Описание
The client in Schneider Electric Software Update (SESU) Utility 1.0.x and 1.1.x does not ensure that updates have a valid origin, which allows man-in-the-middle attackers to spoof updates, and consequently execute arbitrary code, by modifying the data stream on TCP port 80.
Ссылки
- US Government Resource
- Vendor Advisory
- US Government Resource
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:schneider-electric:software_update_utility:1.0:*:*:*:*:*:*:*
cpe:2.3:a:schneider-electric:software_update_utility:1.0.13:*:*:*:*:*:*:*
cpe:2.3:a:schneider-electric:software_update_utility:1.1:*:*:*:*:*:*:*
EPSS
Процентиль: 80%
0.01347
Низкий
9.3 Critical
CVSS2
Дефекты
CWE-20
Связанные уязвимости
github
больше 3 лет назад
The client in Schneider Electric Software Update (SESU) Utility 1.0.x and 1.1.x does not ensure that updates have a valid origin, which allows man-in-the-middle attackers to spoof updates, and consequently execute arbitrary code, by modifying the data stream on TCP port 80.
EPSS
Процентиль: 80%
0.01347
Низкий
9.3 Critical
CVSS2
Дефекты
CWE-20