Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2019-6825 (GCVE-0-2019-6825)
Vulnerability from cvelistv5
- CWE-427 - Uncontrolled Search Path Element
Vendor | Product | Version | ||
---|---|---|---|---|
ProClima | ProClima all versions prior to version 8.0.0 |
Version: ProClima all versions prior to version 8.0.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:31:04.398Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-162-01/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ProClima all versions prior to version 8.0.0", "vendor": "ProClima", "versions": [ { "status": "affected", "version": "ProClima all versions prior to version 8.0.0" } ] } ], "datePublic": "2019-06-11T00:00:00", "descriptions": [ { "lang": "en", "value": "A CWE-427: Uncontrolled Search Path Element vulnerability exists in ProClima (all versions prior to version 8.0.0) which could allow a malicious DLL file, with the same name of any resident DLLs inside the software installation, to execute arbitrary code in all versions of ProClima prior to version 8.0.0." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-427", "description": "CWE-427: Uncontrolled Search Path Element", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-07-15T20:45:14", "orgId": "076d1eb6-cfab-4401-b34d-6dfc2a413bdb", "shortName": "schneider" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-162-01/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cybersecurity@schneider-electric.com", "ID": "CVE-2019-6825", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ProClima all versions prior to version 8.0.0", "version": { "version_data": [ { "version_value": "ProClima all versions prior to version 8.0.0" } ] } } ] }, "vendor_name": "ProClima" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A CWE-427: Uncontrolled Search Path Element vulnerability exists in ProClima (all versions prior to version 8.0.0) which could allow a malicious DLL file, with the same name of any resident DLLs inside the software installation, to execute arbitrary code in all versions of ProClima prior to version 8.0.0." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-427: Uncontrolled Search Path Element" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.schneider-electric.com/en/download/document/SEVD-2019-162-01/", "refsource": "MISC", "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-162-01/" } ] } } } }, "cveMetadata": { "assignerOrgId": "076d1eb6-cfab-4401-b34d-6dfc2a413bdb", "assignerShortName": "schneider", "cveId": "CVE-2019-6825", "datePublished": "2019-07-15T20:45:14", "dateReserved": "2019-01-25T00:00:00", "dateUpdated": "2024-08-04T20:31:04.398Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2019-6825\",\"sourceIdentifier\":\"cybersecurity@se.com\",\"published\":\"2019-07-15T21:15:10.790\",\"lastModified\":\"2024-11-21T04:47:13.673\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A CWE-427: Uncontrolled Search Path Element vulnerability exists in ProClima (all versions prior to version 8.0.0) which could allow a malicious DLL file, with the same name of any resident DLLs inside the software installation, to execute arbitrary code in all versions of ProClima prior to version 8.0.0.\"},{\"lang\":\"es\",\"value\":\"Una CWE-427: Existe una vulnerabilidad de Elemento de Ruta (Path) de B\u00fasqueda No Controlada en ProClima (todas las versiones anteriores a la versi\u00f3n 8.0.0), que podr\u00eda permitir un archivo DLL malicioso, con el mismo nombre de cualquier DLL residente dentro de la instalaci\u00f3n del software, para ejecutar c\u00f3digo arbitrario en todas las versiones de ProClima anteriores a la versi\u00f3n 8.0.0.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"cybersecurity@se.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-427\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-427\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:schneider-electric:proclima:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.0.0\",\"matchCriteriaId\":\"1C7BB1CA-CCED-4EC9-81F4-16633561E4CF\"}]}]}],\"references\":[{\"url\":\"https://www.schneider-electric.com/en/download/document/SEVD-2019-162-01/\",\"source\":\"cybersecurity@se.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.schneider-electric.com/en/download/document/SEVD-2019-162-01/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
ICSA-19-295-01
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "names": [ "Haojun Hou" ], "summary": "reporting a vulnerability to CISA" }, { "names": [ "Kushal Arvind Shah" ], "organization": "Fortinet", "summary": "reporting vulnerabilities to Schneider Electric" }, { "names": [ "Yongjun Liu" ], "organization": "NSFOCUS security team", "summary": "reporting vulnerabilities to Schneider Electric" }, { "organization": "Telus", "summary": "reporting vulnerabilities to Schneider Electric" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "summary", "text": "Haojun Hou reported a vulnerability to CISA. Kushal Arvind Shah of Fortinet,Yongjun Liu of NSFOCUS security team, and Telus reported vulnerabilities to Schneider Electric.", "title": "Summary" }, { "category": "other", "text": "No known public exploits specifically target these vulnerabilities.