Rewterz Threat Alert – LockBit Ransomware – Active IOCs
December 29, 2023Rewterz Threat Advisory – ICS: Schneider Electric EcoStruxure Power Monitoring and Power Operation Vulnerability
December 29, 2023Rewterz Threat Alert – LockBit Ransomware – Active IOCs
December 29, 2023Rewterz Threat Advisory – ICS: Schneider Electric EcoStruxure Power Monitoring and Power Operation Vulnerability
December 29, 2023Severity
High
Analysis Summary
CVE-2023-5399 CVSS:9.8
Schneider Electric SpaceLogic C-Bus Toolkit could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing “dot dot” sequences (/../) to access arbitrary files on the system.
CVE-2023-5402 CVSS:9.8
Schneider Electric SpaceLogic C-Bus Toolkit could allow a remote authenticated attacker to gain elevated privileges on the system, caused by improper privilege management vulnerability. By sending a specially crafted request, an attacker could exploit this vulnerability to escalate privileges and execute commands with system privileges.
Impact
- Privileges Escalation
Indicators Of Compromise
CVE
- CVE-2023-5399
- CVE-2023-5402
Affected Vendors
Schneider Electric
Affected Products
- Schneider Electric SpaceLogic C-Bus Toolkit 1.16.3
Remediation
Refer to Cisa Security Advisory for patch, upgrade or suggested workaround information.