Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2019-6823 (GCVE-0-2019-6823)
Vulnerability from cvelistv5
- CWE-94 - Code Injection
Vendor | Product | Version | ||
---|---|---|---|---|
ProClima | ProClima all versions prior to version 8.0.0 |
Version: ProClima all versions prior to version 8.0.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:31:04.400Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-162-01/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ProClima all versions prior to version 8.0.0", "vendor": "ProClima", "versions": [ { "status": "affected", "version": "ProClima all versions prior to version 8.0.0" } ] } ], "datePublic": "2019-06-11T00:00:00", "descriptions": [ { "lang": "en", "value": "A CWE-94: Code Injection vulnerability exists in ProClima (all versions prior to version 8.0.0) which could allow an unauthenticated, remote attacker to execute arbitrary code on the targeted system in all versions of ProClima prior to version 8.0.0." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94: Code Injection", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-07-15T20:42:37", "orgId": "076d1eb6-cfab-4401-b34d-6dfc2a413bdb", "shortName": "schneider" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-162-01/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cybersecurity@schneider-electric.com", "ID": "CVE-2019-6823", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ProClima all versions prior to version 8.0.0", "version": { "version_data": [ { "version_value": "ProClima all versions prior to version 8.0.0" } ] } } ] }, "vendor_name": "ProClima" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A CWE-94: Code Injection vulnerability exists in ProClima (all versions prior to version 8.0.0) which could allow an unauthenticated, remote attacker to execute arbitrary code on the targeted system in all versions of ProClima prior to version 8.0.0." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-94: Code Injection" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.schneider-electric.com/en/download/document/SEVD-2019-162-01/", "refsource": "MISC", "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-162-01/" } ] } } } }, "cveMetadata": { "assignerOrgId": "076d1eb6-cfab-4401-b34d-6dfc2a413bdb", "assignerShortName": "schneider", "cveId": "CVE-2019-6823", "datePublished": "2019-07-15T20:41:51", "dateReserved": "2019-01-25T00:00:00", "dateUpdated": "2024-08-04T20:31:04.400Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2019-6823\",\"sourceIdentifier\":\"cybersecurity@se.com\",\"published\":\"2019-07-15T21:15:10.663\",\"lastModified\":\"2024-11-21T04:47:13.460\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A CWE-94: Code Injection vulnerability exists in ProClima (all versions prior to version 8.0.0) which could allow an unauthenticated, remote attacker to execute arbitrary code on the targeted system in all versions of ProClima prior to version 8.0.0.\"},{\"lang\":\"es\",\"value\":\"Una CWE-94: existe una vulnerabilidad de inyecci\u00f3n de c\u00f3digo en ProClima (todas las versiones anteriores a la versi\u00f3n 8.0.0) que podr\u00eda permitir que un atacante remoto no autenticado ejecute c\u00f3digo arbitrario en el sistema objetivo en todas las versiones de ProClima anteriores a la versi\u00f3n 8.0.0.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"cybersecurity@se.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-94\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-94\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:schneider-electric:proclima:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.0.0\",\"matchCriteriaId\":\"1C7BB1CA-CCED-4EC9-81F4-16633561E4CF\"}]}]}],\"references\":[{\"url\":\"https://www.schneider-electric.com/en/download/document/SEVD-2019-162-01/\",\"source\":\"cybersecurity@se.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.schneider-electric.com/en/download/document/SEVD-2019-162-01/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
ICSA-19-295-01
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "names": [ "Haojun Hou" ], "summary": "reporting a vulnerability to CISA" }, { "names": [ "Kushal Arvind Shah" ], "organization": "Fortinet", "summary": "reporting vulnerabilities to Schneider Electric" }, { "names": [ "Yongjun Liu" ], "organization": "NSFOCUS security team", "summary": "reporting vulnerabilities to Schneider Electric" }, { "organization": "Telus", "summary": "reporting vulnerabilities to Schneider Electric" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "summary", "text": "Haojun Hou reported a vulnerability to CISA. Kushal Arvind Shah of Fortinet,Yongjun Liu of NSFOCUS security team, and Telus reported vulnerabilities to Schneider Electric.", "title": "Summary" }, { "category": "other", "text": "No known public exploits specifically target these vulnerabilities.