.1 and v4.10.1 released on May 30, 2013.1"},{"lang":"es","value":"**VERSIÓN NO COMPATIBLE CUANDO SE ASIGNÓ** Una cuenta de soporte heredada en la versión v4.9.0 y anteriores del software TriStation podría causar un acceso inapropiado a la máquina host de TriStation. Esto fue abordado en TriStation versiones v4.9.1 y v4.10.1 publicadas en May 30, 2013.1"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:schneider-electric:tristation_1131:*:*:*:*:*:*:*:*","versionStartIncluding":"1.0.0","versionEndIncluding":"4.9.0","matchCriteriaId":"CF85A1C1-5867-486A-8E17-36C83324329A"},{"vulnerable":true,"criteria":"cpe:2.3:a:schneider-electric:tristation_1131:4.10.0:*:*:*:*:*:*:*","matchCriteriaId":"BA77BE7C-A96A-460E-ABCE-7B578B8827D1"},{"vulnerable":true,"criteria":"cpe:2.3:a:schneider-electric:tristation_1131:4.12.0:*:*:*:*:*:*:*","matchCriteriaId":"325A4334-FF06-4F8A-9C3E-D2F37D32D8D9"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*","matchCriteriaId":"E33796DB-4523-4F04-B564-ADF030553D51"},{"vulnerable":false,"criteria":"cpe:2.3:o:microsoft:windows_nt:-:*:*:*:*:*:*:*","matchCriteriaId":"46E2D695-54F5-4D3E-B1F8-CABE51AE6064"},{"vulnerable":false,"criteria":"cpe:2.3:o:microsoft:windows_xp:-:*:*:*:*:*:*:*","matchCriteriaId":"B47EBFCC-1828-45AB-BC6D-FB980929A81A"}]}]}],"references":[{"url":"https://us-cert.cisa.gov/ics/advisories/icsa-20-205-01","source":"cybersecurity@se.com","tags":["Third Party Advisory","US Government Resource"]},{"url":"https://www.se.com/ww/en/download/document/SESB-2020-105-01","source":"cybersecurity@se.com","tags":["Vendor Advisory"]},{"url":"https://us-cert.cisa.gov/ics/advisories/icsa-20-205-01","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","US Government Resource"]},{"url":"https://www.se.com/ww/en/download/document/SESB-2020-105-01","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}