CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
AI Score
Confidence
Low
EPSS
Percentile
80.6%
The client in Schneider Electric Software Update (SESU) Utility 1.0.x and 1.1.x does not ensure that updates have a valid origin, which allows man-in-the-middle attackers to spoof updates, and consequently execute arbitrary code, by modifying the data stream on TCP port 80.
Vendor | Product | Version | CPE |
---|---|---|---|
schneider-electric | software_update_utility | 1.0 | cpe:2.3:a:schneider-electric:software_update_utility:1.0:*:*:*:*:*:*:* |
schneider-electric | software_update_utility | 1.0.13 | cpe:2.3:a:schneider-electric:software_update_utility:1.0.13:*:*:*:*:*:*:* |
schneider-electric | software_update_utility | 1.1 | cpe:2.3:a:schneider-electric:software_update_utility:1.1:*:*:*:*:*:*:* |
www.schneider-electric.com/download/ww/en/details/29960967-SE-Software-Update-Utility-Vulnerability-Disclosure/?reference=SEVD-2013-009-01
www.us-cert.gov/control_systems/pdf/ICSA-13-016-01.pdf
www2.schneider-electric.com/corporate/en/support/cybersecurity/viewer-news.page?c_filepath=/templatedata/Content/News/data/en/local/cybersecurity/general_information/2013/01/20130109_advisory_of_vulnerability_affecting_schneider_electric_s_software_upda.xml