Path Traversal Vulnerability in C-Bus Toolkit by Schneider Electric
CVE-2021-22717
8.8HIGH
Key Information:
- Vendor
- Schneider Electric
- Vendor
- CVE Published:
- 13 April 2021
Summary
A path traversal vulnerability is present in the C-Bus Toolkit, specifically in versions V1.15.7 and earlier. This security flaw allows an attacker to potentially execute arbitrary code remotely by manipulating the processing of configuration files. The improper limitation of a pathname to a restricted directory can be exploited, leading to unauthorized access and control over the affected system. Organizations using these versions of the C-Bus Toolkit should prioritize patching to mitigate the risk associated with this vulnerability.
Affected Version(s)
C-Bus Toolkit V1.15.7 and prior C-Bus Toolkit V1.15.7 and prior
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved