Vulnerability CVE-2020-6650


Published: 2020-03-23

Description:
UPS companion software v1.05 & Prior is affected by ??Eval Injection?? vulnerability. The software does not neutralize or incorrectly neutralizes code syntax before using the input in a dynamic evaluation call e.g.?eval? in ??Update Manager? class when software attempts to see if there are updates available. This results in arbitrary code execution on the machine where software is installed.

Type:

CWE-94

(Improper Control of Generation of Code ('Code Injection'))

CVSS2 => (AV:A/AC:L/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5.8/10
6.4/10
6.5/10
Exploit range
Attack complexity
Authentication
Adjacent network
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Eaton -> Ups companion 

 References:
https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/eaton-vulnerability-advisory-UPS-companion-software.pdf

Copyright 2024, cxsecurity.com

 

Back to Top