Deserialization Vulnerability in SCADAPack 7x Remote Connect by Schneider Electric
CVE-2020-7528
7.8HIGH
Summary
A deserialization vulnerability has been identified in SCADAPack 7x Remote Connect. This flaw arises when untrusted data is deserialized, potentially allowing an attacker to execute arbitrary code on the affected system. The vulnerability is triggered by crafting a malicious .PRJ file that contains a specially designed serialized buffer, enabling unauthorized access and control over the system. It is critical for users of SCADAPack 7x Remote Connect to apply security updates and follow best practices to mitigate the risk associated with this vulnerability.
Affected Version(s)
SCADAPack 7x Remote Connect V3.6.3.574 and prior. SCADAPack 7x Remote Connect V3.6.3.574 and prior.
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved