2024-07-11 10:03:13 +00:00
{
"id" : "CVE-2024-2602" ,
"sourceIdentifier" : "cybersecurity@se.com" ,
"published" : "2024-07-11T09:15:03.030" ,
2024-07-12 18:03:13 +00:00
"lastModified" : "2024-07-12T16:39:51.080" ,
"vulnStatus" : "Analyzed" ,
2024-07-11 10:03:13 +00:00
"cveTags" : [ ] ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path\nTraversal') vulnerability exists that could result in remote code execution when an authenticated\nuser executes a saved project file that has been tampered by a malicious actor."
2024-07-11 14:03:13 +00:00
} ,
{
"lang" : "es" ,
"value" : "CWE-22: Existe una vulnerabilidad de limitaci\u00f3n inadecuada de un nombre de ruta a un directorio restringido (\"Path Traversal\") que podr\u00eda provocar la ejecuci\u00f3n remota de c\u00f3digo cuando un usuario autenticado ejecuta un archivo de proyecto guardado que ha sido manipulado por un actor malintencionado."
2024-07-11 10:03:13 +00:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
2024-07-12 18:03:13 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" ,
"attackVector" : "LOCAL" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "REQUIRED" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 7.8 ,
"baseSeverity" : "HIGH"
} ,
"exploitabilityScore" : 1.8 ,
"impactScore" : 5.9
} ,
2024-07-11 10:03:13 +00:00
{
"source" : "cybersecurity@se.com" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" ,
"attackVector" : "LOCAL" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "REQUIRED" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 7.3 ,
"baseSeverity" : "HIGH"
} ,
"exploitabilityScore" : 1.3 ,
"impactScore" : 5.9
}
]
} ,
"weaknesses" : [
{
"source" : "cybersecurity@se.com" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-22"
}
]
}
] ,
2024-07-12 18:03:13 +00:00
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:schneider-electric:foxrtu_station:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "9.3.0" ,
"matchCriteriaId" : "0C54753D-F3B9-4ED1-A8EF-F6C66561DD9E"
}
]
}
]
}
] ,
2024-07-11 10:03:13 +00:00
"references" : [
{
"url" : "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-191-03&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-191-03.pdf" ,
2024-07-12 18:03:13 +00:00
"source" : "cybersecurity@se.com" ,
"tags" : [
"Vendor Advisory"
]
2024-07-11 10:03:13 +00:00
}
]
}