The integrated server of the ZGR TPS200 NG on its 2.00 firmware version and 1.01 hardware version, allows a remote attacker to perform actions with the permissions of a victim user. For this to happen, the victim user has to have an active session and triggers the malicious request.
Advisories
Source ID Title
EUVD EUVD EUVD-2020-29806 The integrated server of the ZGR TPS200 NG on its 2.00 firmware version and 1.01 hardware version, allows a remote attacker to perform actions with the permissions of a victim user. For this to happen, the victim user has to have an active session and triggers the malicious request.
Fixes

Solution

The ZGR team is working on a new design of the TPS, which will include the necessary cybersecurity measures to address the identified vulnerabilities. Affected equipment must be connected to properly isolated and secured networks to avoid potential risks.


Workaround

No workaround given by the vendor.

History

Sat, 12 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00188}

epss

{'score': 0.00235}


Wed, 23 Apr 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: INCIBE

Published:

Updated: 2025-04-23T16:45:51.672Z

Reserved: 2020-02-13T00:00:00.000Z

Link: CVE-2020-8976

cve-icon Vulnrichment

Updated: 2024-08-04T10:19:18.234Z

cve-icon NVD

Status : Modified

Published: 2022-10-17T22:15:10.237

Modified: 2024-11-21T05:39:46.167

Link: CVE-2020-8976

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.