CVE-2020-10626

In Fazecast jSerialComm, Version 2.2.2 and prior, an uncontrolled search path element vulnerability could allow a malicious DLL file with the same name of any resident DLLs inside the software installation to execute arbitrary code.
References
Link Resource
https://www.us-cert.gov/ics/advisories/ICSA2012601 Third Party Advisory US Government Resource
https://www.us-cert.gov/ics/advisories/ICSA2012601 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

cpe:2.3:a:fazecast:jserialcomm:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:schneider-electric:ecostruxure_it_gateway:*:*:*:*:*:*:*:*
cpe:2.3:a:schneider-electric:ecostruxure_it_gateway:*:*:*:*:*:*:*:*
cpe:2.3:a:schneider-electric:ecostruxure_it_gateway:1.7.0.64:*:*:*:*:*:*:*

History

21 Nov 2024, 04:55

Type Values Removed Values Added
References () https://www.us-cert.gov/ics/advisories/ICSA2012601 - Third Party Advisory, US Government Resource () https://www.us-cert.gov/ics/advisories/ICSA2012601 - Third Party Advisory, US Government Resource

Information

Published : 2020-05-14 16:15

Updated : 2024-11-21 04:55


NVD link : CVE-2020-10626

Mitre link : CVE-2020-10626

CVE.ORG link : CVE-2020-10626


JSON object : View

Products Affected

schneider-electric

  • ecostruxure_it_gateway

fazecast

  • jserialcomm
CWE
CWE-427

Uncontrolled Search Path Element