Command Injection Vulnerability in Pelco Sarix Professional by Schneider Electric
CVE-2018-7231
9.8CRITICAL
Key Information:
- Vendor
- Schneider Electric
- Status
- Vendor
- CVE Published:
- 9 March 2018
Summary
A command injection vulnerability exists in Schneider Electric's Pelco Sarix Professional, affecting all firmware versions prior to 3.29.67. The vulnerability arises from insufficient validation of shell meta characters in the handling of the 'system.opkg.remove' command. This flaw could allow an attacker to execute arbitrary commands, potentially compromising the security of the affected system. Protecting against this vulnerability is crucial to maintaining the integrity and security of your Schneider Electric devices.
Affected Version(s)
Pelco Sarix Professional all firmware versions prior to 3.29.71
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved