This vulnerability allows remote attackers to execute arbitrary code on affected installations of Schneider Electric IGSS. Authentication is not required to exploit this vulnerability. The specific flaw exists within the IGSSDataServer process, which listens on TCP port 12401 by default. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the current user.
Affected Software | Affected Version | How to fix |
---|---|---|
Schneider Electric IGSS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The ZDI-22-321 vulnerability has been classified as critical due to the potential for remote code execution without authentication.
To mitigate the ZDI-22-321 vulnerability, users should apply the latest security patches provided by Schneider Electric for the IGSS software.
ZDI-22-321 affects specific versions of Schneider Electric IGSS that utilize the IGSSDataServer process.
Yes, the ZDI-22-321 vulnerability can be exploited remotely without any authentication requirements.
The potential impacts of ZDI-22-321 include unauthorized remote code execution which could compromise the integrity and availability of the affected systems.