ID

VAR-202109-1928


CVE

CVE-2021-22794


TITLE

Schneider Electric Struxureware Data Center Expert Directory Traversal Remote Code Execution Vulnerability

Trust: 0.7

sources: ZDI: ZDI-21-1071

DESCRIPTION

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Schneider Electric Struxureware Data Center Expert. Authentication is required to exploit this vulnerability.The specific flaw exists within the handling of firmware updates. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of root

Trust: 0.72

sources: ZDI: ZDI-21-1071 // VULMON: CVE-2021-22794

AFFECTED PRODUCTS

vendor:schneider electricmodel:struxureware data center expertscope: - version: -

Trust: 0.7

sources: ZDI: ZDI-21-1071

CVSS

SEVERITY

CVSSV2

CVSSV3

ZDI: CVE-2021-22794
value: HIGH

Trust: 0.7

CNNVD: CNNVD-202109-990
value: HIGH

Trust: 0.6

ZDI: CVE-2021-22794
baseSeverity: HIGH
baseScore: 8.8
vectorString: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 0.7

sources: CNNVD: CNNVD-202109-990 // ZDI: ZDI-21-1071

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202109-990

TYPE

path traversal

Trust: 0.6

sources: CNNVD: CNNVD-202109-990

PATCH

title:Schneider Electric has issued an update to correct this vulnerability.url:https://us-cert.cisa.gov/ics/advisories/icsa-21-257-03

Trust: 0.7

title:Schneider Electric Struxureware Data Center Expert Repair measures for path traversal vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=162792

Trust: 0.6

sources: CNNVD: CNNVD-202109-990 // ZDI: ZDI-21-1071

EXTERNAL IDS

db:NVDid:CVE-2021-22794

Trust: 1.4

db:ZDIid:ZDI-21-1071

Trust: 1.4

db:ZDI_CANid:ZDI-CAN-13077

Trust: 0.7

db:MCAFEEid:SB20210

Trust: 0.6

db:AUSCERTid:ESB-2021.3095

Trust: 0.6

db:ICS CERTid:ICSA-21-257-03

Trust: 0.6

db:CNNVDid:CNNVD-202109-990

Trust: 0.6

db:VULMONid:CVE-2021-22794

Trust: 0.1

sources: CNNVD: CNNVD-202109-990 // VULMON: CVE-2021-22794 // ZDI: ZDI-21-1071

REFERENCES

url:https://us-cert.cisa.gov/ics/advisories/icsa-21-257-03

Trust: 1.3

url:https://www.zerodayinitiative.com/advisories/zdi-21-1071/

Trust: 0.7

url:https://www.cybersecurity-help.cz/vdb/sb2021091511

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.3095

Trust: 0.6

sources: CNNVD: CNNVD-202109-990 // VULMON: CVE-2021-22794 // ZDI: ZDI-21-1071

CREDITS

David Yesland

Trust: 1.3

sources: CNNVD: CNNVD-202109-990 // ZDI: ZDI-21-1071

SOURCES

db:CNNVDid:CNNVD-202109-990
db:VULMONid:CVE-2021-22794
db:ZDIid:ZDI-21-1071

LAST UPDATE DATE

2021-12-18T15:40:54.484000+00:00


SOURCES UPDATE DATE

db:CNNVDid:CNNVD-202109-990date:2021-09-16T00:00:00
db:VULMONid:CVE-2021-22794date: -
db:ZDIid:ZDI-21-1071date:2021-09-15T00:00:00

SOURCES RELEASE DATE

db:CNNVDid:CNNVD-202109-990date:2021-09-14T00:00:00
db:VULMONid:CVE-2021-22794date: -
db:ZDIid:ZDI-21-1071date:2021-09-15T00:00:00