A vulnerability exists in XINJE XD/E Series PLC Program Tool in versions up to v3.5.1 that can allow an authenticated, local attacker to load a malicious DLL. Local access is required to successfully exploit this vulnerability. This means the potential attacker must have access to the system and sufficient file-write privileges. If exploited, the attacker could place a malicious DLL file on the system, that when running XINJE XD/E Series PLC Program Tool will allow the attacker to execute arbitrary code with the privileges of another user's account.
References
Link | Resource |
---|---|
https://claroty.com/2022/05/11/blog-research-from-project-file-to-code-execution-exploiting-vulnerabilities-in-xinje-plc-program-tool/ | Exploit Third Party Advisory |
https://claroty.com/2022/05/11/blog-research-from-project-file-to-code-execution-exploiting-vulnerabilities-in-xinje-plc-program-tool/ | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 06:10
Type | Values Removed | Values Added |
---|---|---|
References | () https://claroty.com/2022/05/11/blog-research-from-project-file-to-code-execution-exploiting-vulnerabilities-in-xinje-plc-program-tool/ - Exploit, Third Party Advisory |
Information
Published : 2022-05-11 15:15
Updated : 2024-11-21 06:10
NVD link : CVE-2021-34606
Mitre link : CVE-2021-34606
CVE.ORG link : CVE-2021-34606
JSON object : View
Products Affected
xinje
- xd\/e_series_plc_program_tool
CWE
CWE-427
Uncontrolled Search Path Element