PT-2018-46: Code Injection in EVLink Parking
Version: v3.2.0-12_v1 and earlier
Severity level: High
Impact: Unauthorized access
Access Vector: Remote
Base Score: 8.8
The specialists of the Positive Research center have detected a Code Injection vulnerability in the EVLink Parking product.
A code injection vulnerability in Schneider Electric’s EVLink Parking allows remote attackers to execute arbitrary code and obtain unauthorized access with maximum privileges.
How to fix
Use vendor's advisory:
31.05.2018 - Vendor gets vulnerability details
20.12.2018 - Vendor releases fixed version and details
26.12.2018 - Public disclosure
The vulnerability was detected by Vladimir Kononovich, Vyacheslav Moskvin, Positive Research Center (Positive Technologies Company)
Reports on the vulnerabilities previously discovered by Positive Research:
About Positive Technologies
Positive Technologies is a leading digital security firm with over 15 years of experience in 360° protection of critical IT systems against the most advanced cyberthreats. State-of-the-art solutions are developed at the company's research center—one of the largest in Europe. Positive Technologies experts have helped to identify and fix over 250 zero-day vulnerabilities in products from Cisco, Google, Honeywell, Huawei, Microsoft, Oracle, SAP, Schneider Electric, Siemens, and others, earning a reputation for world-class expertise in protection of devices and infrastructures at all scales from ATMs to nuclear power stations. Findings by Positive Technologies researchers are used for updating the MaxPatrol knowledge base and for development of security solutions including PT Application Firewall, PT Application Inspector, MaxPatrol. These products allow securing web applications, evaluating network protection, blocking attacks in real time, ensuring compliance with industry and national standards, and training security specialists. Positive Technologies is the organizer of the annual Positive Hack Days international forum and security competition.