CVE-2020-10626

In Fazecast jSerialComm, Version 2.2.2 and prior, an uncontrolled search path element vulnerability could allow a malicious DLL file with the same name of any resident DLLs inside the software installation to execute arbitrary code.
References
Link Resource
https://www.us-cert.gov/ics/advisories/ICSA2012601 Third Party Advisory US Government Resource
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

cpe:2.3:a:fazecast:jserialcomm:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:schneider-electric:ecostruxure_it_gateway:*:*:*:*:*:*:*:*
cpe:2.3:a:schneider-electric:ecostruxure_it_gateway:*:*:*:*:*:*:*:*
cpe:2.3:a:schneider-electric:ecostruxure_it_gateway:1.7.0.64:*:*:*:*:*:*:*

Information

Published : 2020-05-14 09:15

Updated : 2022-01-31 11:33


NVD link : CVE-2020-10626

Mitre link : CVE-2020-10626


JSON object : View

CWE
CWE-427

Uncontrolled Search Path Element

Advertisement

dedicated server usa

Products Affected

schneider-electric

  • ecostruxure_it_gateway

fazecast

  • jserialcomm