{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-8975","assignerOrgId":"0cbda920-cd7f-484a-8e76-bf7f4b7f4516","assignerShortName":"INCIBE","datePublished":"2022-10-17T21:15:25.826Z","dateUpdated":"2025-05-12T18:32:17.109Z","dateReserved":"2020-02-13T00:00:00.000Z"},"containers":{"cna":{"title":"ZGR TPS200 NG Information Exposure","datePublic":"2022-09-30T00:00:00.000Z","providerMetadata":{"orgId":"0cbda920-cd7f-484a-8e76-bf7f4b7f4516","shortName":"INCIBE","dateUpdated":"2022-10-17T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"ZGR TPS200 NG in its 2.00 firmware version and 1.01 hardware version, allows a remote attacker with access to the web application and knowledge of the routes (URIs) used by the application, to access sensitive information about the system."}],"affected":[{"vendor":"ZGR","product":"ZGR TPS200 NG","versions":[{"version":"2.00 firmware version 2.00","status":"affected"},{"version":"1.01 hardware version 1.01","status":"affected"}]}],"references":[{"url":"https://www.incibe-cert.es/en/early-warning/ics-advisories/multiple-vulnerabilities-zgr-tps200-ng"}],"credits":[{"lang":"en","value":"Discovered by the Industrial Cybersecurity team of S21sec, special mention to Aaron Flecha Menendez."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-201: Insertion of Sensitive Information Into Sent Data","cweId":"CWE-201"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"advisory":"INCIBE-2022-0936","defect":["INCIBE-2020-0029"],"discovery":"EXTERNAL"},"solutions":[{"lang":"en","value":"The ZGR team is working on a new design of the TPS, which will include the necessary cybersecurity measures to address the identified vulnerabilities. Affected equipment must be connected to properly isolated and secured networks to avoid potential risks."}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T10:19:18.177Z"},"title":"CVE Program Container","references":[{"url":"https://www.incibe-cert.es/en/early-warning/ics-advisories/multiple-vulnerabilities-zgr-tps200-ng","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-05-12T18:23:44.484905Z","id":"CVE-2020-8975","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-05-12T18:32:17.109Z"}}]}}