Deserialization Vulnerability in Schneider Electric Software Update
CVE-2019-6834

7.3HIGH

What is CVE-2019-6834?

A vulnerability exists in the Schneider Electric Software Update that can be exploited due to improper handling of untrusted data during deserialization. This security flaw may enable an attacker to gain unauthorized access to execute arbitrary code on the vulnerable system, potentially with full SYSTEM privileges. Exploitation of this vulnerability requires that a malicious user is authenticated, heightening the risk for users of the affected versions of the Software Update. Users are advised to review the latest updates provided by Schneider Electric to safeguard against this risk.

Affected Version(s)

Software Update (SESU) – SUT Service component V2.1.1

References

CVSS V3.1

Score:
7.3
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2019-6834 : Deserialization Vulnerability in Schneider Electric Software Update