CVE-2020-28221

CVSS V2 High 9.3 CVSS V3 Critical 9.8
Description
A CWE-20: Improper Input Validation vulnerability exists in EcoStruxure™ Operator Terminal Expert and Pro-face BLUE (version details in the notification) that could cause arbitrary code execution when the Ethernet Download feature is enable on the HMI.
Overview
  • CVE ID
  • CVE-2020-28221
  • Assigner
  • cybersecurity@se.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2021-01-26T18:15:47
  • Last Modified Date
  • 2021-02-12T19:21:55
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
AND
cpe:2.3:a:schneider-electric:ecostruxure_operator_terminal_expert:3.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:schneider-electric:ecostruxure_operator_terminal_expert:3.1:sp1a:*:*:*:*:*:* 1 OR
cpe:2.3:h:schneider-electric:hmi_sto_501:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:schneider-electric:hmi_sto_511:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:schneider-electric:hmi_sto_512:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:schneider-electric:hmi_sto_531:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:schneider-electric:hmi_sto_532:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:schneider-electric:hmig3u:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:schneider-electric:hmig3x:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:schneider-electric:hmig5u:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:schneider-electric:hmig5u2:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:schneider-electric:hmist6200:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:schneider-electric:hmist6400:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:schneider-electric:hmist6500:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:schneider-electric:hmist6600:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:schneider-electric:hmist6700:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:a:schneider-electric:pro-face_blue:3.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:schneider-electric:pro-face_blue:3.1:sp1a:*:*:*:*:*:* 1 OR
cpe:2.3:h:schneider-electric:gp-4104g:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:schneider-electric:gp-4104w:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:schneider-electric:gp-4105g:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:schneider-electric:gp-4105w:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:schneider-electric:gp-4106g:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:schneider-electric:gp-4106w:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:schneider-electric:gp-4107g:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:schneider-electric:gp-4107w:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:schneider-electric:sp-5400wa:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:schneider-electric:sp-5500tp:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:schneider-electric:sp-5500wa:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:schneider-electric:sp-5600ta:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:schneider-electric:sp-5600tp:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:schneider-electric:sp-5600wa:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:schneider-electric:sp-5660tp:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:schneider-electric:sp-5700tp:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:schneider-electric:sp-5700wc:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:schneider-electric:sp-5800wc:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:schneider-electric:sp-5b00:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:schneider-electric:sp-5b10:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:schneider-electric:sp-5b41:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:schneider-electric:st-6200wa:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:schneider-electric:st-6400wa:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:schneider-electric:st-6500wa:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:schneider-electric:st-6600wa:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:schneider-electric:st-6700wa:-:*:*:*:*:*:*:* 0 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:M/Au:N/C:C/I:C/A:C
  • Access Vector
  • NETWORK
  • Access Compatibility
  • MEDIUM
  • Authentication
  • NONE
  • Confidentiality Impact
  • COMPLETE
  • Integrity Impact
  • COMPLETE
  • Availability Impact
  • COMPLETE
  • Base Score
  • 9.3
  • Severity
  • HIGH
  • Exploitability Score
  • 8.6
  • Impact Score
  • 10
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • LOW
  • Privileges Required
  • NONE
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • HIGH
  • Availability Impact
  • HIGH
  • Base Score
  • 9.8
  • Base Severity
  • CRITICAL
  • Exploitability Score
  • 3.9
  • Impact Score
  • 5.9
References
Reference URL Reference Tags
https://www.se.com/ww/en/download/document/SEVD-2021-012-01/ Patch Vendor Advisory
History
Created Old Value New Value Data Type Notes
2022-05-10 07:23:22 Added to TrackCVE
2022-12-05 20:49:35 cybersecurity@schneider-electric.com cybersecurity@se.com CVE Assigner updated
2022-12-05 20:49:35 2021-01-26T18:15Z 2021-01-26T18:15:47 CVE Published Date updated
2022-12-05 20:49:35 2021-02-12T19:21:55 CVE Modified Date updated
2022-12-05 20:49:35 Analyzed Vulnerability Status updated