CVE-2020-10626

In Fazecast jSerialComm, Version 2.2.2 and prior, an uncontrolled search path element vulnerability could allow a malicious DLL file with the same name of any resident DLLs inside the software installation to execute arbitrary code.
References
Link Resource
https://www.us-cert.gov/ics/advisories/ICSA2012601 Third Party Advisory US Government Resource
Configurations

Configuration 1

cpe:2.3:a:fazecast:jserialcomm:*:*:*:*:*:*:*:*
cpe:2.3:a:schneider-electric:ecostruxure_it_gateway:1.7.0.64:*:*:*:*:*:*:*
cpe:2.3:a:schneider-electric:ecostruxure_it_gateway:*:*:*:*:*:*:*:*
cpe:2.3:a:schneider-electric:ecostruxure_it_gateway:*:*:*:*:*:*:*:*

Information

Published : 2020-05-14 04:15

Updated : 2022-01-31 07:33


NVD link : CVE-2020-10626

Mitre link : CVE-2020-10626

Products Affected
No products.
CWE