Lucene search

K
zdiRgodZDI-21-447
HistoryApr 22, 2021 - 12:00 a.m.

Schneider Electric C-Bus Toolkit ACCESS SAVE Directory Traversal Remote Code Execution Vulnerability

2021-04-2200:00:00
rgod
www.zerodayinitiative.com
25
schneider electric
c-bus toolkit
directory traversal
remote code execution
authentication bypass
c-gate 2 service
file operations
system context

EPSS

0.059

Percentile

93.5%

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Schneider Electric C-Bus Toolkit. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the processing of commands sent to the C-Gate 2 Service. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of SYSTEM.

EPSS

0.059

Percentile

93.5%

Related for ZDI-21-447