CVE-2018-7784

Severity
9.8CRITICAL
EPSS
0.7%
top 26.99%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 3
Latest updateMay 13

Description

In Schneider Electric U.motion Builder software versions prior to v1.3.4, this exploit occurs when the submitted data of an input string is evaluated as a command by the application. In this way, the attacker could execute code, read the stack, or cause a segmentation fault in the running application.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages2 packages

CVEListV5schneider_electric_se/u.motion_builderU.motion Builder, all versions prior to 1.3.4

🔴Vulnerability Details

2
GHSA
GHSA-p42r-gh35-r237: In Schneider Electric U2022-05-13
CVEList
CVE-2018-7784: In Schneider Electric U2018-07-03
CVE-2018-7784 (CRITICAL CVSS 9.8) | In Schneider Electric U.motion Buil | cvebase.io