Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2020-7572 (GCVE-0-2020-7572)
Vulnerability from cvelistv5
- CWE-611 - Improper Restriction of XML External Entity Reference
URL | Tags | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | EcoStruxure Building Operation WebReports V1.9 - V3.1 |
Version: EcoStruxure Building Operation WebReports V1.9 - V3.1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T09:33:19.950Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.se.com/ww/en/download/document/SEVD-2020-315-04/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EcoStruxure Building Operation WebReports V1.9 - V3.1", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EcoStruxure Building Operation WebReports V1.9 - V3.1" } ] } ], "descriptions": [ { "lang": "en", "value": "A CWE-611 Improper Restriction of XML External Entity Reference vulnerability exists in EcoStruxure Building Operation WebReports V1.9 - V3.1 that could cause an authenticated remote user being able to inject arbitrary XML code and obtain disclosure of confidential data, denial of service, server side request forgery due to improper configuration of the XML parser." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-611", "description": "CWE-611 Improper Restriction of XML External Entity Reference ", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-11-19T21:02:39", "orgId": "076d1eb6-cfab-4401-b34d-6dfc2a413bdb", "shortName": "schneider" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.se.com/ww/en/download/document/SEVD-2020-315-04/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cybersecurity@schneider-electric.com", "ID": "CVE-2020-7572", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EcoStruxure Building Operation WebReports V1.9 - V3.1", "version": { "version_data": [ { "version_value": "EcoStruxure Building Operation WebReports V1.9 - V3.1" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A CWE-611 Improper Restriction of XML External Entity Reference vulnerability exists in EcoStruxure Building Operation WebReports V1.9 - V3.1 that could cause an authenticated remote user being able to inject arbitrary XML code and obtain disclosure of confidential data, denial of service, server side request forgery due to improper configuration of the XML parser." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-611 Improper Restriction of XML External Entity Reference " } ] } ] }, "references": { "reference_data": [ { "name": "https://www.se.com/ww/en/download/document/SEVD-2020-315-04/", "refsource": "MISC", "url": "https://www.se.com/ww/en/download/document/SEVD-2020-315-04/" } ] } } } }, "cveMetadata": { "assignerOrgId": "076d1eb6-cfab-4401-b34d-6dfc2a413bdb", "assignerShortName": "schneider", "cveId": "CVE-2020-7572", "datePublished": "2020-11-19T21:02:39", "dateReserved": "2020-01-21T00:00:00", "dateUpdated": "2024-08-04T09:33:19.950Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2020-7572\",\"sourceIdentifier\":\"cybersecurity@se.com\",\"published\":\"2020-11-19T22:15:15.457\",\"lastModified\":\"2024-11-21T05:37:24.030\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A CWE-611 Improper Restriction of XML External Entity Reference vulnerability exists in EcoStruxure Building Operation WebReports V1.9 - V3.1 that could cause an authenticated remote user being able to inject arbitrary XML code and obtain disclosure of confidential data, denial of service, server side request forgery due to improper configuration of the XML parser.\"},{\"lang\":\"es\",\"value\":\"Se presenta una vulnerabilidad de Restricci\u00f3n Inapropiada de una Referencia de tipo XML External Entity CWE-611 en EcoStruxure Building Operation WebReports versiones V1.9 - V3.1, que podr\u00eda causar que un usuario remoto autenticado pueda inyectar c\u00f3digo XML arbitrario y obtener una divulgaci\u00f3n de datos confidenciales, una denegaci\u00f3n de servicio, una falsificaci\u00f3n de peticiones del lado del servidor debido a una configuraci\u00f3n inapropiada del analizador XML\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:P/I:P/A:P\",\"baseScore\":6.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"cybersecurity@se.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-611\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:schneider-electric:webreports:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.9\",\"versionEndIncluding\":\"3.1\",\"matchCriteriaId\":\"EFEA3AED-DBEB-4B15-AD56-CEE221637C39\"}]}]}],\"references\":[{\"url\":\"https://www.se.com/ww/en/download/document/SEVD-2020-315-04/\",\"source\":\"cybersecurity@se.com\",\"tags\":[\"Patch\",\"Product\",\"Vendor Advisory\"]},{\"url\":\"https://www.se.com/ww/en/download/document/SEVD-2020-315-04/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Product\",\"Vendor Advisory\"]}]}}" } }
ICSA-21-063-02
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "names": [ "Luis V\u00e1zquez", "Francisco Palma", "Diego Le\u00f3n" ], "organization": "Zerolynx", "summary": "reporting these vulnerabilities to Schneider Electric" }, { "organization": "INCIBE", "summary": "reporting these vulnerabilities to Schneider Electric" }, { "names": [ "Alessandro Bosco", "Luca Di Giuseppe", "Alessandro Sabetta", "Massimiliano Brolli" ], "organization": "TIM Security Red Team Research", "summary": "reporting these vulnerabilities to Schneider Electric" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "summary", "text": "Luis V\u00e1zquez, Francisco Palma, and Diego Le\u00f3n of Zerolynx in coordination with INCIBE and Alessandro Bosco, Luca Di Giuseppe, Alessandro Sabetta, and Massimiliano Brolli of TIM Security Red Team Research reported these vulnerabilities to Schneider Electric.", "title": "Summary" }, { "category": "details", "text": "Note: Please see SEVD-2020-315-04 to see which vulnerabilities affect each specific product.", "title": "Details" }, { "category": "other", "text": "No known public exploits specifically target these vulnerabilities.