Vulnerabilites related to Schneider Electric - Unity Pro
var-201702-0301
Vulnerability from variot

An issue was discovered in Schneider Electric Unity PRO prior to V11.1. Unity projects can be compiled as x86 instructions and loaded onto the PLC Simulator delivered with Unity PRO. These x86 instructions are subsequently executed directly by the simulator. A specially crafted patched Unity project file can make the simulator execute malicious code by redirecting the control flow of these instructions. Unity Pro is a universal IEC61131-3 programming, debugging and runtime software package for Premium, Atrium and Quantum PLCs. A vulnerability could be exploited by a remote attacker to execute arbitrary code in the context of an application and could lead to a denial of service attack. Failed exploit attempts may result in a denial-of-service condition

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201702-0301",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "unity pro",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "schneider electric",
        "version": "11.0"
      },
      {
        "model": "unity pro",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "schneider electric",
        "version": "11.1"
      },
      {
        "model": "electric unity pro",
        "scope": null,
        "trust": 0.6,
        "vendor": "schneider",
        "version": null
      },
      {
        "model": "electric unity pro",
        "scope": "lt",
        "trust": 0.6,
        "vendor": "schneider",
        "version": "11.1"
      },
      {
        "model": "unity pro",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "schneider electric",
        "version": "11.0"
      },
      {
        "model": "unity pro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "schneider electric",
        "version": "8"
      },
      {
        "model": "unity pro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "schneider electric",
        "version": "7.0"
      },
      {
        "model": "unity pro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "schneider electric",
        "version": "6.1"
      },
      {
        "model": "unity pro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "schneider electric",
        "version": "6.0"
      },
      {
        "model": "unity pro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "schneider electric",
        "version": "6"
      },
      {
        "model": "unity pro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "schneider electric",
        "version": "11"
      },
      {
        "model": "unity pro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "schneider electric",
        "version": "10"
      },
      {
        "model": "unity pro",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "schneider electric",
        "version": "11.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "unity pro",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "3d0e9372-604f-483c-81b6-d6ca426de8cc"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-10461"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-10617"
      },
      {
        "db": "BID",
        "id": "93830"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007988"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201610-902"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-8354"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:schneider_electric:unity_pro",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007988"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The vendor reported this issue.",
    "sources": [
      {
        "db": "BID",
        "id": "93830"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2016-8354",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.1,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 4.9,
            "id": "CVE-2016-8354",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2016-10461",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.6,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 4.9,
            "id": "CNVD-2016-10617",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "3d0e9372-604f-483c-81b6-d6ca426de8cc",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.1,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 4.9,
            "id": "VHN-97174",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:H/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.0,
            "id": "CVE-2016-8354",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.8,
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2016-8354",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2016-8354",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2016-10461",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2016-10617",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201610-902",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "IVD",
            "id": "3d0e9372-604f-483c-81b6-d6ca426de8cc",
            "trust": 0.2,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-97174",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "3d0e9372-604f-483c-81b6-d6ca426de8cc"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-10461"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-10617"
      },
      {
        "db": "VULHUB",
        "id": "VHN-97174"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007988"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201610-902"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-8354"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "An issue was discovered in Schneider Electric Unity PRO prior to V11.1. Unity projects can be compiled as x86 instructions and loaded onto the PLC Simulator delivered with Unity PRO. These x86 instructions are subsequently executed directly by the simulator. A specially crafted patched Unity project file can make the simulator execute malicious code by redirecting the control flow of these instructions. Unity Pro is a universal IEC61131-3 programming, debugging and runtime software package for Premium, Atrium and Quantum PLCs. A vulnerability could be exploited by a remote attacker to execute arbitrary code in the context of an application and could lead to a denial of service attack. Failed exploit attempts may result in a denial-of-service condition",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2016-8354"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007988"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-10461"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-10617"
      },
      {
        "db": "BID",
        "id": "93830"
      },
      {
        "db": "IVD",
        "id": "3d0e9372-604f-483c-81b6-d6ca426de8cc"
      },
      {
        "db": "VULHUB",
        "id": "VHN-97174"
      }
    ],
    "trust": 3.24
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2016-8354",
        "trust": 3.6
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-16-306-03",
        "trust": 3.4
      },
      {
        "db": "BID",
        "id": "93830",
        "trust": 2.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201610-902",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-10461",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007988",
        "trust": 0.8
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-10617",
        "trust": 0.6
      },
      {
        "db": "SCHNEIDER",
        "id": "SEVD-2016-288-01",
        "trust": 0.3
      },
      {
        "db": "IVD",
        "id": "3D0E9372-604F-483C-81B6-D6CA426DE8CC",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-97174",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "3d0e9372-604f-483c-81b6-d6ca426de8cc"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-10461"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-10617"
      },
      {
        "db": "VULHUB",
        "id": "VHN-97174"
      },
      {
        "db": "BID",
        "id": "93830"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007988"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201610-902"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-8354"
      }
    ]
  },
  "id": "VAR-201702-0301",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "3d0e9372-604f-483c-81b6-d6ca426de8cc"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-10461"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-10617"
      },
      {
        "db": "VULHUB",
        "id": "VHN-97174"
      }
    ],
    "trust": 2.3333333
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 1.4
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "3d0e9372-604f-483c-81b6-d6ca426de8cc"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-10461"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-10617"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:13:10.787000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "SEVD-2016-288-01",
        "trust": 0.8,
        "url": "http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2016-288-01"
      },
      {
        "title": "Patch for Schneider Electric Unity PRO Remote Code Execution Vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/83328"
      },
      {
        "title": "Patch for Schneider Electric Unity Pro Remote Code Execution Vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/83536"
      },
      {
        "title": "Schneider Electric Unity Pro Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=65221"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-10461"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-10617"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007988"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201610-902"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-94",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-97174"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007988"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-8354"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.4,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-16-306-03"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/93830"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-8354"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2016-8354"
      },
      {
        "trust": 0.3,
        "url": "http://www.schneider-electric.com/site/home/index.cfm/ww/?selectcountry=true"
      },
      {
        "trust": 0.3,
        "url": "http://download.schneider-electric.com/files?p_reference=sevd-2016-288-01\u0026p_endoctype=technical%20leaflet\u0026p_file_id=4837908514\u0026p_file_name=sevd-2016-288-01+unity+simulator.pdf"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-10461"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-10617"
      },
      {
        "db": "VULHUB",
        "id": "VHN-97174"
      },
      {
        "db": "BID",
        "id": "93830"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007988"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201610-902"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-8354"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "3d0e9372-604f-483c-81b6-d6ca426de8cc"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-10461"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-10617"
      },
      {
        "db": "VULHUB",
        "id": "VHN-97174"
      },
      {
        "db": "BID",
        "id": "93830"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007988"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201610-902"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-8354"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2016-11-01T00:00:00",
        "db": "IVD",
        "id": "3d0e9372-604f-483c-81b6-d6ca426de8cc"
      },
      {
        "date": "2016-11-01T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2016-10461"
      },
      {
        "date": "2016-11-04T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2016-10617"
      },
      {
        "date": "2017-02-13T00:00:00",
        "db": "VULHUB",
        "id": "VHN-97174"
      },
      {
        "date": "2016-10-14T00:00:00",
        "db": "BID",
        "id": "93830"
      },
      {
        "date": "2017-04-04T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-007988"
      },
      {
        "date": "2016-11-02T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201610-902"
      },
      {
        "date": "2017-02-13T21:59:00.860000",
        "db": "NVD",
        "id": "CVE-2016-8354"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2016-11-01T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2016-10461"
      },
      {
        "date": "2016-11-04T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2016-10617"
      },
      {
        "date": "2017-03-15T00:00:00",
        "db": "VULHUB",
        "id": "VHN-97174"
      },
      {
        "date": "2016-11-24T01:07:00",
        "db": "BID",
        "id": "93830"
      },
      {
        "date": "2017-04-04T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-007988"
      },
      {
        "date": "2016-11-02T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201610-902"
      },
      {
        "date": "2024-11-21T02:59:12.550000",
        "db": "NVD",
        "id": "CVE-2016-8354"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201610-902"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Schneider Electric Unity PRO Remote code execution vulnerability",
    "sources": [
      {
        "db": "IVD",
        "id": "3d0e9372-604f-483c-81b6-d6ca426de8cc"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-10461"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-10617"
      }
    ],
    "trust": 1.4
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Code injection",
    "sources": [
      {
        "db": "IVD",
        "id": "3d0e9372-604f-483c-81b6-d6ca426de8cc"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201610-902"
      }
    ],
    "trust": 0.8
  }
}

var-201111-0307
Vulnerability from variot

Buffer overflow in the UnitelWay Windows Device Driver, as used in Schneider Electric Unity Pro 6 and earlier, OPC Factory Server 3.34, Vijeo Citect 7.20 and earlier, Telemecanique Driver Pack 2.6 and earlier, Monitor Pro 7.6 and earlier, and PL7 Pro 4.5 and earlier, allows local users, and possibly remote attackers, to execute arbitrary code via an unspecified system parameter. There are security vulnerabilities in multiple Schneider products that allow malicious local users to increase privileges. The vulnerability is due to security issues with UnitelWay windows device drivers used by Schneider's multiple products. A local attacker can exploit this issue to execute arbitrary code with elevated privileges, which may facilitate a complete compromise of the affected computer. ----------------------------------------------------------------------

Ovum says ad hoc tools are out-dated. The best practice approach? Fast vulnerability intelligence, threat handling, and setup in one tool.

Read the new report on the Secunia VIM: http://secunia.com/products/corporate/vim/ovum_2011_request/


TITLE: Schneider Electric Products UnitelWay Device Driver Privilege Escalation Vulnerability

SECUNIA ADVISORY ID: SA46534

VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/46534/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=46534

RELEASE DATE: 2011-10-22

DISCUSS ADVISORY: http://secunia.com/advisories/46534/#comments

AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)

http://secunia.com/advisories/46534/

ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS

https://ca.secunia.com/?page=viewadvisory&vuln_id=46534

ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING

http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

DESCRIPTION: A vulnerability has been reported in multiple Schneider Electric products, which can be exploited by malicious, local users to gain escalated privileges.

