ZGR TPS200 NG in its 2.00 firmware version and 1.01 hardware version, does not properly accept specially constructed requests. This allows an attacker with access to the network where the affected asset is located, to operate and change several parameters without having to be registered as a user on the web that owns the device.
Advisories
Source ID Title
EUVD EUVD EUVD-2020-29803 ZGR TPS200 NG in its 2.00 firmware version and 1.01 hardware version, does not properly accept specially constructed requests. This allows an attacker with access to the network where the affected asset is located, to operate and change several parameters without having to be registered as a user on the web that owns the device.
Fixes

Solution

The ZGR team is working on a new design of the TPS, which will include the necessary cybersecurity measures to address the identified vulnerabilities. Affected equipment must be connected to properly isolated and secured networks to avoid potential risks.


Workaround

No workaround given by the vendor.

History

Sat, 12 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.0004}

epss

{'score': 0.00044}


Tue, 13 May 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: INCIBE

Published:

Updated: 2025-05-13T15:00:32.012Z

Reserved: 2020-02-13T00:00:00.000Z

Link: CVE-2020-8973

cve-icon Vulnrichment

Updated: 2024-08-04T10:19:19.113Z

cve-icon NVD

Status : Modified

Published: 2022-10-17T22:15:10.023

Modified: 2024-11-21T05:39:45.780

Link: CVE-2020-8973

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.