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "CISAservicedesk@cisa.dhs.gov", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-21-063-02 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2021/icsa-21-063-02.json" }, { "category": "self", "summary": "ICS Advisory ICSA-21-063-02 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-21-063-02" } ], "title": "ICSA-21-063-02_Schneider Electric EcoStruxure Building Operation (EBO)", "tracking": { "current_release_date": "2021-03-04T00:00:00.000000Z", "generator": { "engine": { "name": "CISA USCert CSAF Generator", "version": "1" } }, "id": "ICSA-21-063-02", "initial_release_date": "2021-03-04T00:00:00.000000Z", "revision_history": [ { "date": "2021-03-04T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-21-063-02 Schneider Electric EcoStruxure Building Operation (EBO)" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003e= 2.0 | \u003c= 3.1", "product": { "name": "WebStation: v2.0 - v3.1", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "WebStation" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 1.9 | \u003c= 3.1", "product": { "name": "Enterprise Server installer: v1.9 - v3.1", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "Enterprise Server installer" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 1.9 | \u003c= 3.1", "product": { "name": "WebReports: v1.9 - v3.1", "product_id": "CSAFPID-0003" } } ], "category": "product_name", "name": "WebReports" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 2.0 | \u003c= 3.1", "product": { "name": "Enterprise Central installer: v2.0 - v3.1", "product_id": "CSAFPID-0004" } } ], "category": "product_name", "name": "Enterprise Central installer" } ], "category": "vendor", "name": "Schneider Electric Software, LLC" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-7569", "cwe": { "id": "CWE-434", "name": "Unrestricted Upload of File with Dangerous Type" }, "notes": [ { "category": "summary", "text": "An unrestricted upload of a file with dangerous type vulnerability could allow an authenticated remote user to upload arbitrary files due to incorrect verification of user supplied files and achieve remote code execution.CVE-2020-7569 has been assigned to this vulnerability. A CVSS v3 base score of 4.6 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, "references": [ { "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Schneider Electric recommends users upgrade to Version 3.2 of EBO as it is not impacted by any of these vulnerabilities. For assistance in upgrading, contact Schneider Electric Customer Care Center or your Schneider Electric representative.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://www.se.com/ww/en/work/support/country-selector/contact-us.jsp" }, { "category": "mitigation", "details": "For versions prior to 3.2, fixes are now available in the form of a hotfix patch. Please refer to SEVD-2020-315-04 for specific information about how to apply the patch.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://www.se.com/ww/en/download/document/SEVD-2020-315-04/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "title": "CVE-2020-7569" }, { "cve": "CVE-2020-7570", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "summary", "text": "An improper neutralization of an input during webpage generation vulnerability could allow an authenticated remote user to inject arbitrary web script or HTML due to incorrect sanitization of user-supplied data and achieve a stored cross-site scripting attack against other WebReport users.CVE-2020-7570 has been assigned to this vulnerability. A CVSS v3 base score of 6.4 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, "references": [ { "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Schneider Electric recommends users upgrade to Version 3.2 of EBO as it is not impacted by any of these vulnerabilities. For assistance in upgrading, contact Schneider Electric Customer Care Center or your Schneider Electric representative.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://www.se.com/ww/en/work/support/country-selector/contact-us.jsp" }, { "category": "mitigation", "details": "For versions prior to 3.2, fixes are now available in the form of a hotfix patch. Please refer to SEVD-2020-315-04 for specific information about how to apply the patch.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://www.se.com/ww/en/download/document/SEVD-2020-315-04/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "title": "CVE-2020-7570" }, { "cve": "CVE-2020-7571", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "summary", "text": "Multiple improper neutralizations of an input during webpage generation vulnerabilities could allow a remote attacker to inject arbitrary web script or HTML due to incorrect sanitization of user supplied data and achieve a reflected cross-site scripting attack against other WebReport users.CVE-2020-7571 has been assigned to this vulnerability. A CVSS v3 base score of 6.1 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, "references": [ { "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Schneider Electric recommends users upgrade to Version 3.2 of EBO as it is not impacted by any of these vulnerabilities. For assistance in upgrading, contact Schneider Electric Customer Care Center or your Schneider Electric representative.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://www.se.com/ww/en/work/support/country-selector/contact-us.jsp" }, { "category": "mitigation", "details": "For versions prior to 3.2, fixes are now available in the form of a hotfix patch. Please refer to SEVD-2020-315-04 for specific information about how to apply the patch.