Schneider Electric EcoStruxure Power Monitoring Expert up to 2020 Web Page Generation cross site scripting
CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
2.5 | $0-$5k | 0.00 |
Overview
A vulnerability was found in Schneider Electric EcoStruxure Power Monitoring Expert up to 2020. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the component Web Page Generation Handler. The manipulation leads to cross site scripting. The CWE definition for the vulnerability is CWE-79. The weakness was published 01/12/2022 as SEVD-2022-011-07. It is possible to read the advisory at download.schneider-electric.com. This vulnerability is known as CVE-2022-22804. The attack can be launched remotely. There are no technical details available. There is no exploit available. The pricing for an exploit might be around USD $0-$5k at the moment. The attack technique deployed by this issue is T1059.007 according to MITRE ATT&CK. It is declared as not defined. We expect the 0-day to have been worth approximately $0-$5k. It is recommended to apply a patch to fix this issue. A possible mitigation has been published even before and not after the disclosure of the vulnerability. [Details]
Activities
Activities
IOC - Indicator of Compromise (1)
These indicators of compromise highlight associated network ranges which are known to be part of research and attack activities.
ID | IP range | Actor | Type | Confidence |
---|---|---|---|---|
1 | 185.220.102.0/24 | Prophet Spider | predictive | High |
TTP - Tactics, Techniques, Procedures (1)
Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.