CVE-2013-0655

The client in Schneider Electric Software Update (SESU) Utility 1.0.x and 1.1.x does not ensure that updates have a valid origin, which allows man-in-the-middle attackers to spoof updates, and consequently execute arbitrary code, by modifying the data stream on TCP port 80.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:schneider-electric:software_update_utility:1.0:*:*:*:*:*:*:*
cpe:2.3:a:schneider-electric:software_update_utility:1.0.13:*:*:*:*:*:*:*
cpe:2.3:a:schneider-electric:software_update_utility:1.1:*:*:*:*:*:*:*

History

No history.

Information

Published : 2013-01-21 16:55

Updated : 2023-12-10 11:16


NVD link : CVE-2013-0655

Mitre link : CVE-2013-0655

CVE.ORG link : CVE-2013-0655


JSON object : View

Products Affected

schneider-electric

  • software_update_utility
CWE
CWE-20

Improper Input Validation