ID

VAR-202109-1929


CVE

CVE-2021-22795


TITLE

Schneider Electric Struxureware Data Center Expert Command Injection Remote Code Execution Vulnerability

Trust: 0.7

sources: ZDI: ZDI-21-1072

DESCRIPTION

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Schneider Electric Struxureware Data Center Expert. Authentication is required to exploit this vulnerability.The specific flaw exists within the testRepository method. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root

Trust: 0.72

sources: ZDI: ZDI-21-1072 // VULMON: CVE-2021-22795

AFFECTED PRODUCTS

vendor:schneider electricmodel:struxureware data center expertscope: - version: -

Trust: 0.7

sources: ZDI: ZDI-21-1072

CVSS

SEVERITY

CVSSV2

CVSSV3

ZDI: CVE-2021-22795
value: HIGH

Trust: 0.7

CNNVD: CNNVD-202109-989
value: HIGH

Trust: 0.6

ZDI: CVE-2021-22795
baseSeverity: HIGH
baseScore: 8.8
vectorString: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 0.7

sources: CNNVD: CNNVD-202109-989 // ZDI: ZDI-21-1072

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202109-989

TYPE

operating system commend injection

Trust: 0.6

sources: CNNVD: CNNVD-202109-989

PATCH

title:Schneider Electric has issued an update to correct this vulnerability.url:https://us-cert.cisa.gov/ics/advisories/icsa-21-257-03

Trust: 0.7

title:Schneider Electric Struxureware Data Center Expert Fixes for operating system command injection vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=162791

Trust: 0.6

sources: CNNVD: CNNVD-202109-989 // ZDI: ZDI-21-1072

EXTERNAL IDS

db:NVDid:CVE-2021-22795

Trust: 1.4

db:ZDIid:ZDI-21-1072

Trust: 1.4

db:ZDI_CANid:ZDI-CAN-13553

Trust: 0.7

db:MCAFEEid:SB20210

Trust: 0.6

db:AUSCERTid:ESB-2021.3095

Trust: 0.6

db:ICS CERTid:ICSA-21-257-03

Trust: 0.6

db:CNNVDid:CNNVD-202109-989

Trust: 0.6

db:VULMONid:CVE-2021-22795

Trust: 0.1

sources: CNNVD: CNNVD-202109-989 // VULMON: CVE-2021-22795 // ZDI: ZDI-21-1072

REFERENCES

url:https://us-cert.cisa.gov/ics/advisories/icsa-21-257-03

Trust: 1.3

url:https://www.zerodayinitiative.com/advisories/zdi-21-1072/

Trust: 0.7

url:https://www.cybersecurity-help.cz/vdb/sb2021091511

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.3095

Trust: 0.6

sources: CNNVD: CNNVD-202109-989 // VULMON: CVE-2021-22795 // ZDI: ZDI-21-1072

CREDITS

David Yesland

Trust: 1.3

sources: CNNVD: CNNVD-202109-989 // ZDI: ZDI-21-1072

SOURCES

db:CNNVDid:CNNVD-202109-989
db:VULMONid:CVE-2021-22795
db:ZDIid:ZDI-21-1072

LAST UPDATE DATE

2021-12-18T15:40:54.171000+00:00


SOURCES UPDATE DATE

db:CNNVDid:CNNVD-202109-989date:2021-09-16T00:00:00
db:VULMONid:CVE-2021-22795date: -
db:ZDIid:ZDI-21-1072date:2021-09-15T00:00:00

SOURCES RELEASE DATE

db:CNNVDid:CNNVD-202109-989date:2021-09-14T00:00:00
db:VULMONid:CVE-2021-22795date: -
db:ZDIid:ZDI-21-1072date:2021-09-15T00:00:00