Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-8q56-7r9c-2j9q

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The client in Schneider Electric Software Update (SESU) Utility 1.0.x and 1.1.x does not ensure that updates have a valid origin, which allows man-in-the-middle attackers to spoof updates, and consequently execute arbitrary code, by modifying the data stream on TCP port 80.

The client in Schneider Electric Software Update (SESU) Utility 1.0.x and 1.1.x does not ensure that updates have a valid origin, which allows man-in-the-middle attackers to spoof updates, and consequently execute arbitrary code, by modifying the data stream on TCP port 80.

EPSS

Процентиль: 80%
0.01347
Низкий

Дефекты

CWE-20

Связанные уязвимости

nvd
около 13 лет назад

The client in Schneider Electric Software Update (SESU) Utility 1.0.x and 1.1.x does not ensure that updates have a valid origin, which allows man-in-the-middle attackers to spoof updates, and consequently execute arbitrary code, by modifying the data stream on TCP port 80.

EPSS

Процентиль: 80%
0.01347
Низкий

Дефекты

CWE-20