Successful exploitation may allow execution of arbitrary code. * OPC Factory Server version 3.34.

SOLUTION: Apply patch.

Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

PROVIDED AND/OR DISCOVERED BY: ICS-CERT credits Kuang-Chun Hung, Security Research and Service Institute - Information and Communication Security Technology Center (ICST).

ORIGINAL ADVISORY: Schneider Electric: http://www.scada.schneider-electric.com/sites/scada/en/login/vijeo-citect-unitelway-windows-device-driver.page

ICS-CERT (ICSA-11-277-01): http://www.us-cert.gov/control_systems/pdf/ICSA-11-277-01.pdf

OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/


About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201111-0307",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "monitor pro",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "schneider electric",
        "version": "7.6"
      },
      {
        "model": "pl7 pro",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "schneider electric",
        "version": "4.5"
      },
      {
        "model": "telemecanique driver pack",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "schneider electric",
        "version": "2.6"
      },
      {
        "model": "vijeo citect",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "schneider electric",
        "version": "7.20"
      },
      {
        "model": "opc factory server",
        "scope": "eq",
        "trust": 1.4,
        "vendor": "schneider electric",
        "version": "3.34"
      },
      {
        "model": "unity pro",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "schneider electric",
        "version": "6.0"
      },
      {
        "model": "opc factory server",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "schneider electric",
        "version": "3.34"
      },
      {
        "model": "unity pro",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "schneider electric",
        "version": "6"
      },
      {
        "model": "electric opc factory server",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "schneider",
        "version": "3.x"
      },
      {
        "model": "electric pl7 pro",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "schneider",
        "version": "4.x"
      },
      {
        "model": "electric monitor",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "schneider",
        "version": "7.x"
      },
      {
        "model": "electric telemecanique driver pack",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "schneider",
        "version": "2.x"
      },
      {
        "model": "electric unity pro",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "schneider",
        "version": "6.x"
      },
      {
        "model": "electric vijeo citect",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "schneider",
        "version": "7.x"
      },
      {
        "model": "telemecanique driver pack",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "schneider electric",
        "version": "2.6"
      },
      {
        "model": "pl7 pro",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "schneider electric",
        "version": "4.5"
      },
      {
        "model": "vijeo citect",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "schneider electric",
        "version": "7.20"
      },
      {
        "model": "monitor pro",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "schneider electric",
        "version": "7.6"
      },
      {
        "model": "unity pro",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "schneider electric",
        "version": "6.0"
      },
      {
        "model": "electric vijeo citect",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "schneider",
        "version": "7.20"
      },
      {
        "model": "electric unity pro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "schneider",
        "version": "6.0"
      },
      {
        "model": "electric telemecanique driver",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "schneider",
        "version": "2.6"
      },
      {
        "model": "electric pl7 pro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "schneider",
        "version": "4.5"
      },
      {
        "model": "electric opc factory driver",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "schneider",
        "version": "3.34"
      },
      {
        "model": "electric monitor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "schneider",
        "version": "7.6"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "monitor pro",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "opc factory server",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "pl7 pro",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "telemecanique driver pack",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "unity pro",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "vijeo citect",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "6b45d13c-2354-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2011-4411"
      },
      {
        "db": "BID",
        "id": "50319"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-002806"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201110-579"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-3330"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:schneider_electric:monitor_pro",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:schneider_electric:opc_factory_server",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:schneider_electric:pl7_pro",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:schneider_electric:telemecanique_driver_pack",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:schneider_electric:unity_pro",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:schneider_electric:vijeo_citect",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-002806"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Kuang-Chun Hung of Security Research and Service Institute - Information and Communication Security Technology Center (ICST).",
    "sources": [
      {
        "db": "BID",
        "id": "50319"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2011-3330",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.9,
            "id": "CVE-2011-3330",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.9,
            "id": "6b45d13c-2354-11e6-abef-000c29c66e3d",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.9,
            "id": "VHN-51275",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2011-3330",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2011-3330",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201110-579",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "IVD",
            "id": "6b45d13c-2354-11e6-abef-000c29c66e3d",
            "trust": 0.2,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-51275",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "6b45d13c-2354-11e6-abef-000c29c66e3d"
      },
      {
        "db": "VULHUB",
        "id": "VHN-51275"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-002806"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201110-579"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-3330"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Buffer overflow in the UnitelWay Windows Device Driver, as used in Schneider Electric Unity Pro 6 and earlier, OPC Factory Server 3.34, Vijeo Citect 7.20 and earlier, Telemecanique Driver Pack 2.6 and earlier, Monitor Pro 7.6 and earlier, and PL7 Pro 4.5 and earlier, allows local users, and possibly remote attackers, to execute arbitrary code via an unspecified system parameter. There are security vulnerabilities in multiple Schneider products that allow malicious local users to increase privileges. The vulnerability is due to security issues with UnitelWay windows device drivers used by Schneider\u0027s multiple products. \nA local attacker can exploit this issue to execute arbitrary code with elevated privileges, which may facilitate a complete compromise of the affected computer. ----------------------------------------------------------------------\n\nOvum says ad hoc tools are out-dated. The best practice approach?\nFast vulnerability intelligence, threat handling, and setup in one tool. \n\nRead the new report on the Secunia VIM:\nhttp://secunia.com/products/corporate/vim/ovum_2011_request/ \n\n----------------------------------------------------------------------\n\nTITLE:\nSchneider Electric Products UnitelWay Device Driver Privilege\nEscalation Vulnerability\n\nSECUNIA ADVISORY ID:\nSA46534\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/46534/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=46534\n\nRELEASE DATE:\n2011-10-22\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/46534/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/46534/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=46534\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nA vulnerability has been reported in multiple Schneider Electric\nproducts, which can be exploited by malicious, local users to gain\nescalated privileges. \n\nSuccessful exploitation may allow execution of arbitrary code. \n* OPC Factory Server version 3.34. \n\nSOLUTION:\nApply patch. \n\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nPROVIDED AND/OR DISCOVERED BY:\nICS-CERT credits Kuang-Chun Hung, Security Research and Service\nInstitute - Information and Communication Security Technology Center\n(ICST). \n\nORIGINAL ADVISORY:\nSchneider Electric:\nhttp://www.scada.schneider-electric.com/sites/scada/en/login/vijeo-citect-unitelway-windows-device-driver.page\n\nICS-CERT (ICSA-11-277-01):\nhttp://www.us-cert.gov/control_systems/pdf/ICSA-11-277-01.pdf\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2011-3330"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-002806"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2011-4411"
      },
      {
        "db": "BID",
        "id": "50319"
      },
      {
        "db": "IVD",
        "id": "6b45d13c-2354-11e6-abef-000c29c66e3d"
      },
      {
        "db": "VULHUB",
        "id": "VHN-51275"
      },
      {
        "db": "PACKETSTORM",
        "id": "106085"
      }
    ],
    "trust": 2.79
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2011-3330",
        "trust": 3.6
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-11-277-01",
        "trust": 3.5
      },
      {
        "db": "BID",
        "id": "50319",
        "trust": 2.0
      },
      {
        "db": "SECUNIA",
        "id": "46534",
        "trust": 1.9
      },
      {
        "db": "SECTRACK",
        "id": "1026234",
        "trust": 1.7
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201110-579",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2011-4411",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-002806",
        "trust": 0.8
      },
      {
        "db": "NSFOCUS",
        "id": "18035",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "70882",
        "trust": 0.6
      },
      {
        "db": "IVD",
        "id": "6B45D13C-2354-11E6-ABEF-000C29C66E3D",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-51275",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "106085",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "6b45d13c-2354-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2011-4411"
      },
      {
        "db": "VULHUB",
        "id": "VHN-51275"
      },
      {
        "db": "BID",
        "id": "50319"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-002806"
      },
      {
        "db": "PACKETSTORM",
        "id": "106085"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201110-579"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-3330"
      }
    ]
  },
  "id": "VAR-201111-0307",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "6b45d13c-2354-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2011-4411"
      },
      {
        "db": "VULHUB",
        "id": "VHN-51275"
      }
    ],
    "trust": 1.631603578888889
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "6b45d13c-2354-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2011-4411"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:56:49.103000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "MyCitect Support",
        "trust": 0.8,
        "url": "http://www.scada.schneider-electric.com/sites/scada/en/login/vijeo-citect-unitelway-windows-device-driver.page"
      },
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://www.schneider-electric.com/"
      },
      {
        "title": "\u30b5\u30dd\u30fc\u30c8",
        "trust": 0.8,
        "url": "http://www.schneider-electric.co.jp/sites/japan/jp/support/contact/we-care.page"
      },
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://www.schneider-electric.com/site/home/index.cfm/jp/"
      },
      {
        "title": "Schneider Electric Product UnitelWay Device Driver Privilege Escalation Vulnerability Patch",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/5582"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2011-4411"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-002806"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-51275"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-002806"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-3330"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.9,
        "url": "http://www.us-cert.gov/control_systems/pdf/icsa-11-277-01.pdf"
      },
      {
        "trust": 2.1,
        "url": "http://www.scada.schneider-electric.com/sites/scada/en/login/vijeo-citect-unitelway-windows-device-driver.page"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/50319"
      },
      {
        "trust": 1.7,
        "url": "http://www.securitytracker.com/id?1026234"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/46534"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70882"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-3330"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-3330"
      },
      {
        "trust": 0.6,
        "url": "http://www.us-cert.gov/control_systems/pdf/icsa-11-277-01.pdfhttp"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/70882"
      },
      {
        "trust": 0.6,
        "url": "http://www.nsfocus.net/vulndb/18035"
      },
      {
        "trust": 0.3,
        "url": "http://www.schneider-electric.com/site/home/index.cfm/ww/?selectcountry=true"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/46534/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/46534/#comments"
      },
      {
        "trust": 0.1,
        "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=46534"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_intelligence/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_scanning/personal/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/products/corporate/vim/ovum_2011_request/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/about_secunia_advisories/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2011-4411"
      },
      {
        "db": "VULHUB",
        "id": "VHN-51275"
      },
      {
        "db": "BID",
        "id": "50319"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-002806"
      },
      {
        "db": "PACKETSTORM",
        "id": "106085"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201110-579"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-3330"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "6b45d13c-2354-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2011-4411"
      },
      {
        "db": "VULHUB",
        "id": "VHN-51275"
      },
      {
        "db": "BID",
        "id": "50319"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-002806"
      },
      {
        "db": "PACKETSTORM",
        "id": "106085"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201110-579"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-3330"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2011-10-24T00:00:00",
        "db": "IVD",
        "id": "6b45d13c-2354-11e6-abef-000c29c66e3d"
      },
      {
        "date": "2011-10-24T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2011-4411"
      },
      {
        "date": "2011-11-04T00:00:00",
        "db": "VULHUB",
        "id": "VHN-51275"
      },
      {
        "date": "2011-10-20T00:00:00",
        "db": "BID",
        "id": "50319"
      },
      {
        "date": "2011-11-14T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2011-002806"
      },
      {
        "date": "2011-10-22T06:39:43",
        "db": "PACKETSTORM",
        "id": "106085"
      },
      {
        "date": "2011-10-25T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201110-579"
      },
      {
        "date": "2011-11-04T21:55:03.113000",
        "db": "NVD",
        "id": "CVE-2011-3330"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2011-10-24T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2011-4411"
      },
      {
        "date": "2017-08-29T00:00:00",
        "db": "VULHUB",
        "id": "VHN-51275"
      },
      {
        "date": "2015-03-19T09:31:00",
        "db": "BID",
        "id": "50319"
      },
      {
        "date": "2011-11-14T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2011-002806"
      },
      {
        "date": "2011-11-07T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201110-579"
      },
      {
        "date": "2024-11-21T01:30:16.777000",
        "db": "NVD",
        "id": "CVE-2011-3330"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "BID",
        "id": "50319"
      },
      {
        "db": "PACKETSTORM",
        "id": "106085"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201110-579"
      }
    ],
    "trust": 1.0
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  Schneider Electric Product buffer overflow vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-002806"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Buffer overflow",
    "sources": [
      {
        "db": "IVD",
        "id": "6b45d13c-2354-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201110-579"
      }
    ],
    "trust": 0.8
  }
}

