First published: Mon Jan 25 2021(Updated: )
A CWE-434: Unrestricted Upload of File with Dangerous Type vulnerability exists in the EcoStruxure Power Build - Rapsody software (V2.1.13 and prior) that could allow a use-after-free condition which could result in remote code execution when a malicious SSD file is uploaded and improperly parsed.
Credit: cybersecurity@se.com
Affected Software | Affected Version | How to fix |
---|---|---|
Schneider Electric EcoStruxure Power Build | ||
Schneider-electric Ecostruxure Power Build - Rapsody | <=2.1.13 | |
Schneider Electric CRITICAL INFRASTRUCTURE SECTORS: Commercial Facilities, Energy, Food and Agriculture, Government Facilities, Transportation Systems, Water and Wastewater Systems | ||
Schneider Electric COUNTRIES/AREAS DEPLOYED: Worldwide | ||
Schneider Electric COMPANY HEADQUARTERS LOCATION: France |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-22697 is high with a CVSS score of 7.8.
CVE-2021-22697 allows remote attackers to execute arbitrary code on affected installations of Schneider Electric EcoStruxure Power Build.
To exploit CVE-2021-22697, user interaction is required, such as visiting a malicious page or opening a malicious file.
Schneider Electric EcoStruxure Power Build version 2.1.13 is affected by CVE-2021-22697.
Yes, you can refer to the following advisories for more information on CVE-2021-22697: [US-CERT ICSA-21-012-01](https://us-cert.cisa.gov/ics/advisories/icsa-21-012-01), [Schneider Electric SEVD-2021-012-02](https://www.se.com/ww/en/download/document/SEVD-2021-012-02/), [ZDI-21-186](https://www.zerodayinitiative.com/advisories/ZDI-21-186/).