UPS companion software v1.05 & Prior is affected by ‘Eval Injection’ vulnerability. The software does not neutralize or incorrectly neutralizes code syntax before using the input in a dynamic evaluation call e.g.”eval” in “Update Manager” class when software attempts to see if there are updates available. This results in arbitrary code execution on the machine where software is installed.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2020-27797 | UPS companion software v1.05 & Prior is affected by ‘Eval Injection’ vulnerability. The software does not neutralize or incorrectly neutralizes code syntax before using the input in a dynamic evaluation call e.g.”eval” in “Update Manager” class when software attempts to see if there are updates available. This results in arbitrary code execution on the machine where software is installed. |
Fixes
Solution
Download and install the latest version from product website.
Workaround
Connect the host machine behind firewall and do not expose directly to internet.
References
History
No history.

Status: PUBLISHED
Assigner: Eaton
Published:
Updated: 2024-09-16T20:07:28.680Z
Reserved: 2020-01-09T00:00:00
Link: CVE-2020-6650

No data.

Status : Modified
Published: 2020-03-23T14:15:13.750
Modified: 2024-11-21T05:36:05.780
Link: CVE-2020-6650

No data.

No data.