First published: Thu Sep 02 2021(Updated: )
A CWE-427: Uncontrolled Search Path Element vulnerability exists in GP-Pro EX,V4.09.250 and prior, that could cause local code execution with elevated privileges when installing the software.
Credit: cybersecurity@se.com
Affected Software | Affected Version | How to fix |
---|---|---|
Schneider Electric GP-Pro EX | <=4.09.250 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-22775 is deemed critical due to its potential for local code execution with elevated privileges.
To fix CVE-2021-22775, update GP-Pro EX to version 4.09.251 or later to mitigate the vulnerability.
CVE-2021-22775 affects Schneider Electric's GP-Pro EX versions 4.09.250 and prior.
An uncontrolled search path element vulnerability, such as CVE-2021-22775, allows an attacker to execute malicious code by exploiting the search path used by the application.
Yes, CVE-2021-22775 can lead to significant security breaches by allowing attackers to run arbitrary code with elevated privileges.