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "CISAservicedesk@cisa.dhs.gov", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-19-295-01 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2019/icsa-19-295-01.json" }, { "category": "self", "summary": "ICS Advisory ICSA-19-295-01 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-19-295-01" } ], "title": "ICSA-19-295-01_Schneider Electric ProClima", "tracking": { "current_release_date": "2019-10-22T00:00:00.000000Z", "generator": { "engine": { "name": "CISA USCert CSAF Generator", "version": "1" } }, "id": "ICSA-19-295-01", "initial_release_date": "2019-10-22T00:00:00.000000Z", "revision_history": [ { "date": "2019-10-22T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-19-295-01 Schneider Electric ProClima" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c 8.0.0", "product": { "name": "ProClima: all versions prior to 8.0.0", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "ProClima" } ], "category": "vendor", "name": "Schneider Electric Software, LLC" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-6823", "cwe": { "id": "CWE-427", "name": "Uncontrolled Search Path Element" }, "notes": [ { "category": "summary", "text": "A code injection vulnerability could allow an unauthenticated, remote attacker to execute arbitrary code on the targeted system.CVE-2019-6823 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Schneider Electric has released Version 8.0.0 of ProClima and recommends users upgrade to this version or newer. ", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.schneider-electric.com/en/product-range-download/2560-proclima/#tabs-top" }, { "category": "mitigation", "details": "For more information on these vulnerabilities and the associated upgrade, please see Schneider Electric\u0027s SEVD-2019-162-01", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-162-01/" }, { "category": "mitigation", "details": "Locate control and safety system networks and remote devices behind firewalls and isolate them from the business network.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Physical controls should be in place so no unauthorized person has access to the ICS and safety controllers, peripheral equipment, or the ICS and safety networks.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "All controllers should reside in locked cabinets and never be left in \u201cProgram\u201d mode.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "All programming software should be kept in locked cabinets and should never be connected to any network other than the network for devices intended.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "All methods of mobile data exchange with the isolated network, such as CDs, USB drives, etc., should be scanned before use in the terminals or any node connected to these networks.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Laptops that have connected to any other network besides the intended network should never be allowed to connect to the safety or control networks without proper sanitation.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Minimize network exposure for all control system devices and/or systems and ensure they are not accessible from the Internet.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "When remote access is required, use secure methods, such as virtual private networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize that VPN is only as secure as the connected devices.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "For further information related to cybersecurity in Schneider Electric\u0027s products, please visit the company\u0027s cybersecurity webpage", "product_ids": [ "CSAFPID-0001" ], "url": "http://www2.schneider-electric.com/sites/corporate/en/support/cybersecurity/cybersecurity.page" }, { "category": "mitigation", "details": "If you require additional support, Schneider Electric Industrial Cybersecurity Services team is available to help. Please visit", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.schneider-electric.com/en/work/services/field-services/industrial-automation/industrial-cybersecurity/industrial-cybersecurity.jsp" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-6823" }, { "cve": "CVE-2019-6824", "cwe": { "id": "CWE-427", "name": "Uncontrolled Search Path Element" }, "notes": [ { "category": "summary", "text": "A buffer error vulnerability could allow an unauthenticated, remote attacker to execute arbitrary code on the targeted system.CVE-2019-6824 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Schneider Electric has released Version 8.0.0 of ProClima and recommends users upgrade to this version or newer. ", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.schneider-electric.com/en/product-range-download/2560-proclima/#tabs-top" }, { "category": "mitigation", "details": "For more information on these vulnerabilities and the associated upgrade, please see Schneider Electric\u0027s SEVD-2019-162-01", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-162-01/" }, { "category": "mitigation", "details": "Locate control and safety system networks and remote devices behind firewalls and isolate them from the business network.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Physical controls should be in place so no unauthorized person has access to the ICS and safety controllers, peripheral equipment, or the ICS and safety networks.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "All controllers should reside in locked cabinets and never be left in \u201cProgram\u201d mode.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "All programming software should be kept in locked cabinets and should never be connected to any network other than the network for devices intended.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "All methods of mobile data exchange with the isolated network, such as CDs, USB drives, etc., should be scanned before use in the terminals or any node connected to these networks.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Laptops that have connected to any other network besides the intended network should never be allowed to connect to the safety or control networks without proper sanitation.