Deserialization Vulnerability in SCADAPack 7x Remote Connect by Schneider Electric
CVE-2020-7528

7.8HIGH

Key Information:

Vendor
CVE Published:
16 September 2020

Summary

A deserialization vulnerability has been identified in SCADAPack 7x Remote Connect. This flaw arises when untrusted data is deserialized, potentially allowing an attacker to execute arbitrary code on the affected system. The vulnerability is triggered by crafting a malicious .PRJ file that contains a specially designed serialized buffer, enabling unauthorized access and control over the system. It is critical for users of SCADAPack 7x Remote Connect to apply security updates and follow best practices to mitigate the risk associated with this vulnerability.

Affected Version(s)

SCADAPack 7x Remote Connect V3.6.3.574 and prior. SCADAPack 7x Remote Connect V3.6.3.574 and prior.

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.