Vulnerability identifier: #VU48962
Vulnerability risk: High
CVSSv3.1: 8.1 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C]
CVE-ID:
CWE-ID:
CWE-123
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
EcoStruxure Control Expert
Server applications /
SCADA systems
Vendor: Schneider Electric
Description
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to a write-what-where condition in the APX project file processing functionality. A remote attacker can trick a victim to open a STA project archive containing a specially crafted APX project file and execute arbitrary code on the target system.
Mitigation
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versions
EcoStruxure Control Expert: 14.1
External links
http://www.se.com/ww/en/download/document/SEVD-2020-343-01/
http://talosintelligence.com/vulnerability_reports/TALOS-2020-1144
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.