var-202001-1872
Vulnerability from variot

Incorrect Authorization vulnerability exists in EcoStruxure Control Expert (all versions prior to 14.1 Hot Fix), Unity Pro (all versions), Modicon M340 (all versions prior to V3.20) , and Modicon M580 (all versions prior to V3.10), which could cause a bypass of the authentication process between EcoStruxure Control Expert and the M340 and M580 controllers. Schneider Electric EcoStruxure Control Expert (formerly known as Unity Pro) and Unity Pro are products of the French company Schneider Electric. Schneider Electric EcoStruxure Control Expert is a set of programming software for Schneider Electric logic controller products. Unity Pro is a set of universal programming, debugging and operating software for the Modicon Premium, Atrium and Quantum PLC series. The vulnerability stems from a lack of authentication measures or insufficient authentication strength in a network system or product. No detailed vulnerability details are provided at this time

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202001-1872",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "modicon m580 bmep582020",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "schneider electric",
        "version": "3.10"
      },
      {
        "model": "modicon m580 bmep586040",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "schneider electric",
        "version": "3.10"
      },
      {
        "model": "modicon m580 bmep583040",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "schneider electric",
        "version": "3.10"
      },
      {
        "model": "ecostruxure control expert",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "schneider electric",
        "version": "14.1"
      },
      {
        "model": "modicon m580 bmeh582040",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "schneider electric",
        "version": "3.10"
      },
      {
        "model": "modicon m340 bmxp3420102",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "schneider electric",
        "version": "3.20"
      },
      {
        "model": "modicon m580 bmep584040",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "schneider electric",
        "version": "3.10"
      },
      {
        "model": "modicon m580 bmeh586040",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "schneider electric",
        "version": "3.10"
      },
      {
        "model": "modicon m340 bmxp3420302",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "schneider electric",
        "version": "3.20"
      },
      {
        "model": "modicon m340 bmxp342020",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "schneider electric",
        "version": "3.20"
      },
      {
        "model": "modicon m340 bmxp341000",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "schneider electric",
        "version": "3.20"
      },
      {
        "model": "modicon m580 bmep584020",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "schneider electric",
        "version": "3.10"
      },
      {
        "model": "modicon m580 bmep585040",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "schneider electric",
        "version": "3.10"
      },
      {
        "model": "modicon m580 bmep582040",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "schneider electric",
        "version": "3.10"
      },
      {
        "model": "modicon m580 bmep581020",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "schneider electric",
        "version": "3.10"
      },
      {
        "model": "modicon m580 bmeh584040s",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "schneider electric",
        "version": "3.10"
      },
      {
        "model": "modicon m580 bmep583020",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "schneider electric",
        "version": "3.10"
      },
      {
        "model": "modicon m580 bmep584040s",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "schneider electric",
        "version": "3.10"
      },
      {
        "model": "modicon m580 bmep582040s",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "schneider electric",
        "version": "3.10"
      },
      {
        "model": "unity pro",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "schneider electric",
        "version": "*"
      },
      {
        "model": "modicon m580 bmeh586040s",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "schneider electric",
        "version": "3.10"
      },
      {
        "model": "modicon m580 bmeh584040",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "schneider electric",
        "version": "3.10"
      },
      {
        "model": "modicon m340 bmxp342000",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "schneider electric",
        "version": "3.20"
      },
      {
        "model": "ecostruxure control expert",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "schneider electric",
        "version": "14.1"
      },
      {
        "model": "ecostruxure control expert",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "schneider electric",
        "version": "14.0"
      },
      {
        "model": "unity pro",
        "scope": null,
        "trust": 0.8,
        "vendor": "schneider electric",
        "version": null
      },
      {
        "model": "electric unity pro",
        "scope": null,
        "trust": 0.6,
        "vendor": "schneider",
        "version": null
      },
      {
        "model": "electric ecostruxure control expert",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "schneider",
        "version": "14.0"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-03779"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-014098"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-6855"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:schneider_electric:ecostruxure_control_expert",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:schneider_electric:unity_pro",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-014098"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Rongkuan Ma, Xin Che and Peng Cheng (Zhejiang University)",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202001-140"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2019-6855",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2019-6855",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "NONE",
            "baseScore": 6.4,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2020-03779",
            "impactScore": 4.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-158290",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "LOW",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "LOW",
            "exploitabilityScore": 3.9,
            "id": "CVE-2019-6855",
            "impactScore": 3.4,
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "Low",
            "baseScore": 7.3,
            "baseSeverity": "High",
            "confidentialityImpact": "Low",
            "exploitabilityScore": null,
            "id": "CVE-2019-6855",
            "impactScore": null,
            "integrityImpact": "Low",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2019-6855",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2019-6855",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2020-03779",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202001-140",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201912-831",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-158290",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-03779"
      },
      {
        "db": "VULHUB",
        "id": "VHN-158290"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-014098"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202001-140"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201912-831"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-6855"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Incorrect Authorization vulnerability exists in EcoStruxure Control Expert (all versions prior to 14.1 Hot Fix), Unity Pro (all versions), Modicon M340 (all versions prior to V3.20) , and Modicon M580 (all versions prior to V3.10), which could cause a bypass of the authentication process between EcoStruxure Control Expert and the M340 and M580 controllers. Schneider Electric EcoStruxure Control Expert (formerly known as Unity Pro) and Unity Pro are products of the French company Schneider Electric. Schneider Electric EcoStruxure Control Expert is a set of programming software for Schneider Electric logic controller products. Unity Pro is a set of universal programming, debugging and operating software for the Modicon Premium, Atrium and Quantum PLC series. The vulnerability stems from a lack of authentication measures or insufficient authentication strength in a network system or product. No detailed vulnerability details are provided at this time",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2019-6855"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-014098"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-03779"
      },
      {
        "db": "VULHUB",
        "id": "VHN-158290"
      }
    ],
    "trust": 2.25
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2019-6855",
        "trust": 3.7
      },
      {
        "db": "SCHNEIDER",
        "id": "SEVD-2019-344-02",
        "trust": 2.3
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-014098",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201912-831",
        "trust": 0.7
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202001-140",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-03779",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-158290",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-03779"
      },
      {
        "db": "VULHUB",
        "id": "VHN-158290"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-014098"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202001-140"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201912-831"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-6855"
      }
    ]
  },
  "id": "VAR-202001-1872",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-03779"
      },
      {
        "db": "VULHUB",
        "id": "VHN-158290"
      }
    ],
    "trust": 1.4310185
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-03779"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:29:47.024000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "SEVD-2019-344-02",
        "trust": 0.8,
        "url": "https://www.se.com/ww/en/download/document/SEVD-2019-344-02"
      },
      {
        "title": "Patch for Schneider Electric EcoStruxure Control Expert and Unity Pro Licensing Issue Vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/199155"
      },
      {
        "title": "Schneider Electric EcoStruxure Control Expert  and Unity Pro Remediation measures for authorization problem vulnerabilities",
        "trust": 0.6,
        "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=108294"
      },
      {
        "title": "Schneider Electric EcoStruxure Control Expert Remediation measures for authorization problem vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=105932"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-03779"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-014098"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202001-140"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201912-831"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-863",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-158290"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-014098"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-6855"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.6,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-6855"
      },
      {
        "trust": 2.3,
        "url": "https://www.se.com/ww/en/download/document/sevd-2019-344-02/"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-6855"
      },
      {
        "trust": 0.6,
        "url": "https://www.se.com/ww/en/download/document/sevd-2019-344-02"
      },
      {
        "trust": 0.6,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-18181"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-03779"
      },
      {
        "db": "VULHUB",
        "id": "VHN-158290"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-014098"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202001-140"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201912-831"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-6855"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-03779"
      },
      {
        "db": "VULHUB",
        "id": "VHN-158290"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-014098"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202001-140"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201912-831"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-6855"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-02-05T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2020-03779"
      },
      {
        "date": "2020-01-06T00:00:00",
        "db": "VULHUB",
        "id": "VHN-158290"
      },
      {
        "date": "2020-01-31T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-014098"
      },
      {
        "date": "2020-01-06T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202001-140"
      },
      {
        "date": "2019-12-10T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201912-831"
      },
      {
        "date": "2020-01-06T23:15:11.237000",
        "db": "NVD",
        "id": "CVE-2019-6855"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-02-05T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2020-03779"
      },
      {
        "date": "2021-12-10T00:00:00",
        "db": "VULHUB",
        "id": "VHN-158290"
      },
      {
        "date": "2020-01-31T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-014098"
      },
      {
        "date": "2022-11-15T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202001-140"
      },
      {
        "date": "2022-03-10T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201912-831"
      },
      {
        "date": "2024-11-21T04:47:17.287000",
        "db": "NVD",
        "id": "CVE-2019-6855"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202001-140"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201912-831"
      }
    ],
    "trust": 1.2
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "EcoStruxure Control Expert and  Unity Pro Vulnerable to unauthorized authentication",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-014098"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "other",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202001-140"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201912-831"
      }
    ],
    "trust": 1.2
  }
}