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Minimize network exposure for all control system devices and/or systems and ensure they are not accessible from the Internet.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "When remote access is required, use secure methods, such as virtual private networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize that VPN is only as secure as the connected devices.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "For further information related to cybersecurity in Schneider Electric\u0027s products, please visit the company\u0027s cybersecurity webpage", "product_ids": [ "CSAFPID-0001" ], "url": "http://www2.schneider-electric.com/sites/corporate/en/support/cybersecurity/cybersecurity.page" }, { "category": "mitigation", "details": "If you require additional support, Schneider Electric Industrial Cybersecurity Services team is available to help. Please visit", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.schneider-electric.com/en/work/services/field-services/industrial-automation/industrial-cybersecurity/industrial-cybersecurity.jsp" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-6824" }, { "cve": "CVE-2019-6825", "cwe": { "id": "CWE-427", "name": "Uncontrolled Search Path Element" }, "notes": [ { "category": "summary", "text": "An uncontrolled search path element vulnerability could allow a malicious DLL file with the same name of any resident DLLs inside the software installation to execute arbitrary code.CVE-2019-6825 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Schneider Electric has released Version 8.0.0 of ProClima and recommends users upgrade to this version or newer. ", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.schneider-electric.com/en/product-range-download/2560-proclima/#tabs-top" }, { "category": "mitigation", "details": "For more information on these vulnerabilities and the associated upgrade, please see Schneider Electric\u0027s SEVD-2019-162-01", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-162-01/" }, { "category": "mitigation", "details": "Locate control and safety system networks and remote devices behind firewalls and isolate them from the business network.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Physical controls should be in place so no unauthorized person has access to the ICS and safety controllers, peripheral equipment, or the ICS and safety networks.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "All controllers should reside in locked cabinets and never be left in \u201cProgram\u201d mode.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "All programming software should be kept in locked cabinets and should never be connected to any network other than the network for devices intended.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "All methods of mobile data exchange with the isolated network, such as CDs, USB drives, etc., should be scanned before use in the terminals or any node connected to these networks.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Laptops that have connected to any other network besides the intended network should never be allowed to connect to the safety or control networks without proper sanitation.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Minimize network exposure for all control system devices and/or systems and ensure they are not accessible from the Internet.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "When remote access is required, use secure methods, such as virtual private networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize that VPN is only as secure as the connected devices.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "For further information related to cybersecurity in Schneider Electric\u0027s products, please visit the company\u0027s cybersecurity webpage", "product_ids": [ "CSAFPID-0001" ], "url": "http://www2.schneider-electric.com/sites/corporate/en/support/cybersecurity/cybersecurity.page" }, { "category": "mitigation", "details": "If you require additional support, Schneider Electric Industrial Cybersecurity Services team is available to help. Please visit", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.schneider-electric.com/en/work/services/field-services/industrial-automation/industrial-cybersecurity/industrial-cybersecurity.jsp" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-6825" } ] }
icsa-19-295-01
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "names": [ "Haojun Hou" ], "summary": "reporting a vulnerability to CISA" }, { "names": [ "Kushal Arvind Shah" ], "organization": "Fortinet", "summary": "reporting vulnerabilities to Schneider Electric" }, { "names": [ "Yongjun Liu" ], "organization": "NSFOCUS security team", "summary": "reporting vulnerabilities to Schneider Electric" }, { "organization": "Telus", "summary": "reporting vulnerabilities to Schneider Electric" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "summary", "text": "Haojun Hou reported a vulnerability to CISA. Kushal Arvind Shah of Fortinet,Yongjun Liu of NSFOCUS security team, and Telus reported vulnerabilities to Schneider Electric.", "title": "Summary" }, { "category": "other", "text": "No known public exploits specifically target these vulnerabilities.