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://www.se.com/ww/en/download/document/SEVD-2020-315-04/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "title": "CVE-2020-7571" }, { "cve": "CVE-2020-7572", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "notes": [ { "category": "summary", "text": "An improper restriction of XML external entity reference vulnerability could allow an authenticated remote user to inject arbitrary XML code and obtain disclosure of confidential data, cause a denial-of-service condition, or execute server-side request forgery due to improper configuration of the XML parser.CVE-2020-7572 has been assigned to this vulnerability. A CVSS v3 base score of 6.7 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:H).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, "references": [ { "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Schneider Electric recommends users upgrade to Version 3.2 of EBO as it is not impacted by any of these vulnerabilities. For assistance in upgrading, contact Schneider Electric Customer Care Center or your Schneider Electric representative.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://www.se.com/ww/en/work/support/country-selector/contact-us.jsp" }, { "category": "mitigation", "details": "For versions prior to 3.2, fixes are now available in the form of a hotfix patch. Please refer to SEVD-2020-315-04 for specific information about how to apply the patch.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://www.se.com/ww/en/download/document/SEVD-2020-315-04/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "title": "CVE-2020-7572" }, { "cve": "CVE-2020-7573", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "summary", "text": "An improper access control vulnerability could allow a remote attacker access to restricted web resources due to improper access control.CVE-2020-7573 has been assigned to this vulnerability. A CVSS v3 base score of 5.0 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, "references": [ { "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Schneider Electric recommends users upgrade to Version 3.2 of EBO as it is not impacted by any of these vulnerabilities. For assistance in upgrading, contact Schneider Electric Customer Care Center or your Schneider Electric representative.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://www.se.com/ww/en/work/support/country-selector/contact-us.jsp" }, { "category": "mitigation", "details": "For versions prior to 3.2, fixes are now available in the form of a hotfix patch. Please refer to SEVD-2020-315-04 for specific information about how to apply the patch.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://www.se.com/ww/en/download/document/SEVD-2020-315-04/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "title": "CVE-2020-7573" }, { "cve": "CVE-2020-28209", "cwe": { "id": "CWE-428", "name": "Unquoted Search Path or Element" }, "notes": [ { "category": "summary", "text": "An unquoted search path vulnerability could allow any local Windows user with write permissions on at least one of the subfolders of the connect agent service binary path to gain the privilege of the user who started the service. By default, the Enterprise Server and Enterprise Central is always installed at a location requiring Administrator privileges, so this vulnerability is only valid if the application has been installed on a non-secure location. CVE-2020-28209 has been assigned to this vulnerability. A CVSS v3 base score of 2.0 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:N).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, "references": [ { "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Schneider Electric recommends users upgrade to Version 3.2 of EBO as it is not impacted by any of these vulnerabilities. For assistance in upgrading, contact Schneider Electric Customer Care Center or your Schneider Electric representative.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://www.se.com/ww/en/work/support/country-selector/contact-us.jsp" }, { "category": "mitigation", "details": "For versions prior to 3.2, fixes are now available in the form of a hotfix patch. Please refer to SEVD-2020-315-04 for specific information about how to apply the patch.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://www.se.com/ww/en/download/document/SEVD-2020-315-04/" } ], "scores": [ { "cvss_v3": { "baseScore": 2.0, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "title": "CVE-2020-28209" }, { "cve": "CVE-2020-28210", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "summary", "text": "An improper neutralization of an input during webpage generation vulnerability could allow an attacker to inject HTML and JavaScript code into the user\u0027s browser. CVE-2020-28210 has been assigned to this vulnerability. A CVSS v3 base score of 4.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, "references": [ { "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Schneider Electric recommends users upgrade to Version 3.2 of EBO as it is not impacted by any of these vulnerabilities. For assistance in upgrading, contact Schneider Electric Customer Care Center or your Schneider Electric representative.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://www.se.com/ww/en/work/support/country-selector/contact-us.jsp" }, { "category": "mitigation", "details": "For versions prior to 3.2, fixes are now available in the form of a hotfix patch. Please refer to SEVD-2020-315-04 for specific information about how to apply the patch.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://www.se.com/ww/en/download/document/SEVD-2020-315-04/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "title": "CVE-2020-28210" } ] }
icsa-21-063-02