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "CISAservicedesk@cisa.dhs.gov", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-19-295-01 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2019/icsa-19-295-01.json" }, { "category": "self", "summary": "ICS Advisory ICSA-19-295-01 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-19-295-01" } ], "title": "ICSA-19-295-01_Schneider Electric ProClima", "tracking": { "current_release_date": "2019-10-22T00:00:00.000000Z", "generator": { "engine": { "name": "CISA USCert CSAF Generator", "version": "1" } }, "id": "ICSA-19-295-01", "initial_release_date": "2019-10-22T00:00:00.000000Z", "revision_history": [ { "date": "2019-10-22T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-19-295-01 Schneider Electric ProClima" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c 8.0.0", "product": { "name": "ProClima: all versions prior to 8.0.0", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "ProClima" } ], "category": "vendor", "name": "Schneider Electric Software, LLC" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-6823", "cwe": { "id": "CWE-427", "name": "Uncontrolled Search Path Element" }, "notes": [ { "category": "summary", "text": "A code injection vulnerability could allow an unauthenticated, remote attacker to execute arbitrary code on the targeted system.CVE-2019-6823 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Schneider Electric has released Version 8.0.0 of ProClima and recommends users upgrade to this version or newer. ", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.schneider-electric.com/en/product-range-download/2560-proclima/#tabs-top" }, { "category": "mitigation", "details": "For more information on these vulnerabilities and the associated upgrade, please see Schneider Electric\u0027s SEVD-2019-162-01", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-162-01/" }, { "category": "mitigation", "details": "Locate control and safety system networks and remote devices behind firewalls and isolate them from the business network.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Physical controls should be in place so no unauthorized person has access to the ICS and safety controllers, peripheral equipment, or the ICS and safety networks.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "All controllers should reside in locked cabinets and never be left in \u201cProgram\u201d mode.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "All programming software should be kept in locked cabinets and should never be connected to any network other than the network for devices intended.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "All methods of mobile data exchange with the isolated network, such as CDs, USB drives, etc., should be scanned before use in the terminals or any node connected to these networks.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Laptops that have connected to any other network besides the intended network should never be allowed to connect to the safety or control networks without proper sanitation.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Minimize network exposure for all control system devices and/or systems and ensure they are not accessible from the Internet.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "When remote access is required, use secure methods, such as virtual private networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize that VPN is only as secure as the connected devices.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "For further information related to cybersecurity in Schneider Electric\u0027s products, please visit the company\u0027s cybersecurity webpage", "product_ids": [ "CSAFPID-0001" ], "url": "http://www2.schneider-electric.com/sites/corporate/en/support/cybersecurity/cybersecurity.page" }, { "category": "mitigation", "details": "If you require additional support, Schneider Electric Industrial Cybersecurity Services team is available to help. Please visit", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.schneider-electric.com/en/work/services/field-services/industrial-automation/industrial-cybersecurity/industrial-cybersecurity.jsp" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-6823" }, { "cve": "CVE-2019-6824", "cwe": { "id": "CWE-427", "name": "Uncontrolled Search Path Element" }, "notes": [ { "category": "summary", "text": "A buffer error vulnerability could allow an unauthenticated, remote attacker to execute arbitrary code on the targeted system.CVE-2019-6824 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Schneider Electric has released Version 8.0.0 of ProClima and recommends users upgrade to this version or newer. ", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.schneider-electric.com/en/product-range-download/2560-proclima/#tabs-top" }, { "category": "mitigation", "details": "For more information on these vulnerabilities and the associated upgrade, please see Schneider Electric\u0027s SEVD-2019-162-01", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-162-01/" }, { "category": "mitigation", "details": "Locate control and safety system networks and remote devices behind firewalls and isolate them from the business network.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Physical controls should be in place so no unauthorized person has access to the ICS and safety controllers, peripheral equipment, or the ICS and safety networks.