Memory Buffer Vulnerability in Schneider Electric Products
CVE-2024-11139
4.6MEDIUM
Key Information:
- Vendor
- Schneider Electric
- Vendor
- CVE Published:
- 17 January 2025
Summary
A vulnerability exists in various Schneider Electric systems that allows local attackers to exploit improper restrictions within memory buffers. When a malicious project file is opened, this could lead to arbitrary code execution. This issue underscores the importance of adhering to security protocols when handling unknown project files to mitigate potential risks.
Affected Version(s)
EcoStruxure™ Power Build Rapsody Version v2.5.2 NL and prior
EcoStruxure™ Power Build Rapsody Version v2.7.1 FR and prior
EcoStruxure™ Power Build Rapsody Version v2.7.5 ES and prior
References
CVSS V4
Score:
4.6
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Local
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
Unknown
Timeline
Vulnerability published
Vulnerability Reserved