{"uuid": "bb5ca9e3-be46-48fc-be12-23e6f12f49a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-7523", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/1730", "content": "#SCADA_Security\n1. Performing SQL Backflips to Achieve Code Execution on Schneider Electric\u2019s EcoStruxure Operator Terminal Expert, ver.3.1.100.267 (SP1) and prior (PoC)\nhttps://www.zerodayinitiative.com/blog/2020/9/9/performing-sql-backflips-to-achieve-code-execution-on-schneider-electrics-ecostruxure-operator-terminal-expert-at-pwn2own-miami-2020\n2. CVE-2020-7523:\nAbusing a shared memory for getting a LPE on the Schneider Electric Modbus Serial Driver (PoC)\nhttps://airbus-cyber-security.com/abusing-a-shared-memory-for-getting-a-local-privilege-escalation-on-the-schneider-electric-modbus-serial-driver-cve-2020-7523", "creation_timestamp": "2020-12-23T16:40:23.000000Z"}