9.8

CVE-2020-28221

A CWE-20: Improper Input Validation vulnerability exists in EcoStruxure™ Operator Terminal Expert and Pro-face BLUE (version details in the notification) that could cause arbitrary code execution when the Ethernet Download feature is enable on the HMI.

Data is provided by the National Vulnerability Database (NVD)
Schneider-electricEcostruxure Operator Terminal Expert Version3.1
   Schneider-electricHmi Sto 501 Version-
   Schneider-electricHmi Sto 511 Version-
   Schneider-electricHmi Sto 512 Version-
   Schneider-electricHmi Sto 531 Version-
   Schneider-electricHmi Sto 532 Version-
   Schneider-electricHmig3u Version-
   Schneider-electricHmig3x Version-
   Schneider-electricHmig5u Version-
   Schneider-electricHmig5u2 Version-
   Schneider-electricHmist6200 Version-
   Schneider-electricHmist6400 Version-
   Schneider-electricHmist6500 Version-
   Schneider-electricHmist6600 Version-
   Schneider-electricHmist6700 Version-
Schneider-electricEcostruxure Operator Terminal Expert Version3.1 Updatesp1a
   Schneider-electricHmi Sto 501 Version-
   Schneider-electricHmi Sto 511 Version-
   Schneider-electricHmi Sto 512 Version-
   Schneider-electricHmi Sto 531 Version-
   Schneider-electricHmi Sto 532 Version-
   Schneider-electricHmig3u Version-
   Schneider-electricHmig3x Version-
   Schneider-electricHmig5u Version-
   Schneider-electricHmig5u2 Version-
   Schneider-electricHmist6200 Version-
   Schneider-electricHmist6400 Version-
   Schneider-electricHmist6500 Version-
   Schneider-electricHmist6600 Version-
   Schneider-electricHmist6700 Version-
Schneider-electricPro-face Blue Version3.1
   Schneider-electricGp-4104g Version-
   Schneider-electricGp-4104w Version-
   Schneider-electricGp-4105g Version-
   Schneider-electricGp-4105w Version-
   Schneider-electricGp-4106g Version-
   Schneider-electricGp-4106w Version-
   Schneider-electricGp-4107g Version-
   Schneider-electricGp-4107w Version-
   Schneider-electricSp-5400wa Version-
   Schneider-electricSp-5500tp Version-
   Schneider-electricSp-5500wa Version-
   Schneider-electricSp-5600ta Version-
   Schneider-electricSp-5600tp Version-
   Schneider-electricSp-5600wa Version-
   Schneider-electricSp-5660tp Version-
   Schneider-electricSp-5700tp Version-
   Schneider-electricSp-5700wc Version-
   Schneider-electricSp-5800wc Version-
   Schneider-electricSp-5b00 Version-
   Schneider-electricSp-5b10 Version-
   Schneider-electricSp-5b41 Version-
   Schneider-electricSt-6200wa Version-
   Schneider-electricSt-6400wa Version-
   Schneider-electricSt-6500wa Version-
   Schneider-electricSt-6600wa Version-
   Schneider-electricSt-6700wa Version-
Schneider-electricPro-face Blue Version3.1 Updatesp1a
   Schneider-electricGp-4104g Version-
   Schneider-electricGp-4104w Version-
   Schneider-electricGp-4105g Version-
   Schneider-electricGp-4105w Version-
   Schneider-electricGp-4106g Version-
   Schneider-electricGp-4106w Version-
   Schneider-electricGp-4107g Version-
   Schneider-electricGp-4107w Version-
   Schneider-electricSp-5400wa Version-
   Schneider-electricSp-5500tp Version-
   Schneider-electricSp-5500wa Version-
   Schneider-electricSp-5600ta Version-
   Schneider-electricSp-5600tp Version-
   Schneider-electricSp-5600wa Version-
   Schneider-electricSp-5660tp Version-
   Schneider-electricSp-5700tp Version-
   Schneider-electricSp-5700wc Version-
   Schneider-electricSp-5800wc Version-
   Schneider-electricSp-5b00 Version-
   Schneider-electricSp-5b10 Version-
   Schneider-electricSp-5b41 Version-
   Schneider-electricSt-6200wa Version-
   Schneider-electricSt-6400wa Version-
   Schneider-electricSt-6500wa Version-
   Schneider-electricSt-6600wa Version-
   Schneider-electricSt-6700wa Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.92% 0.739
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 9.3 8.6 10
AV:N/AC:M/Au:N/C:C/I:C/A:C
CWE-20 Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.