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "CISAservicedesk@cisa.dhs.gov", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-19-295-01 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2019/icsa-19-295-01.json" }, { "category": "self", "summary": "ICS Advisory ICSA-19-295-01 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-19-295-01" } ], "title": "ICSA-19-295-01_Schneider Electric ProClima", "tracking": { "current_release_date": "2019-10-22T00:00:00.000000Z", "generator": { "engine": { "name": "CISA USCert CSAF Generator", "version": "1" } }, "id": "ICSA-19-295-01", "initial_release_date": "2019-10-22T00:00:00.000000Z", "revision_history": [ { "date": "2019-10-22T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-19-295-01 Schneider Electric ProClima" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c 8.0.0", "product": { "name": "ProClima: all versions prior to 8.0.0", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "ProClima" } ], "category": "vendor", "name": "Schneider Electric Software, LLC" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-6823", "cwe": { "id": "CWE-427", "name": "Uncontrolled Search Path Element" }, "notes": [ { "category": "summary", "text": "A code injection vulnerability could allow an unauthenticated, remote attacker to execute arbitrary code on the targeted system.CVE-2019-6823 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Schneider Electric has released Version 8.0.0 of ProClima and recommends users upgrade to this version or newer. ", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.schneider-electric.com/en/product-range-download/2560-proclima/#tabs-top" }, { "category": "mitigation", "details": "For more information on these vulnerabilities and the associated upgrade, please see Schneider Electric\u0027s SEVD-2019-162-01", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-162-01/" }, { "category": "mitigation", "details": "Locate control and safety system networks and remote devices behind firewalls and isolate them from the business network.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Physical controls should be in place so no unauthorized person has access to the ICS and safety controllers, peripheral equipment, or the ICS and safety networks.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "All controllers should reside in locked cabinets and never be left in \u201cProgram\u201d mode.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "All programming software should be kept in locked cabinets and should never be connected to any network other than the network for devices intended.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "All methods of mobile data exchange with the isolated network, such as CDs, USB drives, etc., should be scanned before use in the terminals or any node connected to these networks.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Laptops that have connected to any other network besides the intended network should never be allowed to connect to the safety or control networks without proper sanitation.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Minimize network exposure for all control system devices and/or systems and ensure they are not accessible from the Internet.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "When remote access is required, use secure methods, such as virtual private networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize that VPN is only as secure as the connected devices.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "For further information related to cybersecurity in Schneider Electric\u0027s products, please visit the company\u0027s cybersecurity webpage", "product_ids": [ "CSAFPID-0001" ], "url": "http://www2.schneider-electric.com/sites/corporate/en/support/cybersecurity/cybersecurity.page" }, { "category": "mitigation", "details": "If you require additional support, Schneider Electric Industrial Cybersecurity Services team is available to help. Please visit", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.schneider-electric.com/en/work/services/field-services/industrial-automation/industrial-cybersecurity/industrial-cybersecurity.jsp" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-6823" }, { "cve": "CVE-2019-6824", "cwe": { "id": "CWE-427", "name": "Uncontrolled Search Path Element" }, "notes": [ { "category": "summary", "text": "A buffer error vulnerability could allow an unauthenticated, remote attacker to execute arbitrary code on the targeted system.CVE-2019-6824 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Schneider Electric has released Version 8.0.0 of ProClima and recommends users upgrade to this version or newer. ", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.schneider-electric.com/en/product-range-download/2560-proclima/#tabs-top" }, { "category": "mitigation", "details": "For more information on these vulnerabilities and the associated upgrade, please see Schneider Electric\u0027s SEVD-2019-162-01", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-162-01/" }, { "category": "mitigation", "details": "Locate control and safety system networks and remote devices behind firewalls and isolate them from the business network.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Physical controls should be in place so no unauthorized person has access to the ICS and safety controllers, peripheral equipment, or the ICS and safety networks.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "All controllers should reside in locked cabinets and never be left in \u201cProgram\u201d mode.