First published: Tue Apr 13 2021(Updated: )
A CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists in C-Bus Toolkit (V1.15.7 and prior) that could allow a remote code execution when processing config files.
Credit: cybersecurity@se.com
Affected Software | Affected Version | How to fix |
---|---|---|
Schneider-electric C-bus Toolkit | <=1.15.7 | |
Schneider Electric C-Bus Toolkit | ||
Schneider Electric C-Bus Toolkit v1.15.7 and prior |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Schneider Electric C-Bus Toolkit vulnerability is CVE-2021-22717.
The severity of CVE-2021-22717 is high with a severity value of 8.8.
Remote attackers can exploit CVE-2021-22717 by executing arbitrary code on affected installations of Schneider Electric C-Bus Toolkit, bypassing the existing authentication mechanism.
Schneider Electric C-Bus Toolkit up to version 1.15.7 is affected by CVE-2021-22717.
Yes, Schneider Electric has released a fix for CVE-2021-22717. Please refer to the official Schneider Electric security advisory for more information.