Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
High
CVE-2023-27984 CVSS:7.8
Schneider Electric IGSS could allow a remote attacker to execute arbitrary code on the system, caused by improper input validation by the openReport function. By persuading a victim to open a specially crafted report file, an attacker could exploit this vulnerability to execute arbitrary code in the context of the current user.
CVE-2023-27983 CVSS:6.5
Schneider Electric IGSS could allow a remote attacker to bypass security restrictions, caused by a flaw in IGSSdataServer process. By sending a specially crafted request, an attacker could exploit this vulnerability to delete reports from the IGSS project report directory.
CVE-2023-27982 CVSS:8.1
Schneider Electric IGSS could allow a remote attacker to execute arbitrary code on the system, caused by a flaw in the IGSSdataServer process. By sending specially crafted messages to the Data Server TCP port, an attacker could exploit this vulnerability to execute arbitrary code in the context of the current user.
CVE-2023-27981 CVSS:7.8
Schneider Electric IGSS could allow a remote attacker to traverse directories on the system, caused by improper validation of user request by the getRMSreportFile function. An attacker could send a specially crafted URL request containing “dot dot” sequences (/../) to execute code in the context of the current user.
CVE-2023-27980 CVSS:8.8
Schneider Electric IGSS could allow a remote attacker to execute arbitrary code on the system, caused by a flaw in the IGSSdataServer process. By persuading a victim to open a specially crafted report, an attacker could exploit this vulnerability to execute arbitrary code in the context of the current user.
CVE-2023-27979 CVSS:6.5
Schneider Electric IGSS is vulnerable to a denial of service, caused by a flaw in the IGSSdataServer process. By sending specially crafted messages to the Data Server TCP port, a remote attacker could exploit this vulnerability to cause a denial of service condition.
CVE-2023-27978 CVSS:4.4
Schneider Electric IGSS could allow a remote attacker to execute arbitrary code on the system, caused by an unsafe deserialization in the DashFiles class. By persuading a victim to open specially crafted report, an attacker could exploit this vulnerability to execute arbitrary code on the system.
CVE-2023-27977 CVSS:6.5
Schneider Electric IGSS is vulnerable to a denial of service, caused by a flaw in the IGSSdataServer process. By sending specially crafted messages to the Data Server TCP port, a remote attacker could exploit this vulnerability to cause a denial of service condition.
Schneider Electric
Refer to Schneider Electric Security Advisory for patch, upgrade or suggested workaround information.