var-201502-0244
Vulnerability from variot

Stack-based buffer overflow in an unspecified DLL file in a DTM development kit in Schneider Electric Unity Pro, SoMachine, SoMove, SoMove Lite, Modbus Communication Library 2.2.6 and earlier, CANopen Communication Library 1.0.2 and earlier, EtherNet/IP Communication Library 1.0.0 and earlier, EM X80 Gateway DTM (MB TCP/SL), Advantys DTM for OTB, Advantys DTM for STB, KINOS DTM, SOLO DTM, and Xantrex DTMs allows remote attackers to execute arbitrary code via unspecified vectors. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Schneider Electric SoMove Lite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the IsObjectModel.ModelObject.1 ActiveX control in isObjectModel.dll. The control does not check the length of an attacker-supplied string in the RemoveParameter method before copying it into a fixed length buffer on the stack. This allows an attacker to execute arbitrary code in the context of the browser process. Schneider Electric provides total solutions for the energy and infrastructure, industrial, data center and network, building and residential markets in more than 100 countries. Failed exploit attempts will result in a denial-of-service condition. Schneider Electric Unity Pro, etc. are all products of French Schneider Electric (Schneider Electric). Schneider Electric Unity Pro is a set of development software for testing, debugging and managing applications; SoMachine is a set of original equipment manufacturer (OEM) automation platform integrated with Vijeo-Designer (human machine interface HMI development software); SoMove is a Installation software for motor control equipment

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201502-0244",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "somachine",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "schneider electric",
        "version": null
      },
      {
        "model": "somove lite",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "schneider electric",
        "version": null
      },
      {
        "model": "unity pro",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "schneider electric",
        "version": null
      },
      {
        "model": "somove",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "schneider electric",
        "version": null
      },
      {
        "model": "somove lite",
        "scope": null,
        "trust": 1.5,
        "vendor": "schneider electric",
        "version": null
      },
      {
        "model": "somachine",
        "scope": null,
        "trust": 0.8,
        "vendor": "schneider electric",
        "version": null
      },
      {
        "model": "somove",
        "scope": null,
        "trust": 0.8,
        "vendor": "schneider electric",
        "version": null
      },
      {
        "model": "unity pro",
        "scope": null,
        "trust": 0.8,
        "vendor": "schneider electric",
        "version": null
      },
      {
        "model": "electric unity pro",
        "scope": null,
        "trust": 0.6,
        "vendor": "schneider",
        "version": null
      },
      {
        "model": "electric somachine",
        "scope": null,
        "trust": 0.6,
        "vendor": "schneider",
        "version": null
      },
      {
        "model": "electric somove lite",
        "scope": null,
        "trust": 0.6,
        "vendor": "schneider",
        "version": null
      },
      {
        "model": "electric somove",
        "scope": null,
        "trust": 0.6,
        "vendor": "schneider",
        "version": null
      },
      {
        "model": "electric modbus communication library",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "schneider",
        "version": "\u003c=2.2.6"
      },
      {
        "model": "electric canopen communication library",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "schneider",
        "version": "\u003c=1.0.2"
      },
      {
        "model": "electric ethernet/ip communication librar",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "schneider",
        "version": "\u003c=1.0.0"
      },
      {
        "model": "electric xantrex dtms",
        "scope": null,
        "trust": 0.6,
        "vendor": "schneider",
        "version": null
      },
      {
        "model": "electric solo dtm",
        "scope": null,
        "trust": 0.6,
        "vendor": "schneider",
        "version": null
      },
      {
        "model": "electric advantys dtms",
        "scope": null,
        "trust": 0.6,
        "vendor": "schneider",
        "version": null
      },
      {
        "model": "electric em gateway dtm",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "schneider",
        "version": "x80"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "somachine",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "somove",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "somove lite",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "unity pro",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "a52677d8-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "ZDI",
        "id": "ZDI-15-040"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-00775"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-007827"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201502-005"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-9200"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:schneider_electric:somachine",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:schneider_electric:somove",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:schneider_electric:somove_lite",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:schneider_electric:unity_pro",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-007827"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Ariele Caltabiano (kimiya)",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-15-040"
      },
      {
        "db": "BID",
        "id": "72335"
      }
    ],
    "trust": 1.0
  },
  "cve": "CVE-2014-9200",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2014-9200",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 2.5,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2015-00775",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "a52677d8-2351-11e6-abef-000c29c66e3d",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-77145",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2014-9200",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2014-9200",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "ZDI",
            "id": "CVE-2014-9200",
            "trust": 0.7,
            "value": "HIGH"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2015-00775",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201502-005",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "IVD",
            "id": "a52677d8-2351-11e6-abef-000c29c66e3d",
            "trust": 0.2,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-77145",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "a52677d8-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "ZDI",
        "id": "ZDI-15-040"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-00775"
      },
      {
        "db": "VULHUB",
        "id": "VHN-77145"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-007827"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201502-005"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-9200"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Stack-based buffer overflow in an unspecified DLL file in a DTM development kit in Schneider Electric Unity Pro, SoMachine, SoMove, SoMove Lite, Modbus Communication Library 2.2.6 and earlier, CANopen Communication Library 1.0.2 and earlier, EtherNet/IP Communication Library 1.0.0 and earlier, EM X80 Gateway DTM (MB TCP/SL), Advantys DTM for OTB, Advantys DTM for STB, KINOS DTM, SOLO DTM, and Xantrex DTMs allows remote attackers to execute arbitrary code via unspecified vectors. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Schneider Electric SoMove Lite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the IsObjectModel.ModelObject.1 ActiveX control in isObjectModel.dll. The control does not check the length of an attacker-supplied string in the RemoveParameter method before copying it into a fixed length buffer on the stack. This allows an attacker to execute arbitrary code in the context of the browser process. Schneider Electric provides total solutions for the energy and infrastructure, industrial, data center and network, building and residential markets in more than 100 countries. Failed exploit attempts will result in a denial-of-service condition. Schneider Electric Unity Pro, etc. are all products of French Schneider Electric (Schneider Electric). Schneider Electric Unity Pro is a set of development software for testing, debugging and managing applications; SoMachine is a set of original equipment manufacturer (OEM) automation platform integrated with Vijeo-Designer (human machine interface HMI development software); SoMove is a Installation software for motor control equipment",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2014-9200"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-007827"
      },
      {
        "db": "ZDI",
        "id": "ZDI-15-040"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-00775"
      },
      {
        "db": "BID",
        "id": "72335"
      },
      {
        "db": "IVD",
        "id": "a52677d8-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "VULHUB",
        "id": "VHN-77145"
      }
    ],
    "trust": 3.33
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2014-9200",
        "trust": 4.3
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-15-027-02",
        "trust": 3.1
      },
      {
        "db": "BID",
        "id": "72335",
        "trust": 2.0
      },
      {
        "db": "SCHNEIDER",
        "id": "SEVD-2015-009-01",
        "trust": 1.7
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201502-005",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-00775",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-007827",
        "trust": 0.8
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-2478",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-15-040",
        "trust": 0.7
      },
      {
        "db": "IVD",
        "id": "A52677D8-2351-11E6-ABEF-000C29C66E3D",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-77145",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "a52677d8-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "ZDI",
        "id": "ZDI-15-040"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-00775"
      },
      {
        "db": "VULHUB",
        "id": "VHN-77145"
      },
      {
        "db": "BID",
        "id": "72335"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-007827"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201502-005"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-9200"
      }
    ]
  },
  "id": "VAR-201502-0244",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "a52677d8-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-00775"
      },
      {
        "db": "VULHUB",
        "id": "VHN-77145"
      }
    ],
    "trust": 1.84333333
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "a52677d8-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-00775"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:49:23.948000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "SEVD-2015-009-01",
        "trust": 0.8,
        "url": "http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2015-009-01"
      },
      {
        "title": "Schneider Electric has issued an update to correct this vulnerability.",
        "trust": 0.7,
        "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-027-02"
      },
      {
        "title": "Patch for multiple Schneider Electric product stack buffer overflow vulnerabilities",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/54843"
      },
      {
        "title": "FDT1 DLL Removal Patch",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=53580"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-15-040"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-00775"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-007827"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201502-005"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-77145"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-007827"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-9200"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.8,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-15-027-02"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/72335"
      },
      {
        "trust": 1.7,
        "url": "http://download.schneider-electric.com/files?p_doc_ref=sevd-2015-009-01"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-9200"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-9200"
      },
      {
        "trust": 0.3,
        "url": "http://www.schneider-electric.com/site/home/index.cfm/ww/?selectcountry=true"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-15-040"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-00775"
      },
      {
        "db": "VULHUB",
        "id": "VHN-77145"
      },
      {
        "db": "BID",
        "id": "72335"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-007827"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201502-005"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-9200"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "a52677d8-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "ZDI",
        "id": "ZDI-15-040"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-00775"
      },
      {
        "db": "VULHUB",
        "id": "VHN-77145"
      },
      {
        "db": "BID",
        "id": "72335"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-007827"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201502-005"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-9200"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2015-02-02T00:00:00",
        "db": "IVD",
        "id": "a52677d8-2351-11e6-abef-000c29c66e3d"
      },
      {
        "date": "2015-02-10T00:00:00",
        "db": "ZDI",
        "id": "ZDI-15-040"
      },
      {
        "date": "2015-01-30T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2015-00775"
      },
      {
        "date": "2015-02-01T00:00:00",
        "db": "VULHUB",
        "id": "VHN-77145"
      },
      {
        "date": "2015-01-09T00:00:00",
        "db": "BID",
        "id": "72335"
      },
      {
        "date": "2015-02-13T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2014-007827"
      },
      {
        "date": "2015-02-02T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201502-005"
      },
      {
        "date": "2015-02-01T15:59:06.197000",
        "db": "NVD",
        "id": "CVE-2014-9200"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2015-02-10T00:00:00",
        "db": "ZDI",
        "id": "ZDI-15-040"
      },
      {
        "date": "2015-02-02T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2015-00775"
      },
      {
        "date": "2016-12-31T00:00:00",
        "db": "VULHUB",
        "id": "VHN-77145"
      },
      {
        "date": "2015-07-15T00:14:00",
        "db": "BID",
        "id": "72335"
      },
      {
        "date": "2015-02-13T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2014-007827"
      },
      {
        "date": "2015-02-02T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201502-005"
      },
      {
        "date": "2024-11-21T02:20:23.350000",
        "db": "NVD",
        "id": "CVE-2014-9200"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201502-005"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  Schneider Electric Product  DTM Unspecified development kit  DLL File stack-based buffer overflow vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-007827"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Buffer overflow",
    "sources": [
      {
        "db": "IVD",
        "id": "a52677d8-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201502-005"
      }
    ],
    "trust": 0.8
  }
}

