Malicious File Tampering Risk
CVE-2024-2602
7.8HIGH
Summary
A vulnerability related to improper restriction of a pathname allows for path traversal attacks in Schneider Electric software. This flaw potentially enables remote code execution if an authenticated user interacts with a project file that has been maliciously altered. Attackers can exploit this vulnerability, leading to significant security risks for affected users who may inadvertently execute compromised project files.
Affected Version(s)
FoxRTU Station All versions prior to v9.3.0
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Collectors
NVD DatabaseMitre Database