cnvd-2015-06255
Vulnerability from cnvd
Title
GE Digital Energy MDS PulseNET和MDS PulseNET Enterprise远程代码执行漏洞
Description
GE Digital Energy MDS PulseNET和MDS PulseNET Enterprise都是美国通用电气(GE)公司的产品。GE Digital Energy MDS PulseNET是一套监控工业通讯网络设备的软件应用程序。MDS PulseNET Enterprise是其中的一个企业版。
GE Digital Energy MDS PulseNET和MDS PulseNET Enterprise 3.1.5之前版本存在远程代码执行漏洞。由于support账户使用硬编码的证书。远程攻击者可通过已知的密码利用该漏洞获取管理员访问权限,执行任意代码。
Severity
高
VLAI Severity ?
Patch Name
GE Digital Energy MDS PulseNET和MDS PulseNET Enterprise远程代码执行漏洞的补丁
Patch Description
GE Digital Energy MDS PulseNET和MDS PulseNET Enterprise都是美国通用电气(GE)公司的产品。GE Digital Energy MDS PulseNET是一套监控工业通讯网络设备的软件应用程序。MDS PulseNET Enterprise是其中的一个企业版。
GE Digital Energy MDS PulseNET和MDS PulseNET Enterprise 3.1.5之前版本存在远程代码执行漏洞。由于support账户使用硬编码的证书。远程攻击者可通过已知的密码利用该漏洞获取管理员访问权限,执行任意代码。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
用户可参考如下供应商提供的安全公告获得补丁信息: https://ics-cert.us-cert.gov/advisories/ICSA-15-258-03
Reference
https://ics-cert.us-cert.gov/advisories/ICSA-15-258-03
http://zerodayinitiative.com/advisories/ZDI-15-440/
Impacted products
| Name | General Electric Company MDS PulseNET |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2015-6456"
}
},
"description": "GE Digital Energy MDS PulseNET\u548cMDS PulseNET Enterprise\u90fd\u662f\u7f8e\u56fd\u901a\u7528\u7535\u6c14\uff08GE\uff09\u516c\u53f8\u7684\u4ea7\u54c1\u3002GE Digital Energy MDS PulseNET\u662f\u4e00\u5957\u76d1\u63a7\u5de5\u4e1a\u901a\u8baf\u7f51\u7edc\u8bbe\u5907\u7684\u8f6f\u4ef6\u5e94\u7528\u7a0b\u5e8f\u3002MDS PulseNET Enterprise\u662f\u5176\u4e2d\u7684\u4e00\u4e2a\u4f01\u4e1a\u7248\u3002\r\n\r\nGE Digital Energy MDS PulseNET\u548cMDS PulseNET Enterprise 3.1.5\u4e4b\u524d\u7248\u672c\u5b58\u5728\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\u3002\u7531\u4e8esupport\u8d26\u6237\u4f7f\u7528\u786c\u7f16\u7801\u7684\u8bc1\u4e66\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u5df2\u77e5\u7684\u5bc6\u7801\u5229\u7528\u8be5\u6f0f\u6d1e\u83b7\u53d6\u7ba1\u7406\u5458\u8bbf\u95ee\u6743\u9650\uff0c\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002",
"discovererName": "Andrea Micalizzi (rgod)",
"formalWay": "\u7528\u6237\u53ef\u53c2\u8003\u5982\u4e0b\u4f9b\u5e94\u5546\u63d0\u4f9b\u7684\u5b89\u5168\u516c\u544a\u83b7\u5f97\u8865\u4e01\u4fe1\u606f\uff1a\r\nhttps://ics-cert.us-cert.gov/advisories/ICSA-15-258-03",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2015-06255",
"openTime": "2015-09-29",
"patchDescription": "GE Digital Energy MDS PulseNET\u548cMDS PulseNET Enterprise\u90fd\u662f\u7f8e\u56fd\u901a\u7528\u7535\u6c14\uff08GE\uff09\u516c\u53f8\u7684\u4ea7\u54c1\u3002GE Digital Energy MDS PulseNET\u662f\u4e00\u5957\u76d1\u63a7\u5de5\u4e1a\u901a\u8baf\u7f51\u7edc\u8bbe\u5907\u7684\u8f6f\u4ef6\u5e94\u7528\u7a0b\u5e8f\u3002MDS PulseNET Enterprise\u662f\u5176\u4e2d\u7684\u4e00\u4e2a\u4f01\u4e1a\u7248\u3002 \r\n\r\nGE Digital Energy MDS PulseNET\u548cMDS PulseNET Enterprise 3.1.5\u4e4b\u524d\u7248\u672c\u5b58\u5728\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\u3002\u7531\u4e8esupport\u8d26\u6237\u4f7f\u7528\u786c\u7f16\u7801\u7684\u8bc1\u4e66\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u5df2\u77e5\u7684\u5bc6\u7801\u5229\u7528\u8be5\u6f0f\u6d1e\u83b7\u53d6\u7ba1\u7406\u5458\u8bbf\u95ee\u6743\u9650\uff0c\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "GE Digital Energy MDS PulseNET\u548cMDS PulseNET Enterprise\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "General Electric Company MDS PulseNET"
},
"referenceLink": "https://ics-cert.us-cert.gov/advisories/ICSA-15-258-03\r\nhttp://zerodayinitiative.com/advisories/ZDI-15-440/",
"serverity": "\u9ad8",
"submitTime": "2015-09-23",
"title": "GE Digital Energy MDS PulseNET\u548cMDS PulseNET Enterprise\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…