var-201404-0081
Vulnerability from variot

Multiple stack-based buffer overflows in ModbusDrv.exe in Schneider Electric Modbus Serial Driver 1.10 through 3.2 allow remote attackers to execute arbitrary code via a large buffer-size value in a Modbus Application Header. Schneider Electric provides total solutions for the energy and infrastructure, industrial, data center and network, building and residential markets in more than 100 countries. The Modbus Serial driver used by many Schneider Electric products monitors the TCP 27700 port. Successful exploitation of vulnerabilities can execute arbitrary code in the context of an application. Multiple Schneider Electric Products are prone to a remote buffer-overflow vulnerability because it fails to properly validate user-supplied input. Failed exploit attempts will result in a denial-of-service condition. The following products are vulnerable: TwidoSuite 2.31.04 and prior PowerSuite 2.6 and prior SoMove 1.7 and prior SoMachine 2.0, 3.0, 3.1, and 3.0 XS Unity Pro 7.0 and prior UnityLoader 2.3 and prior Concept 2.6 SR7 and prior ModbusCommDTM sl 2.1.2 and prior PL7 4.5 SP5 and prior SFT2841 14, 13.1 and prior OPC Factory Server 3.50 and prior

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201404-0081",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "somachine",
        "scope": "eq",
        "trust": 2.8,
        "vendor": "schneider electric",
        "version": "3.0"
      },
      {
        "model": "modbuscommdtm sl",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "schneider electric",
        "version": "2.1.2"
      },
      {
        "model": "powersuite",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "schneider electric",
        "version": "2.6"
      },
      {
        "model": "somachine",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "schneider electric",
        "version": "2.0"
      },
      {
        "model": "somove",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "schneider electric",
        "version": "1.7"
      },
      {
        "model": "twidosuite",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "schneider electric",
        "version": "2.31.04"
      },
      {
        "model": "unity pro",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "schneider electric",
        "version": "7.0"
      },
      {
        "model": "sft2841",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "schneider electric",
        "version": "13.1"
      },
      {
        "model": "modbus serial driver",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "schneider electric",
        "version": "2.2"
      },
      {
        "model": "opc factory server",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "schneider electric",
        "version": "3.35"
      },
      {
        "model": "modbus serial driver",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "schneider electric",
        "version": "1.10"
      },
      {
        "model": "modbus serial driver",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "schneider electric",
        "version": "3.2"
      },
      {
        "model": "opc factory server",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "schneider electric",
        "version": "3.34"
      },
      {
        "model": "concept",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "schneider electric",
        "version": "2.6"
      },
      {
        "model": "somachine",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "schneider electric",
        "version": "3.1"
      },
      {
        "model": "opc factory server",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "schneider electric",
        "version": "3.5.0"
      },
      {
        "model": "sft2841",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "schneider electric",
        "version": "14.0"
      },
      {
        "model": "pl7",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "schneider electric",
        "version": "4.5"
      },
      {
        "model": "unityloader",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "schneider electric",
        "version": "2.3"
      },
      {
        "model": "unity pro",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "schneider electric",
        "version": "6.0"
      },
      {
        "model": "concept",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "schneider electric",
        "version": "2.6 sr7"
      },
      {
        "model": "modbus serial driver",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "schneider electric",
        "version": "1.10 to  3.2"
      },
      {
        "model": "opc factory server",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "schneider electric",
        "version": "3.40"
      },
      {
        "model": "pl7",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "schneider electric",
        "version": "4.5 sp5"
      },
      {
        "model": "sft2841",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "schneider electric",
        "version": "13.1"
      },
      {
        "model": "sft2841",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "schneider electric",
        "version": "14"
      },
      {
        "model": "somachine",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "schneider electric",
        "version": "3.0 xs"
      },
      {
        "model": "somachine",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "schneider electric",
        "version": "3.1"
      },
      {
        "model": "unity loader",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "schneider electric",
        "version": "2.3"
      },
      {
        "model": "electric opc factory server",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "schneider",
        "version": "3.5"
      },
      {
        "model": "electric tlxcdsuofs33",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "schneider",
        "version": "3.5"
      },
      {
        "model": "electric tlxcdstofs33",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "schneider",
        "version": "3.5"
      },
      {
        "model": "electric tlxcdluofs33",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "schneider",
        "version": "3.5"
      },
      {
        "model": "electric tlxcdlfofs33",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "schneider",
        "version": "3.5"
      },
      {
        "model": "opc factory server",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "schneider electric",
        "version": "3.5.0"
      },
      {
        "model": "modbuscommdtm sl",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "schneider electric",
        "version": "2.1.2"
      },
      {
        "model": "sft2841",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "schneider electric",
        "version": "14.0"
      },
      {
        "model": "pl7",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "schneider electric",
        "version": "4.5"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "somachine",
        "version": "3.0"
      },
      {
        "model": "electric unity pro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "schneider",
        "version": "6.0"
      },
      {
        "model": "electric unity pro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "schneider",
        "version": "6"
      },
      {
        "model": "electric opc factory server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "schneider",
        "version": "3.34"
      },
      {
        "model": "electric opc factory driver",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "schneider",
        "version": "3.34"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "concept",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "modbus serial driver",
        "version": "1.10"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "modbus serial driver",
        "version": "2.2"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "modbus serial driver",
        "version": "3.2"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "modbuscommdtm sl",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "opc factory server",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "opc factory server",
        "version": "3.34"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "opc factory server",
        "version": "3.35"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "pl7",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "powersuite",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "sft2841",
        "version": "13.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "sft2841",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "somachine",
        "version": "2.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "somachine",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "somove",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "twidosuite",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "unity pro",
        "version": "6.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "unity pro",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "unityloader",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "1cbd5cbc-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-02043"
      },
      {
        "db": "BID",
        "id": "66500"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-006276"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201404-005"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-0662"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:schneider_electric:concept",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:schneider_electric:modbus_serial_driver",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:schneider_electric:modbuscommdtm_sl",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:schneider_electric:opc_factory_server",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:schneider_electric:pl7",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:schneider_electric:powersuite",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:schneider_electric:sft2841",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:schneider_electric:somachine",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:schneider_electric:somove",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:schneider_electric:twidosuite",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:schneider_electric:unityloader",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:schneider_electric:unity_pro",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-006276"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "This issue is reported by vendor.",
    "sources": [
      {
        "db": "BID",
        "id": "66500"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2013-0662",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.3,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.6,
            "id": "CVE-2013-0662",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.3,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.6,
            "id": "CNVD-2014-02043",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.3,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.6,
            "id": "1cbd5cbc-2352-11e6-abef-000c29c66e3d",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.3,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.6,
            "id": "VHN-60664",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2013-0662",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2013-0662",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2014-02043",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201404-005",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "IVD",
            "id": "1cbd5cbc-2352-11e6-abef-000c29c66e3d",
            "trust": 0.2,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-60664",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "1cbd5cbc-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-02043"
      },
      {
        "db": "VULHUB",
        "id": "VHN-60664"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-006276"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201404-005"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-0662"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Multiple stack-based buffer overflows in ModbusDrv.exe in Schneider Electric Modbus Serial Driver 1.10 through 3.2 allow remote attackers to execute arbitrary code via a large buffer-size value in a Modbus Application Header. Schneider Electric provides total solutions for the energy and infrastructure, industrial, data center and network, building and residential markets in more than 100 countries. The Modbus Serial driver used by many Schneider Electric products monitors the TCP 27700 port. Successful exploitation of vulnerabilities can execute arbitrary code in the context of an application. Multiple Schneider Electric Products are prone to a remote buffer-overflow vulnerability because it fails to properly validate user-supplied input. Failed exploit attempts will result in a denial-of-service condition. \nThe following products are vulnerable:\nTwidoSuite  2.31.04 and prior\nPowerSuite 2.6 and prior\nSoMove 1.7 and prior\nSoMachine 2.0, 3.0, 3.1, and 3.0 XS\nUnity Pro 7.0 and prior\nUnityLoader 2.3 and prior\nConcept 2.6 SR7 and prior\nModbusCommDTM sl 2.1.2 and prior\nPL7 4.5 SP5 and prior\nSFT2841 14, 13.1 and prior\nOPC Factory Server 3.50 and prior",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2013-0662"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-006276"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-02043"
      },
      {
        "db": "BID",
        "id": "66500"
      },
      {
        "db": "IVD",
        "id": "1cbd5cbc-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "VULHUB",
        "id": "VHN-60664"
      }
    ],
    "trust": 2.7
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-60664",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-60664"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2013-0662",
        "trust": 3.6
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-14-086-01",
        "trust": 3.1
      },
      {
        "db": "BID",
        "id": "66500",
        "trust": 2.6
      },
      {
        "db": "EXPLOIT-DB",
        "id": "45219",
        "trust": 1.7
      },
      {
        "db": "EXPLOIT-DB",
        "id": "45220",
        "trust": 1.7
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201404-005",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-02043",
        "trust": 0.8
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-14-086-01A",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-006276",
        "trust": 0.8
      },
      {
        "db": "OSVDB",
        "id": "105035",