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "names": [ "Luis V\u00e1zquez", "Francisco Palma", "Diego Le\u00f3n" ], "organization": "Zerolynx", "summary": "reporting these vulnerabilities to Schneider Electric" }, { "organization": "INCIBE", "summary": "reporting these vulnerabilities to Schneider Electric" }, { "names": [ "Alessandro Bosco", "Luca Di Giuseppe", "Alessandro Sabetta", "Massimiliano Brolli" ], "organization": "TIM Security Red Team Research", "summary": "reporting these vulnerabilities to Schneider Electric" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "summary", "text": "Luis V\u00e1zquez, Francisco Palma, and Diego Le\u00f3n of Zerolynx in coordination with INCIBE and Alessandro Bosco, Luca Di Giuseppe, Alessandro Sabetta, and Massimiliano Brolli of TIM Security Red Team Research reported these vulnerabilities to Schneider Electric.", "title": "Summary" }, { "category": "details", "text": "Note: Please see SEVD-2020-315-04 to see which vulnerabilities affect each specific product.", "title": "Details" }, { "category": "other", "text": "No known public exploits specifically target these vulnerabilities.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "CISAservicedesk@cisa.dhs.gov", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-21-063-02 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2021/icsa-21-063-02.json" }, { "category": "self", "summary": "ICS Advisory ICSA-21-063-02 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-21-063-02" } ], "title": "ICSA-21-063-02_Schneider Electric EcoStruxure Building Operation (EBO)", "tracking": { "current_release_date": "2021-03-04T00:00:00.000000Z", "generator": { "engine": { "name": "CISA USCert CSAF Generator", "version": "1" } }, "id": "ICSA-21-063-02", "initial_release_date": "2021-03-04T00:00:00.000000Z", "revision_history": [ { "date": "2021-03-04T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-21-063-02 Schneider Electric EcoStruxure Building Operation (EBO)" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003e= 2.0 | \u003c= 3.1", "product": { "name": "WebStation: v2.0 - v3.1", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "WebStation" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 1.9 | \u003c= 3.1", "product": { "name": "Enterprise Server installer: v1.9 - v3.1", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "Enterprise Server installer" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 1.9 | \u003c= 3.1", "product": { "name": "WebReports: v1.9 - v3.1", "product_id": "CSAFPID-0003" } } ], "category": "product_name", "name": "WebReports" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 2.0 | \u003c= 3.1", "product": { "name": "Enterprise Central installer: v2.0 - v3.1", "product_id": "CSAFPID-0004" } } ], "category": "product_name", "name": "Enterprise Central installer" } ], "category": "vendor", "name": "Schneider Electric Software, LLC" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-7569", "cwe": { "id": "CWE-434", "name": "Unrestricted Upload of File with Dangerous Type" }, "notes": [ { "category": "summary", "text": "An unrestricted upload of a file with dangerous type vulnerability could allow an authenticated remote user to upload arbitrary files due to incorrect verification of user supplied files and achieve remote code execution.CVE-2020-7569 has been assigned to this vulnerability. A CVSS v3 base score of 4.6 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, "references": [ { "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Schneider Electric recommends users upgrade to Version 3.2 of EBO as it is not impacted by any of these vulnerabilities. For assistance in upgrading, contact Schneider Electric Customer Care Center or your Schneider Electric representative.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://www.se.com/ww/en/work/support/country-selector/contact-us.jsp" }, { "category": "mitigation", "details": "For versions prior to 3.2, fixes are now available in the form of a hotfix patch. Please refer to SEVD-2020-315-04 for specific information about how to apply the patch.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://www.se.com/ww/en/download/document/SEVD-2020-315-04/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "title": "CVE-2020-7569" }, { "cve": "CVE-2020-7570", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "summary", "text": "An improper neutralization of an input during webpage generation vulnerability could allow an authenticated remote user to inject arbitrary web script or HTML due to incorrect sanitization of user-supplied data and achieve a stored cross-site scripting attack against other WebReport users.CVE-2020-7570 has been assigned to this vulnerability. A CVSS v3 base score of 6.4 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, "references": [ { "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Schneider Electric recommends users upgrade to Version 3.2 of EBO as it is not impacted by any of these vulnerabilities. For assistance in upgrading, contact Schneider Electric Customer Care Center or your Schneider Electric representative.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://www.se.com/ww/en/work/support/country-selector/contact-us.jsp" }, { "category": "mitigation", "details": "For versions prior to 3.2, fixes are now available in the form of a hotfix patch. Please refer to SEVD-2020-315-04 for specific information about how to apply the patch.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://www.se.com/ww/en/download/document/SEVD-2020-315-04/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "title": "CVE-2020-7570" }, { "cve": "CVE-2020-7571", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "summary", "text": "Multiple improper neutralizations of an input during webpage generation vulnerabilities could allow a remote attacker to inject arbitrary web script or HTML due to incorrect sanitization of user supplied data and achieve a reflected cross-site scripting attack against other WebReport users.CVE-2020-7571 has been assigned to this vulnerability. A CVSS v3 base score of 6.1 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, "references": [ { "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Schneider Electric recommends users upgrade to Version 3.2 of EBO as it is not impacted by any of these vulnerabilities. For assistance in upgrading, contact Schneider Electric Customer Care Center or your Schneider Electric representative.