Schneider-Electric Software Update Utility vulnerabilities
3 known vulnerabilities affecting schneider-electric/software_update_utility.
Total CVEs
3
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH1MEDIUM1
Vulnerabilities
Page 1 of 1
CVE-2020-7520MEDIUMCVSS 4.7≤ 2.4.02020-07-23
CVE-2020-7520 [MEDIUM] CWE-601 CVE-2020-7520: A CWE-601: URL Redirection to Untrusted Site ('Open Redirect') vulnerability exists in Schneider Ele
A CWE-601: URL Redirection to Untrusted Site ('Open Redirect') vulnerability exists in Schneider Electric Software Update (SESU), V2.4.0 and prior, which could cause execution of malicious code on the victim's machine. In order to exploit this vulnerability, an attacker requires privileged access on the engineering workstation to modify a Windows regi
nvd
CVE-2018-7799HIGHCVSS 7.8fixed in 2.2.02018-11-02
CVE-2018-7799 [HIGH] CWE-427 CVE-2018-7799: A DLL hijacking vulnerability exists in Schneider Electric Software Update (SESU), all versions prio
A DLL hijacking vulnerability exists in Schneider Electric Software Update (SESU), all versions prior to V2.2.0, which could allow an attacker to execute arbitrary code on the targeted system when placing a specific DLL file.
nvd
CVE-2013-0655CRITICALCVSS 9.3v1.0v1.0.13+1 more2013-01-21
CVE-2013-0655 [CRITICAL] CWE-20 CVE-2013-0655: The client in Schneider Electric Software Update (SESU) Utility 1.0.x and 1.1.x does not ensure that
The client in Schneider Electric Software Update (SESU) Utility 1.0.x and 1.1.x does not ensure that updates have a valid origin, which allows man-in-the-middle attackers to spoof updates, and consequently execute arbitrary code, by modifying the data stream on TCP port 80.
nvd