CVE-2020-7486

**VERSION NOT SUPPORTED WHEN ASSIGNED** A vulnerability could cause TCM modules to reset when under high network load in TCM v10.4.x and in system v10.3.x. This vulnerability was discovered and remediated in version v10.5.x on August 13, 2009. TCMs from v10.5.x and on will no longer exhibit this behavior.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:schneider-electric:tricon_tcm_4351_firmware:10.3.x:*:*:*:*:*:*:*
cpe:2.3:o:schneider-electric:tricon_tcm_4351_firmware:10.4.x:*:*:*:*:*:*:*
cpe:2.3:h:schneider-electric:tricon_tcm_4351:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
OR cpe:2.3:o:schneider-electric:tricon_tcm_4352_firmware:10.3.x:*:*:*:*:*:*:*
cpe:2.3:o:schneider-electric:tricon_tcm_4352_firmware:10.4.x:*:*:*:*:*:*:*
cpe:2.3:h:schneider-electric:tricon_tcm_4352:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
OR cpe:2.3:o:schneider-electric:tricon_tcm_4351a_firmware:10.3.x:*:*:*:*:*:*:*
cpe:2.3:o:schneider-electric:tricon_tcm_4351a_firmware:10.4.x:*:*:*:*:*:*:*
cpe:2.3:h:schneider-electric:tricon_tcm_4351a:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
OR cpe:2.3:o:schneider-electric:tricon_tcm_4351b_firmware:10.3.x:*:*:*:*:*:*:*
cpe:2.3:o:schneider-electric:tricon_tcm_4351b_firmware:10.4.x:*:*:*:*:*:*:*
cpe:2.3:h:schneider-electric:tricon_tcm_4351b:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
OR cpe:2.3:o:schneider-electric:tricon_tcm_4352a_firmware:10.3.x:*:*:*:*:*:*:*
cpe:2.3:o:schneider-electric:tricon_tcm_4352a_firmware:10.4.x:*:*:*:*:*:*:*
cpe:2.3:h:schneider-electric:tricon_tcm_4352a:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
OR cpe:2.3:o:schneider-electric:tricon_tcm_4352b_firmware:10.3.x:*:*:*:*:*:*:*
cpe:2.3:o:schneider-electric:tricon_tcm_4352b_firmware:10.4.x:*:*:*:*:*:*:*
cpe:2.3:h:schneider-electric:tricon_tcm_4352b:-:*:*:*:*:*:*:*

History

21 Nov 2024, 05:37

Type Values Removed Values Added
References () https://us-cert.cisa.gov/ics/advisories/icsa-20-205-01 - Third Party Advisory, US Government Resource () https://us-cert.cisa.gov/ics/advisories/icsa-20-205-01 - Third Party Advisory, US Government Resource
References () https://www.se.com/ww/en/download/document/SESB-2020-105-01 - Vendor Advisory () https://www.se.com/ww/en/download/document/SESB-2020-105-01 - Vendor Advisory

03 Feb 2022, 14:24

Type Values Removed Values Added
References (MISC) https://us-cert.cisa.gov/ics/advisories/icsa-20-205-01 - (MISC) https://us-cert.cisa.gov/ics/advisories/icsa-20-205-01 - Third Party Advisory, US Government Resource

