First published: Wed Sep 16 2020(Updated: )
A CWE-502 Deserialization of Untrusted Data vulnerability exists in SCADAPack 7x Remote Connect (V3.6.3.574 and prior) which could allow arbitrary code execution when an attacker builds a custom .PRJ file containing a malicious serialized buffer.
Credit: cybersecurity@se.com
Affected Software | Affected Version | How to fix |
---|---|---|
Schneider-electric Scadapack 7x Remote Connect | <=3.6.3.574 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-7528 has a critical severity rating due to its potential for arbitrary code execution.
To mitigate CVE-2020-7528, upgrade to SCADAPack 7x Remote Connect version 3.6.3.575 or later.
CVE-2020-7528 affects SCADAPack 7x Remote Connect versions up to and including 3.6.3.574.
An attacker exploiting CVE-2020-7528 can execute arbitrary code on the affected system.
There are no known workarounds for CVE-2020-7528; updating to a secure version is the only solution.