A DLL hijacking vulnerability exists in Schneider Electric Software Update (SESU), all versions prior to V2.2.0, which could allow an attacker to execute arbitrary code on the targeted system when placing a specific DLL file.
                
            References
                    | Link | Resource | 
|---|---|
| http://www.securityfocus.com/bid/105951 | Third Party Advisory VDB Entry | 
| https://ics-cert.us-cert.gov/advisories/ICSA-18-305-02 | Third Party Advisory US Government Resource | 
| https://www.schneider-electric.com/en/download/document/SEVD-2018-298-01/ | Vendor Advisory | 
| http://www.securityfocus.com/bid/105951 | Third Party Advisory VDB Entry | 
| https://ics-cert.us-cert.gov/advisories/ICSA-18-305-02 | Third Party Advisory US Government Resource | 
| https://www.schneider-electric.com/en/download/document/SEVD-2018-298-01/ | Vendor Advisory | 
Configurations
                    History
                    21 Nov 2024, 04:12
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://www.securityfocus.com/bid/105951 - Third Party Advisory, VDB Entry | |
| References | () https://ics-cert.us-cert.gov/advisories/ICSA-18-305-02 - Third Party Advisory, US Government Resource | |
| References | () https://www.schneider-electric.com/en/download/document/SEVD-2018-298-01/ - Vendor Advisory | 
Information
                Published : 2018-11-02 17:29
Updated : 2024-11-21 04:12
NVD link : CVE-2018-7799
Mitre link : CVE-2018-7799
CVE.ORG link : CVE-2018-7799
JSON object : View
Products Affected
                schneider-electric
- software_update_utility
CWE
                
                    
                        
                        CWE-427
                        
            Uncontrolled Search Path Element