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "All controllers should reside in locked cabinets and never be left in \u201cProgram\u201d mode.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "All programming software should be kept in locked cabinets and should never be connected to any network other than the network for devices intended.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "All methods of mobile data exchange with the isolated network, such as CDs, USB drives, etc., should be scanned before use in the terminals or any node connected to these networks.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Laptops that have connected to any other network besides the intended network should never be allowed to connect to the safety or control networks without proper sanitation.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Minimize network exposure for all control system devices and/or systems and ensure they are not accessible from the Internet.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "When remote access is required, use secure methods, such as virtual private networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize that VPN is only as secure as the connected devices.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "For further information related to cybersecurity in Schneider Electric\u0027s products, please visit the company\u0027s cybersecurity webpage", "product_ids": [ "CSAFPID-0001" ], "url": "http://www2.schneider-electric.com/sites/corporate/en/support/cybersecurity/cybersecurity.page" }, { "category": "mitigation", "details": "If you require additional support, Schneider Electric Industrial Cybersecurity Services team is available to help. Please visit", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.schneider-electric.com/en/work/services/field-services/industrial-automation/industrial-cybersecurity/industrial-cybersecurity.jsp" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-6824" }, { "cve": "CVE-2019-6825", "cwe": { "id": "CWE-427", "name": "Uncontrolled Search Path Element" }, "notes": [ { "category": "summary", "text": "An uncontrolled search path element vulnerability could allow a malicious DLL file with the same name of any resident DLLs inside the software installation to execute arbitrary code.CVE-2019-6825 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Schneider Electric has released Version 8.0.0 of ProClima and recommends users upgrade to this version or newer. ", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.schneider-electric.com/en/product-range-download/2560-proclima/#tabs-top" }, { "category": "mitigation", "details": "For more information on these vulnerabilities and the associated upgrade, please see Schneider Electric\u0027s SEVD-2019-162-01", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-162-01/" }, { "category": "mitigation", "details": "Locate control and safety system networks and remote devices behind firewalls and isolate them from the business network.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Physical controls should be in place so no unauthorized person has access to the ICS and safety controllers, peripheral equipment, or the ICS and safety networks.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "All controllers should reside in locked cabinets and never be left in \u201cProgram\u201d mode.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "All programming software should be kept in locked cabinets and should never be connected to any network other than the network for devices intended.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "All methods of mobile data exchange with the isolated network, such as CDs, USB drives, etc., should be scanned before use in the terminals or any node connected to these networks.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Laptops that have connected to any other network besides the intended network should never be allowed to connect to the safety or control networks without proper sanitation.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Minimize network exposure for all control system devices and/or systems and ensure they are not accessible from the Internet.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "When remote access is required, use secure methods, such as virtual private networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize that VPN is only as secure as the connected devices.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "For further information related to cybersecurity in Schneider Electric\u0027s products, please visit the company\u0027s cybersecurity webpage", "product_ids": [ "CSAFPID-0001" ], "url": "http://www2.schneider-electric.com/sites/corporate/en/support/cybersecurity/cybersecurity.page" }, { "category": "mitigation", "details": "If you require additional support, Schneider Electric Industrial Cybersecurity Services team is available to help. Please visit", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.schneider-electric.com/en/work/services/field-services/industrial-automation/industrial-cybersecurity/industrial-cybersecurity.jsp" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-6825" } ] }
icsa-19-295-01
