SB2018122502 - Multiple vulnerabilities in Schneider Electric EVLink Parking



SB2018122502 - Multiple vulnerabilities in Schneider Electric EVLink Parking

Published: December 25, 2018

Security Bulletin ID SB2018122502
Severity
High
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 33% Low 67%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Use of hardcoded credentials (CVE-ID: CVE-2018-7800)

The vulnerability allows a remote attacker to gain elevated privileges.

The weakness exists due to use of hard-coded credentials. A remote attacker can use such credentials to gain elevated privileges on the device.

2) Code injection (CVE-ID: CVE-2018-7801)

The vulnerability allows a remote attacker to execute arbitrary code.

The weakness exists due to use of hard-coded credentials. A remote attacker can inject and execute arbitrary code with maximum privileges.

3) SQL injection (CVE-ID: CVE-2018-7802)

The vulnerability allows a remote attacker to execute arbitrary SQL commands in web application database.

The vulnerability exists due to insufficient sanitization of user-supplied data. A remote attacker can send a specially crafted HTTP request to vulnerable script and execute arbitrary SQL commands in web application database.

Successful exploitation of the vulnerability may allow an attacker to gain administrative access to vulnerable web application.


Remediation

Install update from vendor's website.