A DLL hijacking vulnerability exists in Schneider Electric Software Update (SESU), all versions prior to V2.2.0, which could allow an attacker to execute arbitrary code on the targeted system when placing a specific DLL file.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/105951 | Third Party Advisory VDB Entry |
https://ics-cert.us-cert.gov/advisories/ICSA-18-305-02 | Third Party Advisory US Government Resource |
https://www.schneider-electric.com/en/download/document/SEVD-2018-298-01/ | Vendor Advisory |
http://www.securityfocus.com/bid/105951 | Third Party Advisory VDB Entry |
https://ics-cert.us-cert.gov/advisories/ICSA-18-305-02 | Third Party Advisory US Government Resource |
https://www.schneider-electric.com/en/download/document/SEVD-2018-298-01/ | Vendor Advisory |
Configurations
History
21 Nov 2024, 04:12
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/105951 - Third Party Advisory, VDB Entry | |
References | () https://ics-cert.us-cert.gov/advisories/ICSA-18-305-02 - Third Party Advisory, US Government Resource | |
References | () https://www.schneider-electric.com/en/download/document/SEVD-2018-298-01/ - Vendor Advisory |
Information
Published : 2018-11-02 17:29
Updated : 2024-11-21 04:12
NVD link : CVE-2018-7799
Mitre link : CVE-2018-7799
CVE.ORG link : CVE-2018-7799
JSON object : View
Products Affected
schneider-electric
- software_update_utility
CWE
CWE-427
Uncontrolled Search Path Element