SB2020051810 - Multiple vulnerabilities in Schneider Electric EcoStruxure Operator Terminal Expert (Vijeo XD)
Published: May 18, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 4 secuirty vulnerabilities.
1) SQL injection (CVE-ID: CVE-2020-7493)
The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.
The vulnerability exists due to insufficient sanitization of user-supplied data when parsing the parameters to "load_extension". A remote attacker can trick a victim to open a specially crafted VXDZ file and execute arbitrary SQL commands within the application database.
Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.
2) Insecure DLL loading (CVE-ID: CVE-2020-7494)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists within the handling of VXDZ files due to the application loads DLL libraries in an insecure manner. A remote attacker can place a specially crafted .dll file, trick the victim into opening a file, associated with the vulnerable application, and execute arbitrary code on victim's system.
3) Path traversal (CVE-ID: CVE-2020-7495)
The vulnerability allows a remote attacker to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences. A remote attacker can trick a victim to open a specially crafted ZIP file and gain unauthorized write access outside of expected path folder.
4) Argument Injection (CVE-ID: CVE-2020-7496)
The vulnerability allows a remote attacker to gain write access to the system.
The vulnerability exists due to the argument injection or modification issue. A remote attacker can trick a victim to open a specially crafted project file and gain unauthorized write access to the target system.
Remediation
Install update from vendor's website.