Remote Code Execution Vulnerability in Application Due to Untrusted Data Deserialization
CVE-2024-2229
7.8HIGH
Summary
A vulnerability classified under CWE-502 exists within Schneider Electric's software product line, exposing users to the risk of remote code execution when a malicious project file is loaded by an authenticated user. This flaw allows attackers to craft special project files that, when opened, can execute arbitrary code within the software environment, potentially leading to unauthorized access and significant operational disruption. Proper mitigation measures and user awareness are critical to safeguard against this type of vulnerability.
Affected Version(s)
EcoStruxure Power Design - Ecodial All Versions NL
EcoStruxure Power Design - Ecodial All Versions INT
EcoStruxure Power Design - Ecodial All Versions FR
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Collectors
NVD DatabaseMitre Database