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "names": [ "Haojun Hou" ], "summary": "reporting a vulnerability to CISA" }, { "names": [ "Kushal Arvind Shah" ], "organization": "Fortinet", "summary": "reporting vulnerabilities to Schneider Electric" }, { "names": [ "Yongjun Liu" ], "organization": "NSFOCUS security team", "summary": "reporting vulnerabilities to Schneider Electric" }, { "organization": "Telus", "summary": "reporting vulnerabilities to Schneider Electric" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "summary", "text": "Haojun Hou reported a vulnerability to CISA. Kushal Arvind Shah of Fortinet,Yongjun Liu of NSFOCUS security team, and Telus reported vulnerabilities to Schneider Electric.", "title": "Summary" }, { "category": "other", "text": "No known public exploits specifically target these vulnerabilities.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "CISAservicedesk@cisa.dhs.gov", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-19-295-01 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2019/icsa-19-295-01.json" }, { "category": "self", "summary": "ICS Advisory ICSA-19-295-01 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-19-295-01" } ], "title": "ICSA-19-295-01_Schneider Electric ProClima", "tracking": { "current_release_date": "2019-10-22T00:00:00.000000Z", "generator": { "engine": { "name": "CISA USCert CSAF Generator", "version": "1" } }, "id": "ICSA-19-295-01", "initial_release_date": "2019-10-22T00:00:00.000000Z", "revision_history": [ { "date": "2019-10-22T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-19-295-01 Schneider Electric ProClima" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c 8.0.0", "product": { "name": "ProClima: all versions prior to 8.0.0", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "ProClima" } ], "category": "vendor", "name": "Schneider Electric Software, LLC" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-6823", "cwe": { "id": "CWE-427", "name": "Uncontrolled Search Path Element" }, "notes": [ { "category": "summary", "text": "A code injection vulnerability could allow an unauthenticated, remote attacker to execute arbitrary code on the targeted system.CVE-2019-6823 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Schneider Electric has released Version 8.0.0 of ProClima and recommends users upgrade to this version or newer. ", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.schneider-electric.com/en/product-range-download/2560-proclima/#tabs-top" }, { "category": "mitigation", "details": "For more information on these vulnerabilities and the associated upgrade, please see Schneider Electric\u0027s SEVD-2019-162-01", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-162-01/" }, { "category": "mitigation", "details": "Locate control and safety system networks and remote devices behind firewalls and isolate them from the business network.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Physical controls should be in place so no unauthorized person has access to the ICS and safety controllers, peripheral equipment, or the ICS and safety networks.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "All controllers should reside in locked cabinets and never be left in \u201cProgram\u201d mode.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "All programming software should be kept in locked cabinets and should never be connected to any network other than the network for devices intended.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "All methods of mobile data exchange with the isolated network, such as CDs, USB drives, etc., should be scanned before use in the terminals or any node connected to these networks.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Laptops that have connected to any other network besides the intended network should never be allowed to connect to the safety or control networks without proper sanitation.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Minimize network exposure for all control system devices and/or systems and ensure they are not accessible from the Internet.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "When remote access is required, use secure methods, such as virtual private networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize that VPN is only as secure as the connected devices.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "For further information related to cybersecurity in Schneider Electric\u0027s products, please visit the company\u0027s cybersecurity webpage", "product_ids": [ "CSAFPID-0001" ], "url": "http://www2.schneider-electric.com/sites/corporate/en/support/cybersecurity/cybersecurity.page" }, { "category": "mitigation", "details": "If you require additional support, Schneider Electric Industrial Cybersecurity Services team is available to help. Please visit", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.schneider-electric.com/en/work/services/field-services/industrial-automation/industrial-cybersecurity/industrial-cybersecurity.jsp" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-6823" }, { "cve": "CVE-2019-6824", "cwe": { "id": "CWE-427", "name": "Uncontrolled Search Path Element" }, "notes": [ { "category": "summary", "text": "A buffer error vulnerability could allow an unauthenticated, remote attacker to execute arbitrary code on the targeted system.CVE-2019-6824 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Schneider Electric has released Version 8.0.0 of ProClima and recommends users upgrade to this version or newer. ", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.schneider-electric.com/en/product-range-download/2560-proclima/#tabs-top" }, { "category": "mitigation", "details": "For more information on these vulnerabilities and the associated upgrade, please see Schneider Electric\u0027s SEVD-2019-162-01", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-162-01/" }, { "category": "mitigation", "details": "Locate control and safety system networks and remote devices behind firewalls and isolate them from the business network.