Description
In Fazecast jSerialComm, Version 2.2.2 and prior, an uncontrolled search path element vulnerability could allow a malicious DLL file with the same name of any resident DLLs inside the software installation to execute arbitrary code.
Published: 2020-05-14
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2020-3074 In Fazecast jSerialComm, Version 2.2.2 and prior, an uncontrolled search path element vulnerability could allow a malicious DLL file with the same name of any resident DLLs inside the software installation to execute arbitrary code.
History

No history.

Subscriptions

Fazecast Jserialcomm
Schneider-electric Ecostruxure It Gateway
cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2024-08-04T11:06:10.152Z

Reserved: 2020-03-16T00:00:00.000Z

Link: CVE-2020-10626

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-05-14T16:15:12.530

Modified: 2024-11-21T04:55:43.520

Link: CVE-2020-10626

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses