Vulnerability Details : CVE-2020-10626
In Fazecast jSerialComm, Version 2.2.2 and prior, an uncontrolled search path element vulnerability could allow a malicious DLL file with the same name of any resident DLLs inside the software installation to execute arbitrary code.
Vulnerability category: Execute code
Products affected by CVE-2020-10626
- Schneider-electric » Ecostruxure It GatewayVersions from including (>=) 1.6.0.39 and up to, including, (<=) 1.6.2.14cpe:2.3:a:schneider-electric:ecostruxure_it_gateway:*:*:*:*:*:*:*:*
- Schneider-electric » Ecostruxure It GatewayVersions from including (>=) 1.5.0.66 and up to, including, (<=) 1.5.2.28cpe:2.3:a:schneider-electric:ecostruxure_it_gateway:*:*:*:*:*:*:*:*
- cpe:2.3:a:schneider-electric:ecostruxure_it_gateway:1.7.0.64:*:*:*:*:*:*:*
- cpe:2.3:a:fazecast:jserialcomm:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-10626
0.16%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 52 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-10626
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.9
|
MEDIUM | AV:L/AC:M/Au:N/C:C/I:C/A:C |
3.4
|
10.0
|
NIST | |
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2020-10626
-
The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors.Assigned by:
- ics-cert@hq.dhs.gov (Secondary)
- nvd@nist.gov (Primary)
References for CVE-2020-10626
-
https://www.us-cert.gov/ics/advisories/ICSA2012601
Fazecast jSerialComm | CISAThird Party Advisory;US Government Resource
Jump to