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Physical controls should be in place so no unauthorized person has access to the ICS and safety controllers, peripheral equipment, or the ICS and safety networks.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "All controllers should reside in locked cabinets and never be left in \u201cProgram\u201d mode.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "All programming software should be kept in locked cabinets and should never be connected to any network other than the network for devices intended.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "All methods of mobile data exchange with the isolated network, such as CDs, USB drives, etc., should be scanned before use in the terminals or any node connected to these networks.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Laptops that have connected to any other network besides the intended network should never be allowed to connect to the safety or control networks without proper sanitation.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Minimize network exposure for all control system devices and/or systems and ensure they are not accessible from the Internet.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "When remote access is required, use secure methods, such as virtual private networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize that VPN is only as secure as the connected devices.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "For further information related to cybersecurity in Schneider Electric\u0027s products, please visit the company\u0027s cybersecurity webpage", "product_ids": [ "CSAFPID-0001" ], "url": "http://www2.schneider-electric.com/sites/corporate/en/support/cybersecurity/cybersecurity.page" }, { "category": "mitigation", "details": "If you require additional support, Schneider Electric Industrial Cybersecurity Services team is available to help. Please visit", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.schneider-electric.com/en/work/services/field-services/industrial-automation/industrial-cybersecurity/industrial-cybersecurity.jsp" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-6824" }, { "cve": "CVE-2019-6825", "cwe": { "id": "CWE-427", "name": "Uncontrolled Search Path Element" }, "notes": [ { "category": "summary", "text": "An uncontrolled search path element vulnerability could allow a malicious DLL file with the same name of any resident DLLs inside the software installation to execute arbitrary code.CVE-2019-6825 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Schneider Electric has released Version 8.0.0 of ProClima and recommends users upgrade to this version or newer. ", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.schneider-electric.com/en/product-range-download/2560-proclima/#tabs-top" }, { "category": "mitigation", "details": "For more information on these vulnerabilities and the associated upgrade, please see Schneider Electric\u0027s SEVD-2019-162-01", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-162-01/" }, { "category": "mitigation", "details": "Locate control and safety system networks and remote devices behind firewalls and isolate them from the business network.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Physical controls should be in place so no unauthorized person has access to the ICS and safety controllers, peripheral equipment, or the ICS and safety networks.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "All controllers should reside in locked cabinets and never be left in \u201cProgram\u201d mode.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "All programming software should be kept in locked cabinets and should never be connected to any network other than the network for devices intended.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "All methods of mobile data exchange with the isolated network, such as CDs, USB drives, etc., should be scanned before use in the terminals or any node connected to these networks.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Laptops that have connected to any other network besides the intended network should never be allowed to connect to the safety or control networks without proper sanitation.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Minimize network exposure for all control system devices and/or systems and ensure they are not accessible from the Internet.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "When remote access is required, use secure methods, such as virtual private networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize that VPN is only as secure as the connected devices.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "For further information related to cybersecurity in Schneider Electric\u0027s products, please visit the company\u0027s cybersecurity webpage", "product_ids": [ "CSAFPID-0001" ], "url": "http://www2.schneider-electric.com/sites/corporate/en/support/cybersecurity/cybersecurity.page" }, { "category": "mitigation", "details": "If you require additional support, Schneider Electric Industrial Cybersecurity Services team is available to help. Please visit", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.schneider-electric.com/en/work/services/field-services/industrial-automation/industrial-cybersecurity/industrial-cybersecurity.jsp" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-6825" } ] }
