{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T19:29:30.597","vulnerabilities":[{"cve":{"id":"CVE-2020-7520","sourceIdentifier":"cybersecurity@se.com","published":"2020-07-23T21:15:12.550","lastModified":"2024-11-21T05:37:18.200","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A CWE-601: URL Redirection to Untrusted Site ('Open Redirect') vulnerability exists in Schneider Electric Software Update (SESU), V2.4.0 and prior, which could cause execution of malicious code on the victim's machine. In order to exploit this vulnerability, an attacker requires privileged access on the engineering workstation to modify a Windows registry key which would divert all traffic updates to go through a server in the attacker's possession. A man-in-the-middle attack is then used to complete the exploit."},{"lang":"es","value":"CWE-601: Se presenta una vulnerabilidad de Redireccionamiento de URL a un Sitio no Confiable (\"Open Redirect\") en Schneider Electric Software Update (SESU), versiones V2.4.0 y anteriores, lo que podría causar una ejecución de código malicioso en la máquina de la víctima. A fin de explotar esta vulnerabilidad, un atacante requiere acceso privilegiado sobre la estación de trabajo de ingeniería para modificar una clave de registro de Windows que desviaría todas las actualizaciones de tráfico para pasar a través de un servidor en posesión del atacante. Un ataque man-in-the-middle es usado para completar la explotación"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":4.7,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":1.6,"impactScore":2.7}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:P/I:P/A:N","baseScore":4.0,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":4.9,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"cybersecurity@se.com","type":"Secondary","description":[{"lang":"en","value":"CWE-601"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-601"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:schneider-electric:software_update_utility:*:*:*:*:*:*:*:*","versionEndIncluding":"2.4.0","matchCriteriaId":"FED78F42-0A1F-4EB4-A45C-CD781E350508"}]}]}],"references":[{"url":"https://www.se.com/ww/en/download/document/SEVD-2020-196-01/","source":"cybersecurity@se.com","tags":["Patch","Vendor Advisory"]},{"url":"https://www.se.com/ww/en/download/document/SEVD-2020-196-01/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}