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "All programming software should be kept in locked cabinets and should never be connected to any network other than the network for devices intended.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "All methods of mobile data exchange with the isolated network, such as CDs, USB drives, etc., should be scanned before use in the terminals or any node connected to these networks.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Laptops that have connected to any other network besides the intended network should never be allowed to connect to the safety or control networks without proper sanitation.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Minimize network exposure for all control system devices and/or systems and ensure they are not accessible from the Internet.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "When remote access is required, use secure methods, such as virtual private networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize that VPN is only as secure as the connected devices.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "For further information related to cybersecurity in Schneider Electric\u0027s products, please visit the company\u0027s cybersecurity webpage", "product_ids": [ "CSAFPID-0001" ], "url": "http://www2.schneider-electric.com/sites/corporate/en/support/cybersecurity/cybersecurity.page" }, { "category": "mitigation", "details": "If you require additional support, Schneider Electric Industrial Cybersecurity Services team is available to help. Please visit", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.schneider-electric.com/en/work/services/field-services/industrial-automation/industrial-cybersecurity/industrial-cybersecurity.jsp" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-6824" }, { "cve": "CVE-2019-6825", "cwe": { "id": "CWE-427", "name": "Uncontrolled Search Path Element" }, "notes": [ { "category": "summary", "text": "An uncontrolled search path element vulnerability could allow a malicious DLL file with the same name of any resident DLLs inside the software installation to execute arbitrary code.CVE-2019-6825 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Schneider Electric has released Version 8.0.0 of ProClima and recommends users upgrade to this version or newer. ", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.schneider-electric.com/en/product-range-download/2560-proclima/#tabs-top" }, { "category": "mitigation", "details": "For more information on these vulnerabilities and the associated upgrade, please see Schneider Electric\u0027s SEVD-2019-162-01", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-162-01/" }, { "category": "mitigation", "details": "Locate control and safety system networks and remote devices behind firewalls and isolate them from the business network.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Physical controls should be in place so no unauthorized person has access to the ICS and safety controllers, peripheral equipment, or the ICS and safety networks.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "All controllers should reside in locked cabinets and never be left in \u201cProgram\u201d mode.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "All programming software should be kept in locked cabinets and should never be connected to any network other than the network for devices intended.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "All methods of mobile data exchange with the isolated network, such as CDs, USB drives, etc., should be scanned before use in the terminals or any node connected to these networks.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Laptops that have connected to any other network besides the intended network should never be allowed to connect to the safety or control networks without proper sanitation.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Minimize network exposure for all control system devices and/or systems and ensure they are not accessible from the Internet.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "When remote access is required, use secure methods, such as virtual private networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize that VPN is only as secure as the connected devices.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "For further information related to cybersecurity in Schneider Electric\u0027s products, please visit the company\u0027s cybersecurity webpage", "product_ids": [ "CSAFPID-0001" ], "url": "http://www2.schneider-electric.com/sites/corporate/en/support/cybersecurity/cybersecurity.page" }, { "category": "mitigation", "details": "If you require additional support, Schneider Electric Industrial Cybersecurity Services team is available to help. Please visit", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.schneider-electric.com/en/work/services/field-services/industrial-automation/industrial-cybersecurity/industrial-cybersecurity.jsp" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-6825" } ] }
gsd-2019-6823