cnvd-2021-102432
Vulnerability from cnvd
Title: ProClima不受控搜索路径元素漏洞
Description:
ProClima是Schneider Electric推出的一款热计算软件,可用于确定控制面板的最佳散热解决方案。
ProClima 8.0.0之前版本存在不受控搜索路径元素漏洞。攻击者可通过与软件中任何常驻DLL名称相同的恶意DLL文件利用该漏洞执行任意代码。
Severity: 中
Patch Name: ProClima不受控搜索路径元素漏洞的补丁
Patch Description:
ProClima是Schneider Electric推出的一款热计算软件,可用于确定控制面板的最佳散热解决方案。
ProClima 8.0.0之前版本存在不受控搜索路径元素漏洞。攻击者可通过与软件中任何常驻DLL名称相同的恶意DLL文件利用该漏洞执行任意代码。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
厂商已发布了漏洞修复程序,请及时关注更新: https://www.schneider-electric.com/en/product-range-download/2560-proclima/#tabs-top
Reference: https://nvd.nist.gov/vuln/detail/CVE-2019-6825
Name | Schneider Electric ProClima <8.0.0 |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2019-6825", "cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2019-6825" } }, "description": "ProClima\u662fSchneider Electric\u63a8\u51fa\u7684\u4e00\u6b3e\u70ed\u8ba1\u7b97\u8f6f\u4ef6\uff0c\u53ef\u7528\u4e8e\u786e\u5b9a\u63a7\u5236\u9762\u677f\u7684\u6700\u4f73\u6563\u70ed\u89e3\u51b3\u65b9\u6848\u3002\n\nProClima 8.0.0\u4e4b\u524d\u7248\u672c\u5b58\u5728\u4e0d\u53d7\u63a7\u641c\u7d22\u8def\u5f84\u5143\u7d20\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u4e0e\u8f6f\u4ef6\u4e2d\u4efb\u4f55\u5e38\u9a7bDLL\u540d\u79f0\u76f8\u540c\u7684\u6076\u610fDLL\u6587\u4ef6\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002", "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://www.schneider-electric.com/en/product-range-download/2560-proclima/#tabs-top", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2021-102432", "openTime": "2021-12-22", "patchDescription": "ProClima\u662fSchneider Electric\u63a8\u51fa\u7684\u4e00\u6b3e\u70ed\u8ba1\u7b97\u8f6f\u4ef6\uff0c\u53ef\u7528\u4e8e\u786e\u5b9a\u63a7\u5236\u9762\u677f\u7684\u6700\u4f73\u6563\u70ed\u89e3\u51b3\u65b9\u6848\u3002\r\n\r\nProClima 8.0.0\u4e4b\u524d\u7248\u672c\u5b58\u5728\u4e0d\u53d7\u63a7\u641c\u7d22\u8def\u5f84\u5143\u7d20\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u4e0e\u8f6f\u4ef6\u4e2d\u4efb\u4f55\u5e38\u9a7bDLL\u540d\u79f0\u76f8\u540c\u7684\u6076\u610fDLL\u6587\u4ef6\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "ProClima\u4e0d\u53d7\u63a7\u641c\u7d22\u8def\u5f84\u5143\u7d20\u6f0f\u6d1e\u7684\u8865\u4e01", "products": { "product": "Schneider Electric ProClima \u003c8.0.0" }, "referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2019-6825", "serverity": "\u4e2d", "submitTime": "2019-07-16", "title": "ProClima\u4e0d\u53d7\u63a7\u641c\u7d22\u8def\u5f84\u5143\u7d20\u6f0f\u6d1e" }
gsd-2019-6825
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2019-6825", "description": "A CWE-427: Uncontrolled Search Path Element vulnerability exists in ProClima (all versions prior to version 8.0.0) which could allow a malicious DLL file, with the same name of any resident DLLs inside the software installation, to execute arbitrary code in all versions of ProClima prior to version 8.0.0.", "id": "GSD-2019-6825" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2019-6825" ], "details": "A CWE-427: Uncontrolled Search Path Element vulnerability exists in ProClima (all versions prior to version 8.0.0) which could allow a malicious DLL file, with the same name of any resident DLLs inside the software installation, to execute arbitrary code in all versions of ProClima prior to version 8.0.0.", "id": "GSD-2019-6825", "modified": "2023-12-13T01:23:49.898628Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cybersecurity@schneider-electric.com", "ID": "CVE-2019-6825", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ProClima all versions prior to version 8.0.0", "version": { "version_data": [ { "version_value": "ProClima all versions prior to version 8.0.0" } ] } } ] }, "vendor_name": "ProClima" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A CWE-427: Uncontrolled Search Path Element vulnerability exists in ProClima (all versions prior to version 8.0.0) which could allow a malicious DLL file, with the same name of any resident DLLs inside the software installation, to execute arbitrary code in all versions of ProClima prior to version 8.0.0." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-427: Uncontrolled Search Path Element" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.schneider-electric.com/en/download/document/SEVD-2019-162-01/", "refsource": "MISC", "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-162-01/" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:schneider-electric:proclima:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "8.0.0", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cybersecurity@schneider-electric.com", "ID": "CVE-2019-6825" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "A CWE-427: Uncontrolled Search Path Element vulnerability exists in ProClima (all versions prior to version 8.0.0) which could allow a malicious DLL file, with the same name of any resident DLLs inside the software installation, to execute arbitrary code in all versions of ProClima prior to version 8.0.0." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-427" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.schneider-electric.com/en/download/document/SEVD-2019-162-01/", "refsource": "MISC", "tags": [ "Vendor Advisory" ], "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-162-01/" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": true }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9 } }, "lastModifiedDate": "2022-09-03T03:45Z", "publishedDate": "2019-07-15T21:15Z" } } }
