CVE-2023-29412
Published Apr 18, 2023
Last updated 5 months ago
Overview
- Description
- CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability exists that could cause remote code execution when manipulating internal methods through Java RMI interface.
- Source
- cybersecurity@se.com
- NVD status
- Modified
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
Weaknesses
- cybersecurity@se.com
- CWE-78
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:schneider-electric:apc_easy_ups_online_monitoring_software:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D52617D6-0503-4B6B-A59D-441E0D1F4296", "versionEndIncluding": "2.5-ga-01-22320" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0" }, { "criteria": "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:-:*", "vulnerable": false, "matchCriteriaId": "647F2145-B063-43EA-8045-32D3B4D893F6" }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:schneider-electric:easy_ups_online_monitoring_software:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1849E03C-445A-4225-AECD-B4A7502F5F3B", "versionEndIncluding": "2.5-gs-01-22320" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0" }, { "criteria": "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:-:*", "vulnerable": false, "matchCriteriaId": "647F2145-B063-43EA-8045-32D3B4D893F6" }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" } ], "operator": "OR" } ], "operator": "AND" } ]