CERTFR-2021-AVI-370
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Schneider. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
N/A N/A EcoStruxure Machine Expert versions antérieures à 2.0
N/A N/A spaceLYnk versions antérieures à 2.61 (ne corrige pas toutes les vulnérabilités)
N/A N/A Triconex modèle 3009 MP versions Tricon antérieures à 11.8.0 (build 753)
N/A N/A micrologiciel pour Modicon M241/M251 versions antérieures à 5.1.9.14
N/A N/A TCM 4351B versions Tricon antérieures à 11.5.1 ou 11.7.1 (build 638)
N/A N/A micrologiciel pour Modicon M218/M241/M251/M262, LMC PacDrive Eco/Pro/Pro2, HMISCU Logic Controllers sans le dernier correctif
N/A N/A Harmony STO, STU, GTO, GTU, GTUX, KG configuré par Vijeo Designer versions antérieures à 6.2 SP11
N/A N/A Modicon Managed Switch MCSESM et MCSESP versions antérieures à 8.22
N/A N/A homeLYnk versions antérieures à 2.61 (ne corrige pas toutes les vulnérabilités)
N/A N/A Harmony HMISCU configuré par EcoStruxure Machine Expert versions antérieures à 2.0
N/A N/A Geo SCADA Expert 2020 version April 2021 (83.7787.1)

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "EcoStruxure Machine Expert versions ant\u00e9rieures \u00e0 2.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "spaceLYnk versions ant\u00e9rieures \u00e0 2.61 (ne corrige pas toutes les vuln\u00e9rabilit\u00e9s)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "Triconex mod\u00e8le 3009 MP versions Tricon ant\u00e9rieures \u00e0 11.8.0 (build 753)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "micrologiciel pour Modicon M241/M251 versions ant\u00e9rieures \u00e0 5.1.9.14",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "TCM 4351B versions Tricon ant\u00e9rieures \u00e0 11.5.1 ou 11.7.1 (build 638)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "micrologiciel pour Modicon M218/M241/M251/M262, LMC PacDrive Eco/Pro/Pro2, HMISCU Logic Controllers sans le dernier correctif",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "Harmony STO, STU, GTO, GTU, GTUX, KG configur\u00e9 par Vijeo Designer versions ant\u00e9rieures \u00e0 6.2 SP11",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "Modicon Managed Switch MCSESM et MCSESP versions ant\u00e9rieures \u00e0 8.22",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "homeLYnk versions ant\u00e9rieures \u00e0 2.61 (ne corrige pas toutes les vuln\u00e9rabilit\u00e9s)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "Harmony HMISCU configur\u00e9 par EcoStruxure Machine Expert versions ant\u00e9rieures \u00e0 2.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "Geo SCADA Expert 2020 version April 2021 (83.7787.1)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-22731",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22731"
    },
    {
      "name": "CVE-2019-9008",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-9008"
    },
    {
      "name": "CVE-2021-22741",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22741"
    },
    {
      "name": "CVE-2021-22747",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22747"
    },
    {
      "name": "CVE-2021-22732",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22732"
    },
    {
      "name": "CVE-2021-22742",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22742"
    },
    {
      "name": "CVE-2021-22736",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22736"
    },
    {
      "name": "CVE-2021-22733",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22733"
    },
    {
      "name": "CVE-2021-22744",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22744"
    },
    {
      "name": "CVE-2021-22740",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22740"
    },
    {
      "name": "CVE-2020-6081",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-6081"
    },
    {
      "name": "CVE-2021-22699",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22699"
    },
    {
      "name": "CVE-2020-10245",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-10245"
    },
    {
      "name": "CVE-2020-7052",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-7052"
    },
    {
      "name": "CVE-2019-13538",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-13538"
    },
    {
      "name": "CVE-2021-22705",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22705"
    },
    {
      "name": "CVE-2021-22735",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22735"
    },
    {
      "name": "CVE-2019-9009",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-9009"
    },
    {
      "name": "CVE-2021-22734",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22734"
    },
    {
      "name": "CVE-2021-22746",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22746"
    },
    {
      "name": "CVE-2021-22737",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22737"
    },
    {
      "name": "CVE-2021-22743",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22743"
    },
    {
      "name": "CVE-2021-22745",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22745"
    },
    {
      "name": "CVE-2021-22738",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22738"
    },
    {
      "name": "CVE-2021-22739",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22739"
    }
  ],
  "initial_release_date": "2021-05-12T00:00:00",
  "last_revision_date": "2021-05-12T00:00:00",
  "links": [],
  "reference": "CERTFR-2021-AVI-370",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2021-05-12T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSchneider. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une\natteinte \u00e0 la confidentialit\u00e9.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Schneider",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-130-04 du 11 mai 2021",
      "url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-130-04"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-130-03 du 11 mai 2021",
      "url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-130-03"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-130-02 du 11 mai 2021",
      "url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-130-02"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-130-07 du 11 mai 2021",
      "url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-130-07"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-130-01 du 11 mai 2021",
      "url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-130-01"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-130-06 du 11 mai 2021",
      "url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-130-06"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-130-05 du 11 mai 2021",
      "url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-130-05"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…