CVE-2020-6656

Eaton's easySoft software v7.xx prior to v7.22 are susceptible to file parsing type confusion remote code execution vulnerability. A malicious entity can execute a malicious code or make the application crash by tricking user upload a malformed .E70 file in the application. The vulnerability arises due to improper validation of user data supplied through E70 file which is causing Type Confusion.
Configurations

Configuration 1 (hide)

cpe:2.3:a:eaton:easysoft:*:*:*:*:*:*:*:*

History

31 Mar 2021, 12:51

Type Values Removed Values Added
References (MISC) https://us-cert.cisa.gov/ics/advisories/icsa-21-007-03 - (MISC) https://us-cert.cisa.gov/ics/advisories/icsa-21-007-03 - Third Party Advisory, US Government Resource

26 Jan 2021, 18:16

Type Values Removed Values Added
Summary Eaton's easySoft software v7.20 and prior are susceptible to file parsing type confusion remote code execution vulnerability. A malicious entity can execute a malicious code or make the application crash by tricking user upload a malformed .E70 file in the application. The vulnerability arises due to improper validation of user data supplied through E70 file which is causing Type Confusion. Eaton's easySoft software v7.xx prior to v7.22 are susceptible to file parsing type confusion remote code execution vulnerability. A malicious entity can execute a malicious code or make the application crash by tricking user upload a malformed .E70 file in the application. The vulnerability arises due to improper validation of user data supplied through E70 file which is causing Type Confusion.

19 Jan 2021, 19:15

Type Values Removed Values Added
References
  • (MISC) https://us-cert.cisa.gov/ics/advisories/icsa-21-007-03 -

13 Jan 2021, 14:45

Type Values Removed Values Added
References (MISC) https://www.zerodayinitiative.com/advisories/ZDI-20-1444/ - (MISC) https://www.zerodayinitiative.com/advisories/ZDI-20-1444/ - Third Party Advisory, VDB Entry
References (MISC) https://www.zerodayinitiative.com/advisories/ZDI-20-1442/ - (MISC) https://www.zerodayinitiative.com/advisories/ZDI-20-1442/ - Third Party Advisory, VDB Entry
References (MISC) https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/easySoft-eaton-vulnerability-advisory.pdf - (MISC) https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/easySoft-eaton-vulnerability-advisory.pdf - Vendor Advisory
References (MISC) https://www.zerodayinitiative.com/advisories/ZDI-20-1441/ - (MISC) https://www.zerodayinitiative.com/advisories/ZDI-20-1441/ - Third Party Advisory, VDB Entry
CPE cpe:2.3:a:eaton:easysoft:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 6.8
v3 : 7.8
CWE CWE-843

07 Jan 2021, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-01-07 18:15

Updated : 2023-12-10 13:41


NVD link : CVE-2020-6656

Mitre link : CVE-2020-6656

CVE.ORG link : CVE-2020-6656


JSON object : View

Products Affected

eaton

  • easysoft
CWE
CWE-843

Access of Resource Using Incompatible Type ('Type Confusion')

CWE-20

Improper Input Validation