var-201907-0070
Vulnerability from variot
A CWE-427: Uncontrolled Search Path Element vulnerability exists in ProClima (all versions prior to version 8.0.0) which could allow a malicious DLL file, with the same name of any resident DLLs inside the software installation, to execute arbitrary code in all versions of ProClima prior to version 8.0.0. ProClima Contains a vulnerability related to uncontrolled search path elements.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Schneider Electric ProClima is a set of heat calculation software from Schneider Electric, France. This software provides thermal management functions for the environment and electrical/electronic equipment installed in the control panel by analyzing specified thermal data. A code issue vulnerability exists in Schneider Electric ProClima versions prior to 8.0.0. This vulnerability stems from improper design or implementation problems in the code development process of network systems or products
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201907-0070", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "proclima", "scope": "lt", "trust": 1.8, "vendor": "schneider electric", "version": "8.0.0" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-006577" }, { "db": "NVD", "id": "CVE-2019-6825" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:schneider_electric:proclima", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-006577" } ] }, "cve": "CVE-2019-6825", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2019-6825", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-158260", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2019-6825", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-6825", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-6825", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2019-6825", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201907-782", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-158260", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2019-6825", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-158260" }, { "db": "VULMON", "id": "CVE-2019-6825" }, { "db": "JVNDB", "id": "JVNDB-2019-006577" }, { "db": "CNNVD", "id": "CNNVD-201907-782" }, { "db": "NVD", "id": "CVE-2019-6825" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A CWE-427: Uncontrolled Search Path Element vulnerability exists in ProClima (all versions prior to version 8.0.0) which could allow a malicious DLL file, with the same name of any resident DLLs inside the software installation, to execute arbitrary code in all versions of ProClima prior to version 8.0.0. ProClima Contains a vulnerability related to uncontrolled search path elements.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Schneider Electric ProClima is a set of heat calculation software from Schneider Electric, France. This software provides thermal management functions for the environment and electrical/electronic equipment installed in the control panel by analyzing specified thermal data. A code issue vulnerability exists in Schneider Electric ProClima versions prior to 8.0.0. This vulnerability stems from improper design or implementation problems in the code development process of network systems or products", "sources": [ { "db": "NVD", "id": "CVE-2019-6825" }, { "db": "JVNDB", "id": "JVNDB-2019-006577" }, { "db": "VULHUB", "id": "VHN-158260" }, { "db": "VULMON", "id": "CVE-2019-6825" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-6825", "trust": 2.6 }, { "db": "SCHNEIDER", "id": "SEVD-2019-162-01", "trust": 1.8 }, { "db": "ICS CERT", "id": "ICSA-19-295-01", "trust": 1.4 }, { "db": "JVNDB", "id": "JVNDB-2019-006577", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201907-782", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2021-102432", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-158260", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2019-6825", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-158260" }, { "db": "VULMON", "id": "CVE-2019-6825" }, { "db": "JVNDB", "id": "JVNDB-2019-006577" }, { "db": "CNNVD", "id": "CNNVD-201907-782" }, { "db": "NVD", "id": "CVE-2019-6825" } ] }, "id": "VAR-201907-0070", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-158260" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T22:06:09.263000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SEVD-2019-162-01", "trust": 0.8, "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-162-01/" }, { "title": "Schneider Electric ProClima Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=95258" }, { "title": "", "trust": 