        "trust": 0.6
      },
      {
        "db": "IVD",
        "id": "1CBD5CBC-2352-11E6-ABEF-000C29C66E3D",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "149000",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "148995",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-60664",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "1cbd5cbc-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-02043"
      },
      {
        "db": "VULHUB",
        "id": "VHN-60664"
      },
      {
        "db": "BID",
        "id": "66500"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-006276"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201404-005"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-0662"
      }
    ]
  },
  "id": "VAR-201404-0081",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "1cbd5cbc-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-02043"
      },
      {
        "db": "VULHUB",
        "id": "VHN-60664"
      }
    ],
    "trust": 1.7371212090909092
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "1cbd5cbc-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-02043"
      }
    ]
  },
  "last_update_date": "2024-08-14T14:27:54.398000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "SEVD 2013-070-01",
        "trust": 0.8,
        "url": "http://download.schneider-electric.com/files?p_Doc_Ref=SEVD%202013-070-01"
      },
      {
        "title": "Patch for Schneider Electric heap buffer overflow vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/44568"
      },
      {
        "title": "Schneider Electric Modbus Serial Driver Repair measures for stack-based buffer error vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=160424"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-02043"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-006276"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201404-005"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-787",
        "trust": 1.0
      },
      {
        "problemtype": "CWE-119",
        "trust": 0.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-60664"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-006276"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-0662"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.1,
        "url": "http://ics-cert.us-cert.gov/advisories/icsa-14-086-01"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/66500"
      },
      {
        "trust": 1.7,
        "url": "http://download.schneider-electric.com/files?p_doc_ref=sevd%202013-070-01"
      },
      {
        "trust": 1.7,
        "url": "https://www.exploit-db.com/exploits/45219/"
      },
      {
        "trust": 1.7,
        "url": "https://www.exploit-db.com/exploits/45220/"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-0662"
      },
      {
        "trust": 0.8,
        "url": "http://ics-cert.us-cert.gov/advisories/icsa-14-086-01a"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-0662"
      },
      {
        "trust": 0.6,
        "url": "http://osvdb.com/show/osvdb/105035"
      },
      {
        "trust": 0.3,
        "url": "http://www.schneider-electric.com/site/home/index.cfm/ww/?selectcountry=true"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-02043"
      },
      {
        "db": "VULHUB",
        "id": "VHN-60664"
      },
      {
        "db": "BID",
        "id": "66500"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-006276"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201404-005"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-0662"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "1cbd5cbc-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-02043"
      },
      {
        "db": "VULHUB",
        "id": "VHN-60664"
      },
      {
        "db": "BID",
        "id": "66500"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-006276"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201404-005"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-0662"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-04-01T00:00:00",
        "db": "IVD",
        "id": "1cbd5cbc-2352-11e6-abef-000c29c66e3d"
      },
      {
        "date": "2014-04-01T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2014-02043"
      },
      {
        "date": "2014-04-01T00:00:00",
        "db": "VULHUB",
        "id": "VHN-60664"
      },
      {
        "date": "2014-03-27T00:00:00",
        "db": "BID",
        "id": "66500"
      },
      {
        "date": "2014-04-02T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-006276"
      },
      {
        "date": "2014-04-02T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201404-005"
      },
      {
        "date": "2014-04-01T06:17:08.240000",
        "db": "NVD",
        "id": "CVE-2013-0662"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-04-01T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2014-02043"
      },
      {
        "date": "2018-08-22T00:00:00",
        "db": "VULHUB",
        "id": "VHN-60664"
      },
      {
        "date": "2015-03-19T09:42:00",
        "db": "BID",
        "id": "66500"
      },
      {
        "date": "2014-04-02T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-006276"
      },
      {
        "date": "2022-02-07T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201404-005"
      },
      {
        "date": "2022-02-03T13:57:57.017000",
        "db": "NVD",
        "id": "CVE-2013-0662"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201404-005"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Schneider Electric Heap Buffer Overflow Vulnerability",
    "sources": [
      {
        "db": "IVD",
        "id": "1cbd5cbc-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-02043"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "buffer error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201404-005"
      }
    ],
    "trust": 0.6
  }
}

var-202012-1385
Vulnerability from variot

A CWE-123: Write-what-where Condition vulnerability exists in EcoStruxure™ Control Expert (all versions) and Unity Pro (former name of EcoStruxure™ Control Expert) (all versions), that could cause a crash of the software or unexpected code execution when opening a malicious file in EcoStruxure™ Control Expert software. Schneider Electric EcoStruxure Control Expert (formerly known as Unity Pro) is a set of programming software for Schneider Electric logic controller products from French Schneider Electric (Schneider Electric).

There is a security vulnerability in Schneider Electric EcoStruxure Control Expert. The vulnerability stems from the failure to perform security checks on open files

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202012-1385",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "unity pro",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "schneider electric",
        "version": "*"
      },
      {
        "model": "ecostruxure control expert",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "schneider electric",
        "version": "*"
      },
      {
        "model": "unity pro",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "schneider electric",
        "version": null
      },
      {
        "model": "ecostruxure control expert",
        "scope": null,
        "trust": 0.8,
        "vendor": "schneider electric",
        "version": null
      },
      {
        "model": "electric ecostruxure control expert",
        "scope": null,
        "trust": 0.6,
        "vendor": "schneider",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2021-31181"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-014323"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-7560"
      }
    ]
  },
  "cve": "CVE-2020-7560",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CVE-2020-7560",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CNVD-2021-31181",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "VHN-185685",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.8,
            "id": "CVE-2020-7560",
            "impactScore": 6.0,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "trust": 1.0,
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 8.6,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2020-7560",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Changed",
            "trust": 0.8,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2020-7560",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2020-7560",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2021-31181",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202012-859",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-185685",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2021-31181"
      },
      {
        "db": "VULHUB",
        "id": "VHN-185685"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-014323"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202012-859"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-7560"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "A CWE-123: Write-what-where Condition vulnerability exists in EcoStruxure\u2122 Control Expert (all versions) and Unity Pro (former name of EcoStruxure\u2122 Control Expert) (all versions), that could cause a crash of the software or unexpected code execution when opening a malicious file in EcoStruxure\u2122 Control Expert software. Schneider Electric EcoStruxure Control Expert (formerly known as Unity Pro) is a set of programming software for Schneider Electric logic controller products from French Schneider Electric (Schneider Electric). \n\r\n\r\nThere is a security vulnerability in Schneider Electric EcoStruxure Control Expert. The vulnerability stems from the failure to perform security checks on open files",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2020-7560"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-014323"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2021-31181"
      },
      {
        "db": "VULHUB",
        "id": "VHN-185685"
      }
    ],
    "trust": 2.25
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2020-7560",
        "trust": 3.1
      },
      {
        "db": "SCHNEIDER",
        "id": "SEVD-2020-343-01",
        "trust": 1.7
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-014323",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202012-859",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2021-31181",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-185685",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2021-31181"
      },
      {
        "db": "VULHUB",
        "id": "VHN-185685"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-014323"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202012-859"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-7560"
      }
    ]
  },
  "id": "VAR-202012-1385",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2021-31181"
      },
      {
        "db": "VULHUB",
        "id": "VHN-185685"
      }
    ],
    "trust": 1.3287037
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2021-31181"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:51:09.221000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "SEVD-2020-343-01",
        "trust": 0.8,
        "url": "https://www.se.com/ww/en/download/document/SEVD-2020-343-01/"
      },
      {
        "title": "Patch for Schneider Electric EcoStruxure Control Expert input validation error vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/261456"
      },
      {
        "title": "Schneider Electric EcoStruxure Control Expert Enter the fix for the verification error vulnerability",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=136948"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2021-31181"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-014323"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202012-859"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-123",
        "trust": 1.1
      },
      {
        "problemtype": "A state in which any value can be written to any location (CWE-123) [ Other ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-185685"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-014323"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-7560"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.0,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-7560"
      },
      {
        "trust": 1.7,
        "url": "https://www.se.com/ww/en/download/document/sevd-2020-343-01/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2021-31181"
      },
      {
        "db": "VULHUB",
        "id": "VHN-185685"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-014323"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202012-859"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-7560"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2021-31181"
      },
      {
        "db": "VULHUB",
        "id": "VHN-185685"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-014323"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202012-859"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-7560"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2021-04-26T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2021-31181"
      },
      {
        "date": "2020-12-11T00:00:00",
        "db": "VULHUB",
        "id": "VHN-185685"
      },
      {
        "date": "2021-08-13T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2020-014323"
      },
      {
        "date": "2020-12-10T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202012-859"
      },
      {
        "date": "2020-12-11T01:15:12.707000",
        "db": "NVD",
        "id": "CVE-2020-7560"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2021-04-26T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2021-31181"
      },
      {
        "date": "2022-01-31T00:00:00",
        "db": "VULHUB",
        "id": "VHN-185685"
      },
      {
        "date": "2021-08-13T08:50:00",
        "db": "JVNDB",
        "id": "JVNDB-2020-014323"
      },
      {
        "date": "2022-03-10T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202012-859"
      },
      {
        "date": "2024-11-21T05:37:22.767000",
        "db": "NVD",
        "id": "CVE-2020-7560"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202012-859"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Schneider Electric EcoStruxure Control Expert input validation error vulnerability",
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2021-31181"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202012-859"
      }
    ],
    "trust": 1.2
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "input validation error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202012-859"
      }
    ],
    "trust": 0.6
  }
}

var-202003-1441
Vulnerability from variot

A CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection'), reflective DLL, vulnerability exists in EcoStruxure Control Expert (all versions prior to 14.1 Hot Fix), Unity Pro (all versions), Modicon M340 (all versions prior to V3.20), Modicon M580 (all versions prior to V3.10), which, if exploited, could allow attackers to transfer malicious code to the controller. plural Schneider Electric The product contains an injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Schneider Electric Modicon M580, etc. are all products of Schneider Electric in France. Schneider Electric Modicon M580 is a programmable automation controller. Schneider Electric Modicon M340 is a mid-range PLC (programmable logic controller) for industrial processes and infrastructure. Schneider Electric EcoStruxure Control Expert (formerly known as Unity Pro) is a set of programming software for Schneider Electric logic controller products.

Many Schneider Electric products have injection vulnerabilities that attackers can use to send malicious code to the controller. The following products and versions are affected: EcoStruxure Control Expert 14.1 Hot Fix previous version; Unity Pro (full version); Modicon M340 V3.20 previous version; Modicon M580 V3.10 previous version

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202003-1441",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "unity pro",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "schneider electric",
        "version": "*"
      },
      {
        "model": "modicon m340",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "schneider electric",
        "version": "3.20"
      },
      {
        "model": "ecostruxure control expert",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "schneider electric",
        "version": "14.0"
      },
      {
        "model": "modicon m580",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "schneider electric",
        "version": "3.10"
      },
      {
        "model": "ecostruxure control expert",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "schneider electric",
        "version": "14.1 hot fix"
      },
      {
        "model": "modicon m340",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "schneider electric",
        "version": "3.20"
      },
      {
        "model": "modicon m580",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "schneider electric",
        "version": "3.10"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.6,
        "vendor": "ecostruxure control expert",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.6,
        "vendor": "unity pro",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.6,
        "vendor": "modicon m340",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.6,
        "vendor": "modicon m580",
        "version": "*"
      },
      {
        "model": "electric unity pro",
        "scope": null,
        "trust": 0.6,
        "vendor": "schneider",
        "version": null
      },
      {
        "model": "electric ecostruxure control expert hot fix",
        "scope": "lt",
        "trust": 0.6,
        "vendor": "schneider",
        "version": "14.1"
      },
      {
        "model": "electric modicon m340",
        "scope": "lt",
        "trust": 0.6,
        "vendor": "schneider",
        "version": "3.20"
      },
      {
        "model": "electric modicon m580",
        "scope": "lt",
        "trust": 0.6,
        "vendor": "schneider",
        "version": "3.10"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "35a9c5f0-4ff6-4832-9bff-dd010f8ff4a6"
      },
      {
        "db": "IVD",
        "id": "17a37300-5783-4a41-8124-fdbd46329f3c"
      },
      {
        "db": "IVD",
        "id": "c6a4a266-58fd-48ff-b1ed-97cd3f6f2b31"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-23198"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-003406"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-7475"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:schneider_electric:ecostruxure_control_expert",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:schneider_electric:modicon_m340_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:schneider_electric:modicon_m580_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-003406"
      }
    ]
  },
  "cve": "CVE-2020-7475",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2020-7475",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 1.0,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Partial",
            "baseScore": 7.5,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "JVNDB-2020-003406",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2020-23198",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "35a9c5f0-4ff6-4832-9bff-dd010f8ff4a6",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "17a37300-5783-4a41-8124-fdbd46329f3c",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "c6a4a266-58fd-48ff-b1ed-97cd3f6f2b31",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-185600",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "id": "CVE-2020-7475",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 9.8,
            "baseSeverity": "Critical",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "JVNDB-2020-003406",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2020-7475",
            "trust": 1.0,
            "value": "CRITICAL"
          },
          {
            "author": "NVD",
            "id": "JVNDB-2020-003406",
            "trust": 0.8,
            "value": "Critical"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2020-23198",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202003-1330",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "IVD",
            "id": "35a9c5f0-4ff6-4832-9bff-dd010f8ff4a6",
            "trust": 0.2,
            "value": "HIGH"
          },
          {
            "author": "IVD",
            "id": "17a37300-5783-4a41-8124-fdbd46329f3c",
            "trust": 0.2,
            "value": "HIGH"
          },
          {
            "author": "IVD",
            "id": "c6a4a266-58fd-48ff-b1ed-97cd3f6f2b31",
            "trust": 0.2,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-185600",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "35a9c5f0-4ff6-4832-9bff-dd010f8ff4a6"
      },
      {
        "db": "IVD",
        "id": "17a37300-5783-4a41-8124-fdbd46329f3c"
      },
      {
        "db": "IVD",
        "id": "c6a4a266-58fd-48ff-b1ed-97cd3f6f2b31"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-23198"
      },
      {
        "db": "VULHUB",
        "id": "VHN-185600"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-003406"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202003-1330"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-7475"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "A CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027), reflective DLL, vulnerability exists in EcoStruxure Control Expert (all versions prior to 14.1 Hot Fix), Unity Pro (all versions), Modicon M340 (all versions prior to V3.20), Modicon M580 (all versions prior to V3.10), which, if exploited, could allow attackers to transfer malicious code to the controller. plural Schneider Electric The product contains an injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Schneider Electric Modicon M580, etc. are all products of Schneider Electric in France. Schneider Electric Modicon M580 is a programmable automation controller. Schneider Electric Modicon M340 is a mid-range PLC (programmable logic controller) for industrial processes and infrastructure. Schneider Electric EcoStruxure Control Expert (formerly known as Unity Pro) is a set of programming software for Schneider Electric logic controller products. \n\r\n\r\nMany Schneider Electric products have injection vulnerabilities that attackers can use to send malicious code to the controller. The following products and versions are affected: EcoStruxure Control Expert 14.1 Hot Fix previous version; Unity Pro (full version); Modicon M340 V3.20 previous version; Modicon M580 V3.10 previous version",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2020-7475"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-003406"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-23198"
      },
      {
        "db": "IVD",
        "id": "35a9c5f0-4ff6-4832-9bff-dd010f8ff4a6"
      },
      {
        "db": "IVD",
        "id": "17a37300-5783-4a41-8124-fdbd46329f3c"
      },
      {
        "db": "IVD",
        "id": "c6a4a266-58fd-48ff-b1ed-97cd3f6f2b31"
      },
      {
        "db": "VULHUB",
        "id": "VHN-185600"
      }
    ],
    "trust": 2.79
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2020-7475",
        "trust": 3.7
      },
      {
        "db": "SCHNEIDER",
        "id": "SEVD-2020-080-01",
        "trust": 1.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-23198",
        "trust": 1.3
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202003-1330",
        "trust": 1.3
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-003406",
        "trust": 0.8
      },
      {
        "db": "NSFOCUS",
        "id": "46623",
        "trust": 0.6
      },
      {
        "db": "IVD",
        "id": "35A9C5F0-4FF6-4832-9BFF-DD010F8FF4A6",
        "trust": 0.2
      },
      {
        "db": "IVD",
        "id": "17A37300-5783-4A41-8124-FDBD46329F3C",
        "trust": 0.2
      },
      {
        "db": "IVD",
        "id": "C6A4A266-58FD-48FF-B1ED-97CD3F6F2B31",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-185600",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "35a9c5f0-4ff6-4832-9bff-dd010f8ff4a6"
      },
      {
        "db": "IVD",
        "id": "17a37300-5783-4a41-8124-fdbd46329f3c"
      },
      {
        "db": "IVD",
        "id": "c6a4a266-58fd-48ff-b1ed-97cd3f6f2b31"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-23198"
      },
      {
        "db": "VULHUB",
        "id": "VHN-185600"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-003406"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202003-1330"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-7475"
      }
    ]
  },
  "id": "VAR-202003-1441",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "35a9c5f0-4ff6-4832-9bff-dd010f8ff4a6"
      },
      {
        "db": "IVD",
        "id": "17a37300-5783-4a41-8124-fdbd46329f3c"
      },
      {
        "db": "IVD",
        "id": "c6a4a266-58fd-48ff-b1ed-97cd3f6f2b31"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-23198"
      },
      {
        "db": "VULHUB",
        "id": "VHN-185600"
      }
    ],
    "trust": 2.1185145
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.6
      },
      {
        "category": [
          "ICS",
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "35a9c5f0-4ff6-4832-9bff-dd010f8ff4a6"
      },
      {
        "db": "IVD",
        "id": "17a37300-5783-4a41-8124-fdbd46329f3c"
      },
      {
        "db": "IVD",
        "id": "c6a4a266-58fd-48ff-b1ed-97cd3f6f2b31"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-23198"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:48:03.107000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "SEVD-2020-080-01",
        "trust": 0.8,
        "url": "https://www.se.com/ww/en/download/document/SEVD-2020-080-01/"
      },
      {
        "title": "Patch for Multiple Schneider Electric product injection vulnerabilities",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/214305"
      },
      {
        "title": "Multiple Schneider Electric Fixing measures for product injection vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=112775"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-23198"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-003406"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202003-1330"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-74",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-185600"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-003406"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-7475"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.0,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-7475"
      },
      {
        "trust": 1.7,
        "url": "http://www.se.com/ww/en/download/document/sevd-2020-080-01"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-7475"
      },
      {
        "trust": 0.6,
        "url": "http://www.nsfocus.net/vulndb/46623"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-23198"
      },
      {
        "db": "VULHUB",
        "id": "VHN-185600"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-003406"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202003-1330"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-7475"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "35a9c5f0-4ff6-4832-9bff-dd010f8ff4a6"
      },
      {
        "db": "IVD",
        "id": "17a37300-5783-4a41-8124-fdbd46329f3c"
      },
      {
        "db": "IVD",
        "id": "c6a4a266-58fd-48ff-b1ed-97cd3f6f2b31"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-23198"
      },
      {
        "db": "VULHUB",
        "id": "VHN-185600"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-003406"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202003-1330"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-7475"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-03-23T00:00:00",
        "db": "IVD",
        "id": "35a9c5f0-4ff6-4832-9bff-dd010f8ff4a6"
      },
      {
        "date": "2020-03-23T00:00:00",
        "db": "IVD",
        "id": "17a37300-5783-4a41-8124-fdbd46329f3c"
      },
      {
        "date": "2020-03-23T00:00:00",
        "db": "IVD",
        "id": "c6a4a266-58fd-48ff-b1ed-97cd3f6f2b31"
      },
      {
        "date": "2020-04-17T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2020-23198"
      },
      {
        "date": "2020-03-23T00:00:00",
        "db": "VULHUB",
        "id": "VHN-185600"
      },
      {
        "date": "2020-04-15T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2020-003406"
      },
      {
        "date": "2020-03-23T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202003-1330"
      },
      {
        "date": "2020-03-23T19:15:12.413000",
        "db": "NVD",
        "id": "CVE-2020-7475"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-04-17T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2020-23198"
      },
      {
        "date": "2022-02-03T00:00:00",
        "db": "VULHUB",
        "id": "VHN-185600"
      },
      {
        "date": "2020-04-15T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2020-003406"
      },
      {
        "date": "2022-03-10T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202003-1330"
      },
      {
        "date": "2024-11-21T05:37:13.210000",
        "db": "NVD",
        "id": "CVE-2020-7475"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202003-1330"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  Schneider Electric Product injection vulnerabilities",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-003406"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "injection",
    "sources": [
      {
        "db": "IVD",
        "id": "35a9c5f0-4ff6-4832-9bff-dd010f8ff4a6"
      },
      {
        "db": "IVD",
        "id": "17a37300-5783-4a41-8124-fdbd46329f3c"
      },
      {
        "db": "IVD",
        "id": "c6a4a266-58fd-48ff-b1ed-97cd3f6f2b31"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202003-1330"
      }
    ],
    "trust": 1.2
  }
}

