Command Injection Vulnerability in Pelco Sarix Professional by Schneider Electric
CVE-2018-7231

9.8CRITICAL

Key Information:

Vendor
CVE Published:
9 March 2018

Summary

A command injection vulnerability exists in Schneider Electric's Pelco Sarix Professional, affecting all firmware versions prior to 3.29.67. The vulnerability arises from insufficient validation of shell meta characters in the handling of the 'system.opkg.remove' command. This flaw could allow an attacker to execute arbitrary commands, potentially compromising the security of the affected system. Protecting against this vulnerability is crucial to maintaining the integrity and security of your Schneider Electric devices.

Affected Version(s)

Pelco Sarix Professional all firmware versions prior to 3.29.71

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.