#VU16787 Input validation error in Pro-face GP-Pro EX


Published: 2019-01-04

Vulnerability identifier: #VU16787

Vulnerability risk: High

CVSSv3.1: 7.8 [CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-7832

CWE-ID: CWE-20

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Pro-face GP-Pro EX
Universal components / Libraries / Software for developers

Vendor: Schneider Electric

Description
The vulnerability allows a remote authenticated attacker to execute arbitrary code on the target system.

The weakness exists due to insufficient validation of user-supplied input when GP-Pro EX is launched. A remote attacker can trick the victim into processing a specially crafted input and execute arbitrary code with elevated privileges.

Successful exploitation of the vulnerability may result in system compromise.

Mitigation
Update to version 4.08.200.

Vulnerable software versions

Pro-face GP-Pro EX: All versions


External links
http://download.schneider-electric.com/files?p_enDocType=Technical+leaflet&p_File_Name=SEVD...


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability