Vulnerability Description
In Schneider Electric U.motion Builder software versions prior to v1.3.4, a remote command injection allows authentication bypass.
CVSS Score
9.8
CRITICAL
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Schneider-Electric | U.Motion Builder | < 1.3.4 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/104447Third Party AdvisoryVDB Entry
- https://www.schneider-electric.com/en/download/document/SEVD-2018-151-01/Vendor Advisory
- http://www.securityfocus.com/bid/104447Third Party AdvisoryVDB Entry
- https://www.schneider-electric.com/en/download/document/SEVD-2018-151-01/Vendor Advisory
FAQ
What is CVE-2018-7785?
CVE-2018-7785 is a vulnerability with a CVSS score of 9.8 (CRITICAL). In Schneider Electric U.motion Builder software versions prior to v1.3.4, a remote command injection allows authentication bypass.
How severe is CVE-2018-7785?
CVE-2018-7785 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2018-7785?
Check the references section above for vendor advisories and patch information. Affected products include: Schneider-Electric U.Motion Builder.