{"api_version":"1","generated_at":"2026-05-13T08:50:34+00:00","cve":"CVE-2020-7520","urls":{"html":"https://cve.report/CVE-2020-7520","api":"https://cve.report/api/cve/CVE-2020-7520.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2020-7520","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2020-7520"},"summary":{"title":"CVE-2020-7520","description":"A CWE-601: URL Redirection to Untrusted Site ('Open Redirect') vulnerability exists in Schneider Electric Software Update (SESU), V2.4.0 and prior, which could cause execution of malicious code on the victim's machine. In order to exploit this vulnerability, an attacker requires privileged access on the engineering workstation to modify a Windows registry key which would divert all traffic updates to go through a server in the attacker's possession. A man-in-the-middle attack is then used to complete the exploit.","state":"PUBLIC","assigner":"cybersecurity@schneider-electric.com","published_at":"2020-07-23 21:15:00","updated_at":"2020-07-28 18:20:00"},"problem_types":["CWE-601"],"metrics":[],"references":[{"url":"https://www.se.com/ww/en/download/document/SEVD-2020-196-01/","name":"https://www.se.com/ww/en/download/document/SEVD-2020-196-01/","refsource":"MISC","tags":["Patch","Vendor Advisory"],"title":"Security Notification– Schneider Electric Software Update (SESU) | Schneider Electric","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2020-7520","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-7520","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2020","cve_id":"7520","vulnerable":"1","versionEndIncluding":"2.4.0","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"schneider-electric","cpe5":"software_update_utility","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2020-7520","ASSIGNER":"cybersecurity@schneider-electric.com","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"Schneider Electric Software Update (SESU) V2.4.0 and prior.","version":{"version_data":[{"version_value":"Schneider Electric Software Update (SESU) V2.4.0 and prior."}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-601: URL Redirection to Untrusted Site ('Open Redirect')"}]}]},"references":{"reference_data":[{"refsource":"MISC","name":"https://www.se.com/ww/en/download/document/SEVD-2020-196-01/","url":"https://www.se.com/ww/en/download/document/SEVD-2020-196-01/"}]},"description":{"description_data":[{"lang":"eng","value":"A CWE-601: URL Redirection to Untrusted Site ('Open Redirect') vulnerability exists in Schneider Electric Software Update (SESU), V2.4.0 and prior, which could cause execution of malicious code on the victim's machine. In order to exploit this vulnerability, an attacker requires privileged access on the engineering workstation to modify a Windows registry key which would divert all traffic updates to go through a server in the attacker's possession. A man-in-the-middle attack is then used to complete the exploit."}]}},"nvd":{"publishedDate":"2020-07-23 21:15:00","lastModifiedDate":"2020-07-28 18:20:00","problem_types":["CWE-601"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":4.7,"baseSeverity":"MEDIUM"},"exploitabilityScore":1.6,"impactScore":2.7},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:P/I:P/A:N","accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":4},"severity":"MEDIUM","exploitabilityScore":4.9,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:schneider-electric:software_update_utility:*:*:*:*:*:*:*:*","versionEndIncluding":"2.4.0","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2020","CveId":"7520","Ordinal":"167799","Title":"CVE-2020-7520","CVE":"CVE-2020-7520","Year":"2020"},"notes":[{"CveYear":"2020","CveId":"7520","Ordinal":"1","NoteData":"A CWE-601: URL Redirection to Untrusted Site ('Open Redirect') vulnerability exists in Schneider Electric Software Update (SESU), V2.4.0 and prior, which could cause execution of malicious code on the victim's machine. In order to exploit this vulnerability, an attacker requires privileged access on the engineering workstation to modify a Windows registry key which would divert all traffic updates to go through a server in the attacker's possession. A man-in-the-middle attack is then used to complete the exploit.","Type":"Description","Title":null},{"CveYear":"2020","CveId":"7520","Ordinal":"2","NoteData":"2020-07-23","Type":"Other","Title":"Published"},{"CveYear":"2020","CveId":"7520","Ordinal":"3","NoteData":"2020-07-23","Type":"Other","Title":"Modified"}]}}}