Advisory Details

May 14th, 2020

Schneider Electric EcoStruxure Operator Terminal Expert VXDZ File Parsing Directory Traversal Remote Code Execution Vulnerability

ZDI-20-658
ZDI-CAN-10287

CVE ID CVE-2020-7493
CVSS SCORE 7.8, AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AFFECTED VENDORS Schneider Electric
AFFECTED PRODUCTS EcoStruxure Operator Terminal Expert
VULNERABILITY DETAILS

The vulnerablity allows remote attackers to execute arbitrary code on affected installations of Schneider Electric EcoStruxure Operator Terminal Expert. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the handling of VXDZ files. When parsing the parameters to load_extension the process does not properly validate a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the current process.

ADDITIONAL DETAILS Schneider Electric has issued an update to correct this vulnerability. More details can be found at:
https://www.se.com/ww/en/download/document/SEVD-2020-133-04/
DISCLOSURE TIMELINE
  • 2020-05-13 - Vulnerability reported to vendor
  • 2020-05-14 - Coordinated public release of advisory
  • 2021-06-29 - Advisory Updated
CREDIT Steven Seeley and Chris Anastasio of Incite Team
BACK TO ADVISORIES