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://www.se.com/ww/en/work/support/country-selector/contact-us.jsp" }, { "category": "mitigation", "details": "For versions prior to 3.2, fixes are now available in the form of a hotfix patch. Please refer to SEVD-2020-315-04 for specific information about how to apply the patch.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://www.se.com/ww/en/download/document/SEVD-2020-315-04/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "title": "CVE-2020-7571" }, { "cve": "CVE-2020-7572", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "notes": [ { "category": "summary", "text": "An improper restriction of XML external entity reference vulnerability could allow an authenticated remote user to inject arbitrary XML code and obtain disclosure of confidential data, cause a denial-of-service condition, or execute server-side request forgery due to improper configuration of the XML parser.CVE-2020-7572 has been assigned to this vulnerability. A CVSS v3 base score of 6.7 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:H).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, "references": [ { "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Schneider Electric recommends users upgrade to Version 3.2 of EBO as it is not impacted by any of these vulnerabilities. For assistance in upgrading, contact Schneider Electric Customer Care Center or your Schneider Electric representative.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://www.se.com/ww/en/work/support/country-selector/contact-us.jsp" }, { "category": "mitigation", "details": "For versions prior to 3.2, fixes are now available in the form of a hotfix patch. Please refer to SEVD-2020-315-04 for specific information about how to apply the patch.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://www.se.com/ww/en/download/document/SEVD-2020-315-04/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "title": "CVE-2020-7572" }, { "cve": "CVE-2020-7573", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "summary", "text": "An improper access control vulnerability could allow a remote attacker access to restricted web resources due to improper access control.CVE-2020-7573 has been assigned to this vulnerability. A CVSS v3 base score of 5.0 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, "references": [ { "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Schneider Electric recommends users upgrade to Version 3.2 of EBO as it is not impacted by any of these vulnerabilities. For assistance in upgrading, contact Schneider Electric Customer Care Center or your Schneider Electric representative.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://www.se.com/ww/en/work/support/country-selector/contact-us.jsp" }, { "category": "mitigation", "details": "For versions prior to 3.2, fixes are now available in the form of a hotfix patch. Please refer to SEVD-2020-315-04 for specific information about how to apply the patch.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://www.se.com/ww/en/download/document/SEVD-2020-315-04/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "title": "CVE-2020-7573" }, { "cve": "CVE-2020-28209", "cwe": { "id": "CWE-428", "name": "Unquoted Search Path or Element" }, "notes": [ { "category": "summary", "text": "An unquoted search path vulnerability could allow any local Windows user with write permissions on at least one of the subfolders of the connect agent service binary path to gain the privilege of the user who started the service. By default, the Enterprise Server and Enterprise Central is always installed at a location requiring Administrator privileges, so this vulnerability is only valid if the application has been installed on a non-secure location. CVE-2020-28209 has been assigned to this vulnerability. A CVSS v3 base score of 2.0 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:N).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, "references": [ { "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Schneider Electric recommends users upgrade to Version 3.2 of EBO as it is not impacted by any of these vulnerabilities. For assistance in upgrading, contact Schneider Electric Customer Care Center or your Schneider Electric representative.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://www.se.com/ww/en/work/support/country-selector/contact-us.jsp" }, { "category": "mitigation", "details": "For versions prior to 3.2, fixes are now available in the form of a hotfix patch. Please refer to SEVD-2020-315-04 for specific information about how to apply the patch.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://www.se.com/ww/en/download/document/SEVD-2020-315-04/" } ], "scores": [ { "cvss_v3": { "baseScore": 2.0, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "title": "CVE-2020-28209" }, { "cve": "CVE-2020-28210", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "summary", "text": "An improper neutralization of an input during webpage generation vulnerability could allow an attacker to inject HTML and JavaScript code into the user\u0027s browser. CVE-2020-28210 has been assigned to this vulnerability. A CVSS v3 base score of 4.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, "references": [ { "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Schneider Electric recommends users upgrade to Version 3.2 of EBO as it is not impacted by any of these vulnerabilities. For assistance in upgrading, contact Schneider Electric Customer Care Center or your Schneider Electric representative.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://www.se.com/ww/en/work/support/country-selector/contact-us.jsp" }, { "category": "mitigation", "details": "For versions prior to 3.2, fixes are now available in the form of a hotfix patch. Please refer to SEVD-2020-315-04 for specific information about how to apply the patch.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://www.se.com/ww/en/download/document/SEVD-2020-315-04/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "title": "CVE-2020-28210" } ] }
gsd-2020-7572
