Remote Code Execution Vulnerability in Schneider Electric SoMachine HVAC Programming Software
CVE-2016-4529

7.3HIGH

Key Information:

Vendor
CVE Published:
15 July 2016

Summary

The vulnerability allows remote attackers to execute arbitrary code on Schneider Electric's SoMachine HVAC Programming Software for M171/M172 Controllers prior to version 2.1.0. The issue is linked to an unspecified ActiveX control that fails to adequately enforce user security, permitting unauthorized remote code execution through unknown vectors. This vulnerability is specifically related to the INTERFACESAFE_FOR_UNTRUSTED_CALLER flag, often recognized for its implications in enabling safe scripting features. Users of affected software versions should consider immediate remediation strategies to safeguard their systems.

References

CVSS V3.1

Score:
7.3
Severity:
HIGH
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.