First published: Tue Jul 12 2022(Updated: )
A CWE-73: External Control of File Name or Path vulnerability exists that could cause loading of unauthorized firmware images when user-controlled data is written to the file path. Affected Products: X80 advanced RTU Communication Module (BMENOR2200H) (V2.01 and later), OPC UA Modicon Communication Module (BMENUA0100) (V1.10 and prior)
Credit: cybersecurity@se.com
Affected Software | Affected Version | How to fix |
---|---|---|
Schneider Electric OPC UA Module for M580 Firmware | <=1.10 | |
Schneider Electric OPC UA Module for M580 Firmware | ||
Schneider-electric X80 Advanced Rtu Module | >=2.01 | |
Schneider-electric X80 Advanced Rtu Module |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-34765 has a medium severity rating due to the risk of unauthorized firmware loading.
To mitigate CVE-2022-34765, ensure that only authorized firmware images can be loaded and review file path controls.
CVE-2022-34765 affects the X80 advanced RTU Communication Module (BMENOR2200H) version 2.01 and later, and the OPC UA Module for M580 firmware versions up to 1.10.
Yes, CVE-2022-34765 can potentially be exploited remotely if user-controlled data is used in file path operations.
CVE-2022-34765 is an External Control of File Name or Path vulnerability, which allows unauthorized access through user-controlled data.