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2020-7572", "description": "A CWE-611 Improper Restriction of XML External Entity Reference vulnerability exists in EcoStruxure Building Operation WebReports V1.9 - V3.1 that could cause an authenticated remote user being able to inject arbitrary XML code and obtain disclosure of confidential data, denial of service, server side request forgery due to improper configuration of the XML parser.", "id": "GSD-2020-7572" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2020-7572" ], "details": "A CWE-611 Improper Restriction of XML External Entity Reference vulnerability exists in EcoStruxure Building Operation WebReports V1.9 - V3.1 that could cause an authenticated remote user being able to inject arbitrary XML code and obtain disclosure of confidential data, denial of service, server side request forgery due to improper configuration of the XML parser.", "id": "GSD-2020-7572", "modified": "2023-12-13T01:21:51.670794Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cybersecurity@schneider-electric.com", "ID": "CVE-2020-7572", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EcoStruxure Building Operation WebReports V1.9 - V3.1", "version": { "version_data": [ { "version_value": "EcoStruxure Building Operation WebReports V1.9 - V3.1" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A CWE-611 Improper Restriction of XML External Entity Reference vulnerability exists in EcoStruxure Building Operation WebReports V1.9 - V3.1 that could cause an authenticated remote user being able to inject arbitrary XML code and obtain disclosure of confidential data, denial of service, server side request forgery due to improper configuration of the XML parser." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-611 Improper Restriction of XML External Entity Reference " } ] } ] }, "references": { "reference_data": [ { "name": "https://www.se.com/ww/en/download/document/SEVD-2020-315-04/", "refsource": "MISC", "url": "https://www.se.com/ww/en/download/document/SEVD-2020-315-04/" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:schneider-electric:webreports:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "3.1", "versionStartIncluding": "1.9", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cybersecurity@schneider-electric.com", "ID": "CVE-2020-7572" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "A CWE-611 Improper Restriction of XML External Entity Reference vulnerability exists in EcoStruxure Building Operation WebReports V1.9 - V3.1 that could cause an authenticated remote user being able to inject arbitrary XML code and obtain disclosure of confidential data, denial of service, server side request forgery due to improper configuration of the XML parser." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-611" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.se.com/ww/en/download/document/SEVD-2020-315-04/", "refsource": "MISC", "tags": [ "Patch", "Product", "Vendor Advisory" ], "url": "https://www.se.com/ww/en/download/document/SEVD-2020-315-04/" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9 } }, "lastModifiedDate": "2022-01-31T19:45Z", "publishedDate": "2020-11-19T22:15Z" } } }
fkie_cve-2020-7572
Vulnerability from fkie_nvd
URL | Tags | ||
---|---|---|---|
cybersecurity@se.com | https://www.se.com/ww/en/download/document/SEVD-2020-315-04/ | Patch, Product, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.se.com/ww/en/download/document/SEVD-2020-315-04/ | Patch, Product, Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
schneider-electric | webreports | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:schneider-electric:webreports:*:*:*:*:*:*:*:*", "matchCriteriaId": "EFEA3AED-DBEB-4B15-AD56-CEE221637C39", "versionEndIncluding": "3.1", "versionStartIncluding": "1.9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A CWE-611 Improper Restriction of XML External Entity Reference vulnerability exists in EcoStruxure Building Operation WebReports V1.9 - V3.1 that could cause an authenticated remote user being able to inject arbitrary XML code and obtain disclosure of confidential data, denial of service, server side request forgery due to improper configuration of the XML parser." }, { "lang": "es", "value": "Se presenta una vulnerabilidad de Restricci\u00f3n Inapropiada de una Referencia de tipo XML External Entity CWE-611 en EcoStruxure Building Operation WebReports versiones V1.9 - V3.1, que podr\u00eda causar que un usuario remoto autenticado pueda inyectar c\u00f3digo XML arbitrario y obtener una divulgaci\u00f3n de datos confidenciales, una denegaci\u00f3n de servicio, una falsificaci\u00f3n de peticiones del lado del servidor debido a una configuraci\u00f3n inapropiada del analizador XML" } ], "id": "CVE-2020-7572", "lastModified": "2024-11-21T05:37:24.030", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-11-19T22:15:15.457", "references": [ { "source": "cybersecurity@se.com", "tags": [ "Patch", "Product", "Vendor Advisory" ], "url": "https://www.se.com/ww/en/download/document/SEVD-2020-315-04/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Product", "Vendor Advisory" ], "url": "https://www.se.com/ww/en/download/document/SEVD-2020-315-04/" } ], "sourceIdentifier": "cybersecurity@se.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-611" } ], "source": "cybersecurity@se.com", "type": "Primary" } ] }
ghsa-vqmf-2v99-hhqq
Vulnerability from github
A CWE-611 Improper Restriction of XML External Entity Reference vulnerability exists in EcoStruxure Building Operation WebReports V1.9 - V3.1 that could cause an authenticated remote user being able to inject arbitrary XML code and obtain disclosure of confidential data, denial of service, server side request forgery due to improper configuration of the XML parser.
