Schneider Electric C-Bus Automation Controller command execution |
NAME
Schneider Electric C-Bus Automation Controller command execution
- Platforms Affected:
Schneider Electric C-Bus Automation Controller 1.10 - Risk Level:
8.8 - Exploitability:
Proof of Concept - Consequences:
Gain Access
DESCRIPTION
Schneider Electric C-Bus Automation Controller could allow a remote authenticated attacker to execute arbitrary commands on the system, caused by improper input validation by the Start-up (init) script editor. By sending a specially-crafted request to the “script” POST parameter to insert malicious Lua script, an attacker could exploit this vulnerability to execute arbitrary commands with root privileges on the system.
CVSS 3.0 Information
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Access Vector: Adjacent Network
- Access Complexity: Low
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
- Remediation Level: Unavailable
MITIGATION
No remedy available as of May 30, 2022.
- Reference Link:
https://packetstormsecurity.com/files/167304 - Reference Link:
https://www.se.com/ww/en/product/5500AC2/application-controller-spacelogic-cbus-rs232-485-ethernet-din-mount-24v-dc/
If you like the site, please consider joining the telegram channel and supporting us on Patreon using the button below.