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2019-6823", "description": "A CWE-94: Code Injection vulnerability exists in ProClima (all versions prior to version 8.0.0) which could allow an unauthenticated, remote attacker to execute arbitrary code on the targeted system in all versions of ProClima prior to version 8.0.0.", "id": "GSD-2019-6823" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2019-6823" ], "details": "A CWE-94: Code Injection vulnerability exists in ProClima (all versions prior to version 8.0.0) which could allow an unauthenticated, remote attacker to execute arbitrary code on the targeted system in all versions of ProClima prior to version 8.0.0.", "id": "GSD-2019-6823", "modified": "2023-12-13T01:23:49.913345Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cybersecurity@schneider-electric.com", "ID": "CVE-2019-6823", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ProClima all versions prior to version 8.0.0", "version": { "version_data": [ { "version_value": "ProClima all versions prior to version 8.0.0" } ] } } ] }, "vendor_name": "ProClima" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A CWE-94: Code Injection vulnerability exists in ProClima (all versions prior to version 8.0.0) which could allow an unauthenticated, remote attacker to execute arbitrary code on the targeted system in all versions of ProClima prior to version 8.0.0." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-94: Code Injection" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.schneider-electric.com/en/download/document/SEVD-2019-162-01/", "refsource": "MISC", "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-162-01/" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:schneider-electric:proclima:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "8.0.0", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cybersecurity@schneider-electric.com", "ID": "CVE-2019-6823" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "A CWE-94: Code Injection vulnerability exists in ProClima (all versions prior to version 8.0.0) which could allow an unauthenticated, remote attacker to execute arbitrary code on the targeted system in all versions of ProClima prior to version 8.0.0." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-94" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.schneider-electric.com/en/download/document/SEVD-2019-162-01/", "refsource": "MISC", "tags": [ "Vendor Advisory" ], "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-162-01/" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9 } }, "lastModifiedDate": "2022-10-14T03:03Z", "publishedDate": "2019-07-15T21:15Z" } } }
cnvd-2019-23346
Vulnerability from cnvd
Title: ProClima代码注入漏洞
Description:
Schneider Electric ProClima是法国施耐德电气(Schneider Electric)公司的一套热量计算软件。该软件通过分析指定的热量数据,为控制面板内安装的环境和电气/电子设备提供热量管理功能。
Schneider Electric ProClima 8.0.0之前版本中存在代码注入漏洞。该漏洞源于外部输入数据构造代码段的过程中,网络系统或产品未正确过滤其中的特殊元素。攻击者可利用该漏洞生成非法的代码段,修改网络系统或组件的预期的执行控制流。
Severity: 高
Patch Name: ProClima代码注入漏洞的补丁
Patch Description:
ProClima是Schneider Electric推出的一款热计算软件,可用于确定控制面板的最佳散热解决方案。 ProClima 8.0.0之前版本存在代码注入漏洞。远程未认证攻击者可利用该漏洞在目标系统上执行任意代码。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
厂商已发布了漏洞修复程序,请及时关注更新: https://www.schneider-electric.com/en/product-range-download/2560-proclima/#tabs-top
Reference: https://nvd.nist.gov/vuln/detail/CVE-2019-6823
Name | Schneider Electric ProClima <8.0.0 |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2019-6823", "cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2019-6823" } }, "description": "Schneider Electric ProClima\u662f\u6cd5\u56fd\u65bd\u8010\u5fb7\u7535\u6c14\uff08Schneider Electric\uff09\u516c\u53f8\u7684\u4e00\u5957\u70ed\u91cf\u8ba1\u7b97\u8f6f\u4ef6\u3002\u8be5\u8f6f\u4ef6\u901a\u8fc7\u5206\u6790\u6307\u5b9a\u7684\u70ed\u91cf\u6570\u636e\uff0c\u4e3a\u63a7\u5236\u9762\u677f\u5185\u5b89\u88c5\u7684\u73af\u5883\u548c\u7535\u6c14/\u7535\u5b50\u8bbe\u5907\u63d0\u4f9b\u70ed\u91cf\u7ba1\u7406\u529f\u80fd\u3002\n\nSchneider Electric ProClima 8.0.0\u4e4b\u524d\u7248\u672c\u4e2d\u5b58\u5728\u4ee3\u7801\u6ce8\u5165\u6f0f\u6d1e\u3002\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u5916\u90e8\u8f93\u5165\u6570\u636e\u6784\u9020\u4ee3\u7801\u6bb5\u7684\u8fc7\u7a0b\u4e2d\uff0c\u7f51\u7edc\u7cfb\u7edf\u6216\u4ea7\u54c1\u672a\u6b63\u786e\u8fc7\u6ee4\u5176\u4e2d\u7684\u7279\u6b8a\u5143\u7d20\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u751f\u6210\u975e\u6cd5\u7684\u4ee3\u7801\u6bb5\uff0c\u4fee\u6539\u7f51\u7edc\u7cfb\u7edf\u6216\u7ec4\u4ef6\u7684\u9884\u671f\u7684\u6267\u884c\u63a7\u5236\u6d41\u3002", "discovererName": "unKnow", "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://www.schneider-electric.com/en/product-range-download/2560-proclima/#tabs-top", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2019-23346", "openTime": "2019-07-19", "patchDescription": "ProClima\u662fSchneider Electric\u63a8\u51fa\u7684\u4e00\u6b3e\u70ed\u8ba1\u7b97\u8f6f\u4ef6\uff0c\u53ef\u7528\u4e8e\u786e\u5b9a\u63a7\u5236\u9762\u677f\u7684\u6700\u4f73\u6563\u70ed\u89e3\u51b3\u65b9\u6848\u3002\nProClima 8.0.0\u4e4b\u524d\u7248\u672c\u5b58\u5728\u4ee3\u7801\u6ce8\u5165\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u672a\u8ba4\u8bc1\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5728\u76ee\u6807\u7cfb\u7edf\u4e0a\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "ProClima\u4ee3\u7801\u6ce8\u5165\u6f0f\u6d1e\u7684\u8865\u4e01", "products": { "product": "Schneider Electric ProClima \u003c8.0.0" }, "referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2019-6823", "serverity": "\u9ad8", "submitTime": "2019-07-16", "title": "ProClima\u4ee3\u7801\u6ce8\u5165\u6f0f\u6d1e" }
ghsa-7w73-hxcj-rf46
Vulnerability from github
A CWE-94: Code Injection vulnerability exists in ProClima (all versions prior to version 8.0.0) which could allow an unauthenticated, remote attacker to execute arbitrary code on the targeted system in all versions of ProClima prior to version 8.0.0.
