First published: Tue Jun 16 2020(Updated: )
A CWE-494 Download of Code Without Integrity Check vulnerability exists in Easergy T300 (Firmware version 1.5.2 and older) which could allow an attacker to inject data with dangerous content into the firmware and execute arbitrary code on the system.
Credit: cybersecurity@se.com
Affected Software | Affected Version | How to fix |
---|---|---|
Schneider Electric Easergy T300 Firmware | <=1.5.2 | |
Schneider Electric Easergy T300 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-7505 is rated as a high severity vulnerability due to its potential for arbitrary code execution.
To mitigate CVE-2020-7505, upgrade the Easergy T300 firmware to version 1.5.3 or later.
CVE-2020-7505 affects Easergy T300 devices running firmware version 1.5.2 and older.
CVE-2020-7505 allows an attacker to inject malicious data into the firmware, enabling remote code execution.
There are no publicly documented exploits for CVE-2020-7505 as of now, but the vulnerability poses a significant risk.