Lucene search

K
zdiRgodZDI-21-814
HistoryJul 19, 2021 - 12:00 a.m.

Schneider Electric C-Bus Toolkit Missing Authentication Vulnerability

2021-07-1900:00:00
rgod
www.zerodayinitiative.com
33
schneider electric
c-bus toolkit
authentication
remote attackers
bypass
vulnerability
c-gate 2 service
tcp port 20023
remote access
arbitrary code
system

EPSS

0.002

Percentile

60.8%

This vulnerability allows remote attackers to bypass authentication on affected installations of Schneider Electric C-Bus Toolkit. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the C-Gate 2 Service, which listens on TCP port 20023. A crafted webpage can be used to enable remote access. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of SYSTEM.

EPSS

0.002

Percentile

60.8%

Related for ZDI-21-814