31 Jan 2022, 20:08

Type Values Removed Values Added
CPE cpe:2.3:o:se:tricon_tcm_4352b_firmware:10.3.x:*:*:*:*:*:*:*
cpe:2.3:o:se:tricon_tcm_4352b_firmware:10.4.x:*:*:*:*:*:*:*
cpe:2.3:o:se:tricon_tcm_4351b_firmware:10.3.x:*:*:*:*:*:*:*
cpe:2.3:h:se:tricon_tcm_4352:-:*:*:*:*:*:*:*
cpe:2.3:o:se:tricon_tcm_4351a_firmware:10.4.x:*:*:*:*:*:*:*
cpe:2.3:o:se:tricon_tcm_4352a_firmware:10.3.x:*:*:*:*:*:*:*
cpe:2.3:o:se:tricon_tcm_4352_firmware:10.4.x:*:*:*:*:*:*:*
cpe:2.3:h:se:tricon_tcm_4351:-:*:*:*:*:*:*:*
cpe:2.3:o:se:tricon_tcm_4352_firmware:10.3.x:*:*:*:*:*:*:*
cpe:2.3:h:se:tricon_tcm_4351a:-:*:*:*:*:*:*:*
cpe:2.3:o:se:tricon_tcm_4351a_firmware:10.3.x:*:*:*:*:*:*:*
cpe:2.3:o:se:tricon_tcm_4351_firmware:10.4.x:*:*:*:*:*:*:*
cpe:2.3:o:se:tricon_tcm_4351b_firmware:10.4.x:*:*:*:*:*:*:*
cpe:2.3:o:se:tricon_tcm_4352a_firmware:10.4.x:*:*:*:*:*:*:*
cpe:2.3:o:se:tricon_tcm_4351_firmware:10.3.x:*:*:*:*:*:*:*
cpe:2.3:h:se:tricon_tcm_4351b:-:*:*:*:*:*:*:*
cpe:2.3:h:se:tricon_tcm_4352a:-:*:*:*:*:*:*:*
cpe:2.3:h:se:tricon_tcm_4352b:-:*:*:*:*:*:*:*
cpe:2.3:h:schneider-electric:tricon_tcm_4352b:-:*:*:*:*:*:*:*
cpe:2.3:o:schneider-electric:tricon_tcm_4351a_firmware:10.4.x:*:*:*:*:*:*:*
cpe:2.3:o:schneider-electric:tricon_tcm_4351b_firmware:10.4.x:*:*:*:*:*:*:*
cpe:2.3:h:schneider-electric:tricon_tcm_4351:-:*:*:*:*:*:*:*
cpe:2.3:o:schneider-electric:tricon_tcm_4352a_firmware:10.3.x:*:*:*:*:*:*:*
cpe:2.3:o:schneider-electric:tricon_tcm_4352a_firmware:10.4.x:*:*:*:*:*:*:*
cpe:2.3:o:schneider-electric:tricon_tcm_4351b_firmware:10.3.x:*:*:*:*:*:*:*
cpe:2.3:o:schneider-electric:tricon_tcm_4351_firmware:10.3.x:*:*:*:*:*:*:*
cpe:2.3:o:schneider-electric:tricon_tcm_4352b_firmware:10.4.x:*:*:*:*:*:*:*
cpe:2.3:h:schneider-electric:tricon_tcm_4352a:-:*:*:*:*:*:*:*
cpe:2.3:h:schneider-electric:tricon_tcm_4351a:-:*:*:*:*:*:*:*
cpe:2.3:o:schneider-electric:tricon_tcm_4352_firmware:10.4.x:*:*:*:*:*:*:*
cpe:2.3:o:schneider-electric:tricon_tcm_4352_firmware:10.3.x:*:*:*:*:*:*:*
cpe:2.3:h:schneider-electric:tricon_tcm_4352:-:*:*:*:*:*:*:*
cpe:2.3:o:schneider-electric:tricon_tcm_4351a_firmware:10.3.x:*:*:*:*:*:*:*
cpe:2.3:o:schneider-electric:tricon_tcm_4352b_firmware:10.3.x:*:*:*:*:*:*:*
cpe:2.3:o:schneider-electric:tricon_tcm_4351_firmware:10.4.x:*:*:*:*:*:*:*
cpe:2.3:h:schneider-electric:tricon_tcm_4351b:-:*:*:*:*:*:*:*

Information

Published : 2020-04-16 19:15

Updated : 2024-11-21 05:37


NVD link : CVE-2020-7486

Mitre link : CVE-2020-7486

CVE.ORG link : CVE-2020-7486


JSON object : View

Products Affected

schneider-electric

  • tricon_tcm_4352
  • tricon_tcm_4351b_firmware
  • tricon_tcm_4352b
  • tricon_tcm_4351a_firmware
  • tricon_tcm_4352a_firmware
  • tricon_tcm_4352_firmware
  • tricon_tcm_4351
  • tricon_tcm_4351b
  • tricon_tcm_4352b_firmware
  • tricon_tcm_4351a
  • tricon_tcm_4352a
  • tricon_tcm_4351_firmware
CWE
CWE-400

Uncontrolled Resource Consumption