cve/2020/CVE-2020-7523.md

19 lines
1.2 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2020-7523](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7523)
![](https://img.shields.io/static/v1?label=Product&message=Schneider%20Electric%20Modbus%20Serial%20Driver%20(64%20bits)%20versions%20prior%20to%20V3.20%20IE%2030%2C%20Schneider%20Electric%20Modbus%20Serial%20Driver%20(32%20bits)%20versions%20prior%20to%20V2.20%20IE%2030%2C%20and%20Schneider%20Electric%20Modbus%20Driver%20Suite%20versions%20prior%20to%20V14.15.0.0&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-269%3A%20Improper%20Privilege%20Management&color=brighgreen)
### Description
Improper Privilege Management vulnerability exists in Schneider Electric Modbus Serial Driver (see security notification for versions) which could cause local privilege escalation when the Modbus Serial Driver service is invoked. The driver does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/alphaSeclab/sec-daily-2020
- https://github.com/neutrinoguy/awesome-ics-writeups