Lucene search

K
cve[email protected]CVE-2020-7545
HistoryDec 01, 2020 - 3:15 p.m.

CVE-2020-7545

2020-12-0115:15:12
CWE-284
web.nvd.nist.gov
25
cve-2020-7545
cwe-284
ecostruxure
smartstruxure
power monitoring
scada
access control
security vulnerability
arbitrary code execution

6.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

7.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

7.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

37.0%

A CWE-284:Improper Access Control vulnerability exists in EcoStruxureª and SmartStruxureª Power Monitoring and SCADA Software (see security notification for version information) that could allow for arbitrary code execution on the server when an authorized user access an affected webpage.

Affected configurations

NVD
Node
schneider-electricecostruxure_energy_expertMatch2.0
OR
schneider-electricecostruxure_power_monitoring_expertMatch7.0
OR
schneider-electricecostruxure_power_monitoring_expertMatch8.0
OR
schneider-electricecostruxure_power_monitoring_expertMatch9.0
OR
schneider-electricpower_managerMatch1.1
OR
schneider-electricpower_managerMatch1.2
OR
schneider-electricpower_managerMatch1.3
OR
schneider-electricpowerscada_expert_with_advanced_reporting_and_dashboardsMatch8.0
OR
schneider-electricpowerscada_operation_with_advanced_reporting_and_dashboardsMatch9.0

CNA Affected

[
  {
    "product": "EcoStruxureª and SmartStruxureª Power Monitoring and SCADA Software (see security notification for version information)",
    "vendor": "n/a",
    "versions": [
      {
        "status": "affected",
        "version": "EcoStruxureª and SmartStruxureª Power Monitoring and SCADA Software (see security notification for version information)"
      }
    ]
  }
]

6.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

7.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

7.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

37.0%

Related for CVE-2020-7545