CVE-2014-9200 (GCVE-0-2014-9200)
Vulnerability from cvelistv5
Published
2015-02-01 15:00
Modified
2025-09-05 21:34
Severity ?
CWE
Summary
Stack-based buffer overflow in an unspecified DLL file in a DTM development kit in Schneider Electric Unity Pro, SoMachine, SoMove, SoMove Lite, Modbus Communication Library 2.2.6 and earlier, CANopen Communication Library 1.0.2 and earlier, EtherNet/IP Communication Library 1.0.0 and earlier, EM X80 Gateway DTM (MB TCP/SL), Advantys DTM for OTB, Advantys DTM for STB, KINOS DTM, SOLO DTM, and Xantrex DTMs allows remote attackers to execute arbitrary code via unspecified vectors.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T13:40:24.488Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2015-009-01"
          },
          {
            "name": "72335",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/72335"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-027-02"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Unity Pro",
          "vendor": "Schneider Electric",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "SoMachine",
          "vendor": "Schneider Electric",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "SoMove",
          "vendor": "Schneider Electric",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "SoMove Lite",
          "vendor": "Schneider Electric",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Modbus Communication Library",
          "vendor": "Schneider Electric",
          "versions": [
            {
              "lessThanOrEqual": "Version 2.2.6",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "CANopen Communication Library",
          "vendor": "Schneider Electric",
          "versions": [
            {
              "lessThanOrEqual": "Version 1.0.2",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "EtherNet/IP Communication Library",
          "vendor": "Schneider Electric",
          "versions": [
            {
              "lessThanOrEqual": "Version 1.0.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "EM X80 Gateway DTM (MB TCP/SL)",
          "vendor": "Schneider Electric",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Advantys DTMs (OTB, STB)",
          "vendor": "Schneider Electric",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "KINOS DTM",
          "vendor": "Schneider Electric",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "SOLO DTM",
          "vendor": "Schneider Electric",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Xantrex DTM",
          "vendor": "Schneider Electric",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Ariele Caltabiano (kimiya) with HP\u2019s Zero Day Initiative (ZDI)"
        }
      ],
      "datePublic": "2015-01-27T07:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eStack-based buffer overflow in an unspecified DLL file in a DTM development kit in Schneider Electric Unity Pro, SoMachine, SoMove, SoMove Lite, Modbus Communication Library 2.2.6 and earlier, CANopen Communication Library 1.0.2 and earlier, EtherNet/IP Communication Library 1.0.0 and earlier, EM X80 Gateway DTM (MB TCP/SL), Advantys DTM for OTB, Advantys DTM for STB, KINOS DTM, SOLO DTM, and Xantrex DTMs allows remote attackers to execute arbitrary code via unspecified vectors.\u003c/p\u003e"
            }
          ],
          "value": "Stack-based buffer overflow in an unspecified DLL file in a DTM development kit in Schneider Electric Unity Pro, SoMachine, SoMove, SoMove Lite, Modbus Communication Library 2.2.6 and earlier, CANopen Communication Library 1.0.2 and earlier, EtherNet/IP Communication Library 1.0.0 and earlier, EM X80 Gateway DTM (MB TCP/SL), Advantys DTM for OTB, Advantys DTM for STB, KINOS DTM, SOLO DTM, and Xantrex DTMs allows remote attackers to execute arbitrary code via unspecified vectors."
        }
      ],
      "metrics": [
        {
          "cvssV2_0": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-121",
              "description": "CWE-121",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-09-05T21:34:15.852Z",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2015-009-01"
        },
        {
          "name": "72335",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/72335"
        },
        {
          "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-15-027-02"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eSchneider Electric has released a patch that resolves the \nvulnerability by removing the vulnerable DLL. Schneider Electric\u2019s patch\n is available at the follow location:\u003c/p\u003e\n\u003cp\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"http://download.schneider-electric.com/files?p_Doc_Ref=FDT1\"\u003ehttp://download.schneider-electric.com/files?p_Doc_Ref=FDT1\u003c/a\u003e DLL Removal Kit.\u003c/p\u003e\n\u003cp\u003eSchneider Electric\u2019s security notice SEVD-2015-009-01 is available at the following location:\u003c/p\u003e\n\u003cp\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2015-009-01\"\u003ehttp://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2015-009-01\u003c/a\u003e\u003c/p\u003e.\n\n\u003cbr\u003e"
            }
          ],
          "value": "Schneider Electric has released a patch that resolves the \nvulnerability by removing the vulnerable DLL. Schneider Electric\u2019s patch\n is available at the follow location:\n\n\n http://download.schneider-electric.com/files?p_Doc_Ref=FDT1  DLL Removal Kit.\n\n\nSchneider Electric\u2019s security notice SEVD-2015-009-01 is available at the following location:\n\n\n http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2015-009-01 \n\n."
        }
      ],
      "source": {
        "advisory": "ICSA-15-027-02",
        "discovery": "UNKNOWN"
      },
      "title": "Schneider Electric Device Type Managers (DTMs) Stack-based Buffer Overflow",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "ics-cert@hq.dhs.gov",
          "ID": "CVE-2014-9200",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack-based buffer overflow in an unspecified DLL file in a DTM development kit in Schneider Electric Unity Pro, SoMachine, SoMove, SoMove Lite, Modbus Communication Library 2.2.6 and earlier, CANopen Communication Library 1.0.2 and earlier, EtherNet/IP Communication Library 1.0.0 and earlier, EM X80 Gateway DTM (MB TCP/SL), Advantys DTM for OTB, Advantys DTM for STB, KINOS DTM, SOLO DTM, and Xantrex DTMs allows remote attackers to execute arbitrary code via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2015-009-01",
              "refsource": "CONFIRM",
              "url": "http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2015-009-01"
            },
            {
              "name": "72335",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/72335"
            },
            {
              "name": "https://ics-cert.us-cert.gov/advisories/ICSA-15-027-02",
              "refsource": "MISC",
              "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-027-02"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2014-9200",
    "datePublished": "2015-02-01T15:00:00",
    "dateReserved": "2014-12-02T00:00:00",
    "dateUpdated": "2025-09-05T21:34:15.852Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}