{"uuid": "edd2674a-4c63-470e-95eb-73f5ed1e4f69", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-25549", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6262", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-25549\n\ud83d\udd25 CVSS Score: 7.2 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: \n\n\n\n\n\n\nA CWE-94: Improper Control of Generation of Code ('Code Injection') vulnerability exists that\nallows for remote code execution when using a parameter of the DCE network settings\nendpoint. \n\n\n\n\n \n\n \n\n Affected products: StruxureWare Data Center Expert (V7.9.2 and prior)\n\n\n\ud83d\udccf Published: 2023-04-18T20:35:42.008Z\n\ud83d\udccf Modified: 2025-03-03T19:14:28.433Z\n\ud83d\udd17 References:\n1. https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-045-02&amp;p_enDocType=Security+and+Safety+Notice&amp;p_File_Name=SEVD-2023-045-02.pdf", "creation_timestamp": "2025-03-03T19:30:57.000000Z"}