{ "affected": [], "aliases": [ "CVE-2019-6823" ], "database_specific": { "cwe_ids": [ "CWE-94" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2019-07-15T21:15:00Z", "severity": "CRITICAL" }, "details": "A CWE-94: Code Injection vulnerability exists in ProClima (all versions prior to version 8.0.0) which could allow an unauthenticated, remote attacker to execute arbitrary code on the targeted system in all versions of ProClima prior to version 8.0.0.", "id": "GHSA-7w73-hxcj-rf46", "modified": "2022-10-14T12:00:19Z", "published": "2022-05-24T16:50:25Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-6823" }, { "type": "WEB", "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-162-01" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
var-201907-0068
Vulnerability from variot
A CWE-94: Code Injection vulnerability exists in ProClima (all versions prior to version 8.0.0) which could allow an unauthenticated, remote attacker to execute arbitrary code on the targeted system in all versions of ProClima prior to version 8.0.0. ProClima Contains a code injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Schneider Electric ProClima is a set of heat calculation software from Schneider Electric, France. This software provides thermal management functions for the environment and electrical/electronic equipment installed in the control panel by analyzing specified thermal data. This vulnerability stems from the fact that the network system or product does not correctly filter special elements in the process of constructing code segments from external input data. Attackers can exploit this vulnerability to generate illegal code segments and modify the expected execution control flow of network systems or components
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201907-0068", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "proclima", "scope": "lt", "trust": 1.8, "vendor": "schneider electric", "version": "8.0.0" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-006405" }, { "db": "NVD", "id": "CVE-2019-6823" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:schneider_electric:proclima", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-006405" } ] }, "cve": "CVE-2019-6823", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2019-6823", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-158258", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2019-6823", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-6823", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-6823", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2019-6823", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-201907-780", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-158258", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2019-6823", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-158258" }, { "db": "VULMON", "id": "CVE-2019-6823" }, { "db": "JVNDB", "id": "JVNDB-2019-006405" }, { "db": "CNNVD", "id": "CNNVD-201907-780" }, { "db": "NVD", "id": "CVE-2019-6823" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A CWE-94: Code Injection vulnerability exists in ProClima (all versions prior to version 8.0.0) which could allow an unauthenticated, remote attacker to execute arbitrary code on the targeted system in all versions of ProClima prior to version 8.0.0. ProClima Contains a code injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Schneider Electric ProClima is a set of heat calculation software from Schneider Electric, France. This software provides thermal management functions for the environment and electrical/electronic equipment installed in the control panel by analyzing specified thermal data. This vulnerability stems from the fact that the network system or product does not correctly filter special elements in the process of constructing code segments from external input data. Attackers can exploit this vulnerability to generate illegal code segments and modify the expected execution control flow of network systems or components", "sources": [ { "db": "NVD", "id": "CVE-2019-6823" }, { "db": "JVNDB", "id": "JVNDB-2019-006405" }, { "db": "VULHUB", "id": "VHN-158258" }, { "db": "VULMON", "id": "CVE-2019-6823" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-6823", "trust": 2.6 }, { "db": "SCHNEIDER", "id": "SEVD-2019-162-01", "trust": 1.8 }, { "db": "ICS CERT", "id": "ICSA-19-295-01", "trust": 1.4 }, { "db": "JVNDB", "id": "JVNDB-2019-006405", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201907-780", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-158258", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2019-6823", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-158258" }, { "db": "VULMON", "id": "CVE-2019-6823" }, { "db": "JVNDB", "id": "JVNDB-2019-006405" }, { "db": "CNNVD", "id": "CNNVD-201907-780" }, { "db": "NVD", "id": "CVE-2019-6823" } ] }, "id": "VAR-201907-0068", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-158258" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T22:06:09.233000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SEVD-2019-162-01", "trust": 0.8, "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-162-01/" }, { "title": "Schneider Electric ProClima Fixes for code injection vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=95256" }, { "title": "", "trust": 0.1, "url": "https://github.com/Live-Hack-CVE/CVE-2019-6823 " } ], "sources": [ { "db": "VULMON", "id": "CVE-2019-6823" }, { "db": "JVNDB", "id": "JVNDB-2019-006405" }, { "db": "CNNVD", "id": "CNNVD-201907-780" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-94", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-158258" }, { "db": "JVNDB", "id": "JVNDB-2019-006405" }, { "db": "NVD", "id": "CVE-2019-6823" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://www.schneider-electric.com/en/download/document/sevd-2019-162-01/" }, { "trust": 1.4, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-295-01" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-6823" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-6823" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/94.html" }, { "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2019-6823" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-158258" }, { "db": "VULMON", "id": "CVE-2019-6823" }, { "db": "JVNDB", "id": "JVNDB-2019-006405" }, { "db": "CNNVD", "id": "CNNVD-201907-780" }, { "db": "NVD", "id": "CVE-2019-6823" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-158258" }, { "db": "VULMON", "id": "CVE-2019-6823" }, { "db": "JVNDB", "id": "JVNDB-2019-006405" }, { "db": "CNNVD", "id": "CNNVD-201907-780" }, { "db": "NVD", "id": "CVE-2019-6823" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-07-15T00:00:00", "db": "VULHUB", "id": "VHN-158258" }, { "date": "2019-07-15T00:00:00", "db": "VULMON", "id": "CVE-2019-6823" }, { "date": "2019-07-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-006405" }, { "date": "2019-07-15T00:00:00", "db": "CNNVD", "id": "CNNVD-201907-780" }, { "date": "2019-07-15T21:15:10.663000", "db": "NVD", "id": "CVE-2019-6823" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-10-09T00:00:00", "db": "VULHUB", "id": "VHN-158258" }, { "date": "2022-10-14T00:00:00", "db": "VULMON", "id": "CVE-2019-6823" }, { "date": "2019-10-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-006405" }, { "date": "2019-10-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201907-780" }, { "date": "2024-11-21T04:47:13.460000", "db": "NVD", "id": "CVE-2019-6823" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201907-780" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ProClima Code injection vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-006405" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-201907-780" } ], "trust": 0.6 } }
fkie_cve-2019-6823
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
schneider-electric | proclima | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:schneider-electric:proclima:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C7BB1CA-CCED-4EC9-81F4-16633561E4CF", "versionEndExcluding": "8.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A CWE-94: Code Injection vulnerability exists in ProClima (all versions prior to version 8.0.0) which could allow an unauthenticated, remote attacker to execute arbitrary code on the targeted system in all versions of ProClima prior to version 8.0.0." }, { "lang": "es", "value": "Una CWE-94: existe una vulnerabilidad de inyecci\u00f3n de c\u00f3digo en ProClima (todas las versiones anteriores a la versi\u00f3n 8.0.0) que podr\u00eda permitir que un atacante remoto no autenticado ejecute c\u00f3digo arbitrario en el sistema objetivo en todas las versiones de ProClima anteriores a la versi\u00f3n 8.0.0." } ], "id": "CVE-2019-6823", "lastModified": "2024-11-21T04:47:13.460", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-07-15T21:15:10.663", "references": [ { "source": "cybersecurity@se.com", "tags": [ "Vendor Advisory" ], "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-162-01/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-162-01/" } ], "sourceIdentifier": "cybersecurity@se.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "cybersecurity@se.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.