{ "affected": [], "aliases": [ "CVE-2020-7572" ], "database_specific": { "cwe_ids": [ "CWE-611" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2020-11-19T22:15:00Z", "severity": "HIGH" }, "details": "A CWE-611 Improper Restriction of XML External Entity Reference vulnerability exists in EcoStruxure Building Operation WebReports V1.9 - V3.1 that could cause an authenticated remote user being able to inject arbitrary XML code and obtain disclosure of confidential data, denial of service, server side request forgery due to improper configuration of the XML parser.", "id": "GHSA-vqmf-2v99-hhqq", "modified": "2022-05-24T17:34:45Z", "published": "2022-05-24T17:34:45Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7572" }, { "type": "WEB", "url": "https://www.se.com/ww/en/download/document/SEVD-2020-315-04" } ], "schema_version": "1.4.0", "severity": [] }
CERTFR-2020-AVI-726
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Schneider Electric. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Schneider Electric | N/A | Premium processors avec Ethernet COPRO intégré (TSXP574634, TSXP575634, TSXP576634) toutes versions | ||
Schneider Electric | N/A | Modicon M221 toutes références et toutes versions | ||
Schneider Electric | N/A | PLC Simulator for EcoStruxure Control Expert toutes versions | ||
Schneider Electric | N/A | EcoStruxure Building Operation - WebStation versions v2.0 à v3.1 | ||
Schneider Electric | N/A | Quantum communication modules (140NOE771x1, 140NOC78x00, 140NOC77101) toutes versions | ||
Schneider Electric | N/A | J Data Radios toutes versions | ||
Schneider Electric | N/A | PLC Simulator for Unity Pro (anciennement EcoStruxure Control Expert) toutes versions | ||
Schneider Electric | N/A | EcoStruxure Operator Terminal Expert Runtime 3.1 Service Pack 1A et versions antérieures (les ordinateurs Windows utilisant un UEFI ne sont pas impactés) | ||
Schneider Electric | N/A | M340 modules de communication Ethernet (BMX NOE 0100 (H), BMX NOE 0110 (H), BMX NOC 0401, BMX NOR 0200H) toutes versions | ||
Schneider Electric | N/A | Quantum processors avec Ethernet COPRO intégré 140CPU65xxxxx toutes versions | ||
Schneider Electric | N/A | M340 CPUs BMX P34x toutes versions | ||
Schneider Electric | N/A | EcoStruxure Building Operation - Enterprise Server installer versions v1.9 à v3.1 | ||
Schneider Electric | N/A | Trio Q toutes versions | ||
Schneider Electric | N/A | EcoStruxure Building Operation - WebReports versions v1.9 à v3.1 | ||
Schneider Electric | N/A | Premium communication modules (TSXETY4103, TSXETY5103) toutes versions | ||
Schneider Electric | N/A | EcoStruxure Building Operation - Enterprise Central installer versions v2.0 à v3.1 | ||
Schneider Electric | N/A | IGSS Definition (Def.exe) version 14.0.0.20247 et versions antérieures | ||
Schneider Electric | N/A | Easergy T300 versions antérieures à 2.7 |
Title | Publication Time | Tags | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Premium processors avec Ethernet COPRO int\u00e9gr\u00e9 (TSXP574634, TSXP575634, TSXP576634) toutes versions", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "Modicon M221 toutes r\u00e9f\u00e9rences et toutes versions", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "PLC Simulator for EcoStruxure Control Expert toutes versions", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "EcoStruxure Building Operation - WebStation versions v2.0 \u00e0 v3.1", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "Quantum communication modules (140NOE771x1, 140NOC78x00, 140NOC77101) toutes versions", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "J Data Radios toutes versions", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "PLC Simulator for Unity Pro (anciennement EcoStruxure Control Expert) toutes versions", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "EcoStruxure Operator Terminal Expert Runtime 3.1 Service Pack 1A et versions ant\u00e9rieures (les ordinateurs Windows utilisant un UEFI ne sont pas impact\u00e9s)", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "M340 modules de communication Ethernet (BMX NOE 0100 (H), BMX NOE 0110 (H), BMX NOC 0401, BMX NOR 0200H) toutes versions", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "Quantum processors avec Ethernet COPRO int\u00e9gr\u00e9 140CPU65xxxxx toutes versions", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "M340 CPUs BMX P34x toutes versions", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "EcoStruxure Building Operation - Enterprise Server installer versions v1.9 \u00e0 v3.1", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "Trio Q toutes versions", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "EcoStruxure Building Operation - WebReports versions v1.9 \u00e0 v3.1", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "Premium communication modules (TSXETY4103, TSXETY5103) toutes versions", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "EcoStruxure Building Operation - Enterprise Central installer versions v2.0 \u00e0 v3.1", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "IGSS Definition (Def.exe) version 14.0.0.20247 et versions ant\u00e9rieures", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "Easergy T300 versions ant\u00e9rieures \u00e0 2.7", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2020-7564", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7564" }, { "name": "CVE-2020-7563", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7563" }, { "name": "CVE-2020-7558", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7558" }, { "name": "CVE-2020-7561", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7561" }, { "name": "CVE-2020-7555", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7555" }, { "name": "CVE-2020-7565", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7565" }, { "name": "CVE-2020-7570", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7570" }, { "name": "CVE-2020-7572", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7572" }, { "name": "CVE-2020-28213", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28213" }, { "name": "CVE-2020-7554", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7554" }, { "name": "CVE-2