First published: Tue Apr 18 2023(Updated: )
A CWE-20: Improper Input Validation vulnerability exists that could allow an authenticated attacker to gain the same privilege as the application on the server when a malicious payload is provided over HTTP for the server to execute.
Credit: cybersecurity@se.com
Affected Software | Affected Version | How to fix |
---|---|---|
Schneider Electric InsightHome | <1.16 | |
Schneider Electric InsightHome | =1.16 | |
Schneider Electric InsightHome | =1.16-build_004 | |
Schneider-electric Insighthome Firmware | ||
Schneider Electric Insight Facility Firmware | <1.16 | |
Schneider Electric Insight Facility Firmware | =1.16 | |
Schneider Electric Insight Facility Firmware | =1.16-build_004 | |
Schneider Electric Insight Facility Firmware | ||
Schneider-electric Conext Gateway Firmware | <1.16 | |
Schneider-electric Conext Gateway Firmware | =1.16 | |
Schneider-electric Conext Gateway Firmware | =1.16-build_004 | |
Schneider-electric Conext Gateway Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-29410 is a CWE-20: Improper Input Validation vulnerability that allows an authenticated attacker to gain the same privilege as the application on the server.
An attacker can exploit CVE-2023-29410 by providing a malicious payload over HTTP for the server to execute.
CVE-2023-29410 has a severity rating of 8.8 (high).
Schneider-electric Insighthome Firmware versions up to 1.16 (excluding 1.16) are affected by CVE-2023-29410.
To fix CVE-2023-29410, it is recommended to update Schneider-electric Insighthome Firmware to version 1.16 or higher.