0.1, "url": "https://github.com/Live-Hack-CVE/CVE-2019-6825 " } ], "sources": [ { "db": "VULMON", "id": "CVE-2019-6825" }, { "db": "JVNDB", "id": "JVNDB-2019-006577" }, { "db": "CNNVD", "id": "CNNVD-201907-782" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-427", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-158260" }, { "db": "JVNDB", "id": "JVNDB-2019-006577" }, { "db": "NVD", "id": "CVE-2019-6825" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://www.schneider-electric.com/en/download/document/sevd-2019-162-01/" }, { "trust": 1.4, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-295-01" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-6825" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-6825" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/427.html" }, { "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2019-6825" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-158260" }, { "db": "VULMON", "id": "CVE-2019-6825" }, { "db": "JVNDB", "id": "JVNDB-2019-006577" }, { "db": "CNNVD", "id": "CNNVD-201907-782" }, { "db": "NVD", "id": "CVE-2019-6825" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-158260" }, { "db": "VULMON", "id": "CVE-2019-6825" }, { "db": "JVNDB", "id": "JVNDB-2019-006577" }, { "db": "CNNVD", "id": "CNNVD-201907-782" }, { "db": "NVD", "id": "CVE-2019-6825" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-07-15T00:00:00", "db": "VULHUB", "id": "VHN-158260" }, { "date": "2019-07-15T00:00:00", "db": "VULMON", "id": "CVE-2019-6825" }, { "date": "2019-07-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-006577" }, { "date": "2019-07-15T00:00:00", "db": "CNNVD", "id": "CNNVD-201907-782" }, { "date": "2019-07-15T21:15:10.790000", "db": "NVD", "id": "CVE-2019-6825" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-10-09T00:00:00", "db": "VULHUB", "id": "VHN-158260" }, { "date": "2022-09-03T00:00:00", "db": "VULMON", "id": "CVE-2019-6825" }, { "date": "2019-10-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-006577" }, { "date": "2019-10-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201907-782" }, { "date": "2024-11-21T04:47:13.673000", "db": "NVD", "id": "CVE-2019-6825" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201907-782" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ProClima Vulnerabilities in uncontrolled search path elements", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-006577" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-201907-782" } ], "trust": 0.6 } }
fkie_cve-2019-6825
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
schneider-electric | proclima | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:schneider-electric:proclima:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C7BB1CA-CCED-4EC9-81F4-16633561E4CF", "versionEndExcluding": "8.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A CWE-427: Uncontrolled Search Path Element vulnerability exists in ProClima (all versions prior to version 8.0.0) which could allow a malicious DLL file, with the same name of any resident DLLs inside the software installation, to execute arbitrary code in all versions of ProClima prior to version 8.0.0." }, { "lang": "es", "value": "Una CWE-427: Existe una vulnerabilidad de Elemento de Ruta (Path) de B\u00fasqueda No Controlada en ProClima (todas las versiones anteriores a la versi\u00f3n 8.0.0), que podr\u00eda permitir un archivo DLL malicioso, con el mismo nombre de cualquier DLL residente dentro de la instalaci\u00f3n del software, para ejecutar c\u00f3digo arbitrario en todas las versiones de ProClima anteriores a la versi\u00f3n 8.0.0." } ], "id": "CVE-2019-6825", "lastModified": "2024-11-21T04:47:13.673", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-07-15T21:15:10.790", "references": [ { "source": "cybersecurity@se.com", "tags": [ "Vendor Advisory" ], "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-162-01/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-162-01/" } ], "sourceIdentifier": "cybersecurity@se.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-427" } ], "source": "cybersecurity@se.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-427" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
ghsa-fvg2-944m-v7hq
Vulnerability from github
A CWE-427: Uncontrolled Search Path Element vulnerability exists in ProClima (all versions prior to version 8.0.0) which could allow a malicious DLL file, with the same name of any resident DLLs inside the software installation, to execute arbitrary code in all versions of ProClima prior to version 8.0.0.
{ "affected": [], "aliases": [ "CVE-2019-6825" ], "database_specific": { "cwe_ids": [ "CWE-427" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2019-07-15T21:15:00Z", "severity": "HIGH" }, "details": "A CWE-427: Uncontrolled Search Path Element vulnerability exists in ProClima (all versions prior to version 8.0.0) which could allow a malicious DLL file, with the same name of any resident DLLs inside the software installation, to execute arbitrary code in all versions of ProClima prior to version 8.0.0.", "id": "GHSA-fvg2-944m-v7hq", "modified": "2022-09-04T00:00:23Z", "published": "2022-05-24T16:50:25Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-6825" }, { "type": "WEB", "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-162-01" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.