020-7557", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7557" }, { "name": "CVE-2020-7550", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7550" }, { "name": "CVE-2020-7553", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7553" }, { "name": "CVE-2020-7559", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7559" }, { "name": "CVE-2020-7566", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7566" }, { "name": "CVE-2020-7538", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7538" }, { "name": "CVE-2020-7556", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7556" }, { "name": "CVE-2020-28212", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28212" }, { "name": "CVE-2020-7562", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7562" }, { "name": "CVE-2020-7571", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7571" }, { "name": "CVE-2020-7552", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7552" }, { "name": "CVE-2020-28211", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28211" }, { "name": "CVE-2020-7551", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7551" }, { "name": "CVE-2020-7567", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7567" }, { "name": "CVE-2020-7544", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7544" } ], "initial_release_date": "2020-11-12T00:00:00", "last_revision_date": "2020-11-12T00:00:00", "links": [], "reference": "CERTFR-2020-AVI-726", "revisions": [ { "description": "Version initiale", "revision_date": "2020-11-12T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSchneider Electric. Certaines d\u0027entre elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de\nservice \u00e0 distance et un contournement de la politique de s\u00e9curit\u00e9.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Schneider Electric", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2020-315-05 du 11 novembre 2020", "url": "https://www.se.com/ww/en/download/document/SEVD-2020-315-05/" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2020-315-03 du 11 novembre 2020", "url": "https://www.se.com/ww/en/download/document/SEVD-2020-315-03/" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2020-315-07 du 11 novembre 2020", "url": "https://www.se.com/ww/en/download/document/SEVD-2020-315-07/" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2020-315-01 du 11 novembre 2020", "url": "https://www.se.com/ww/en/download/document/SEVD-2020-315-01/" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2020-315-04 du 11 novembre 2020", "url": "https://www.se.com/ww/en/download/document/SEVD-2020-315-04/" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2020-315-06 du 11 novembre 2020", "url": "https://www.se.com/ww/en/download/document/SEVD-2020-315-06/" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2020-315-02 du 11 novembre 2020", "url": "https://www.se.com/ww/en/download/document/SEVD-2020-315-02/" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SESB-2020-315-01 du 11 novembre 2020", "url": "https://www.se.com/ww/en/download/document/SESB-2020-315-01/" } ] }
cnvd-2021-29457
Vulnerability from cnvd
厂商已发布了漏洞修复程序,请及时关注更新: https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet&p_File_Name=SEVD-2020-315-04_EcoStruxure%E2%84%A2_Building_Operation_Security_Notification.pdf&p_Doc_Ref=SEVD-2020-315-04
Name | Schneider Electric EcoStruxure Building Operation WebReports >=1.9,<=3.1 |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2020-7572", "cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2020-7572" } }, "description": "EcoStruxure Building Operation WebReports\u662f\u4e00\u6b3e\u7528\u4e8e\u521b\u5efa\u3001\u67e5\u770b\u548c\u7ba1\u7406\u62a5\u544a\u7684Web\u5e94\u7528\u7a0b\u5e8f\u3002\n\nEcoStruxure Building Operation WebReports 1.9 - 3.1\u5b58\u5728XML\u5916\u90e8\u5b9e\u4f53\u5f15\u7528\u9650\u5236\u4e0d\u5f53\u6f0f\u6d1e\u3002\u8be5\u6f0f\u6d1e\u6e90\u4e8eXML\u89e3\u6790\u5668\u7684\u914d\u7f6e\u4e0d\u5f53\u3002\u8fdc\u7a0b\u8ba4\u8bc1\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u6ce8\u5165\u4efb\u610fXML\u4ee3\u7801\uff0c\u4ece\u800c\u53ef\u83b7\u53d6\u673a\u5bc6\u6570\u636e\uff0c\u5bfc\u81f4\u62d2\u7edd\u670d\u52a1\u53ca\u8fdb\u884c\u670d\u52a1\u5668\u7aef\u8bf7\u6c42\u4f2a\u9020\u653b\u51fb\u3002", "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://download.schneider-electric.com/files?p_enDocType=Technical+leaflet\u0026p_File_Name=SEVD-2020-315-04_EcoStruxure%E2%84%A2_Building_Operation_Security_Notification.pdf\u0026p_Doc_Ref=SEVD-2020-315-04", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2021-29457", "openTime": "2021-04-19", "patchDescription": "EcoStruxure Building Operation WebReports\u662f\u4e00\u6b3e\u7528\u4e8e\u521b\u5efa\u3001\u67e5\u770b\u548c\u7ba1\u7406\u62a5\u544a\u7684Web\u5e94\u7528\u7a0b\u5e8f\u3002\r\n\r\nEcoStruxure Building Operation WebReports 1.9 - 3.1\u5b58\u5728XML\u5916\u90e8\u5b9e\u4f53\u5f15\u7528\u9650\u5236\u4e0d\u5f53\u6f0f\u6d1e\u3002\u8be5\u6f0f\u6d1e\u6e90\u4e8eXML\u89e3\u6790\u5668\u7684\u914d\u7f6e\u4e0d\u5f53\u3002\u8fdc\u7a0b\u8ba4\u8bc1\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u6ce8\u5165\u4efb\u610fXML\u4ee3\u7801\uff0c\u4ece\u800c\u53ef\u83b7\u53d6\u673a\u5bc6\u6570\u636e\uff0c\u5bfc\u81f4\u62d2\u7edd\u670d\u52a1\u53ca\u8fdb\u884c\u670d\u52a1\u5668\u7aef\u8bf7\u6c42\u4f2a\u9020\u653b\u51fb\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "Schneider Electric EcoStruxure Building Operation WebReports XML\u5916\u90e8\u5b9e\u4f53\u5f15\u7528\u9650\u5236\u4e0d\u5f53\u6f0f\u6d1e\u7684\u8865\u4e01", "products": { "product": "Schneider Electric EcoStruxure Building Operation WebReports \u003e=1.9\uff0c\u003c=3.1" }, "referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2020-7572", "serverity": "\u4e2d", "submitTime": "2020-11-20", "title": "Schneider Electric EcoStruxure Building Operation WebReports XML\u5916\u90e8\u5b9e\u4f53\u5f15\u7528\u9650\u5236\u4e0d\u5f53\u6f0f\u6d1e" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.