Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jx6v-qprr-23fv

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The installer routine in Schneider Electric MiCOM S1 Studio uses world-writable permissions for executable files, which allows local users to modify the service or the configuration files, and consequently gain privileges or trigger incorrect protective-relay operation, via a Trojan horse executable file.

The installer routine in Schneider Electric MiCOM S1 Studio uses world-writable permissions for executable files, which allows local users to modify the service or the configuration files, and consequently gain privileges or trigger incorrect protective-relay operation, via a Trojan horse executable file.

EPSS

Процентиль: 10%
0.00035
Низкий

Связанные уязвимости

nvd
почти 13 лет назад

The installer routine in Schneider Electric MiCOM S1 Studio uses world-writable permissions for executable files, which allows local users to modify the service or the configuration files, and consequently gain privileges or trigger incorrect protective-relay operation, via a Trojan horse executable file.

EPSS

Процентиль: 10%
0.00035
Низкий