Risk Scores
CVSS v3.1
8.800000190734863
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score
1.22%
79.0th percentile
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| phoenixcontact | tc_router_3002t-4g_vzw_firmware | 0 |
| phoenixcontact | tc_cloud_client_1002-txtx_firmware | 0 |
| phoenixcontact | tc_cloud_client_1002-4g_firmware | 0 |
| phoenixcontact | tc_router_3002t-4g_att_firmware | 0 |
| phoenixcontact | tc_router_3002t-4g_firmware | 0 |
| phoenixcontact | tc_router_2002t-3g_firmware | 0 |
| n/a | n/a | n/a |
Timeline
- Mar 12, 2020 CVE Published
- Mar 15, 2020 PoC Published
- Apr 14, 2021 EPSS Score
- Aug 23, 2021 EPSS Score
- Oct 24, 2021 EPSS Score
- Jan 6, 2022 EPSS Score
- Feb 25, 2022 EPSS Score
- Apr 1, 2022 EPSS Score
- Jun 29, 2022 EPSS Score
- Nov 1, 2022 EPSS Score
- Jan 2, 2023 EPSS Score
- Mar 7, 2023 EPSS Score
References
- https://cert.vde.com/en-us/advisories/ url
- https://cert.vde.com/en-us/advisories/vde-2020-003 url
- 20200313 SEC Consult SA-20200312-0 :: Authenticated Command Injection in Phoenix Contact TC Router & TC Cloud Client mailing-list
- http://packetstormsecurity.com/files/156729/Phoenix-Contact-TC-Router-TC-Cloud-Client-Command-Injection.html url
- https://nvd.nist.gov/vuln/detail/CVE-2020-9436 advisory
- https://cert.vde.com/en-us/advisories url