This vulnerability allows remote attackers to execute arbitrary code on affected installations of Schneider Electric EcoStruxure Power Build. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of SSD files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.
Affected Software | Affected Version | How to fix |
---|---|---|
Schneider Electric EcoStruxure Power Build |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of vulnerability ZDI-21-187 is critical as it allows remote attackers to execute arbitrary code.
Fixing ZDI-21-187 involves applying the latest security patches provided by Schneider Electric for EcoStruxure Power Build.
The potential impacts of ZDI-21-187 include unauthorized access and control over the system, leading to data breaches or system disruption.
Vulnerability ZDI-21-187 affects installations of Schneider Electric EcoStruxure Power Build that have not been updated with the latest security measures.
Yes, ZDI-21-187 requires user interaction, as the target must visit a malicious page or open a malicious file for exploitation.