Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2019-6824 (GCVE-0-2019-6824)
Vulnerability from cvelistv5
- CWE-119 - Buffer Errors
Vendor | Product | Version | ||
---|---|---|---|---|
ProClima | ProClima all versions prior to version 8.0.0 |
Version: ProClima all versions prior to version 8.0.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:31:04.436Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-162-01/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ProClima all versions prior to version 8.0.0", "vendor": "ProClima", "versions": [ { "status": "affected", "version": "ProClima all versions prior to version 8.0.0" } ] } ], "datePublic": "2019-06-11T00:00:00", "descriptions": [ { "lang": "en", "value": "A CWE-119: Buffer Errors vulnerability exists in ProClima (all versions prior to version 8.0.0) which allows an unauthenticated, remote attacker to execute arbitrary code on the targeted system in all versions of ProClima prior to version 8.0.0." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119: Buffer Errors", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-07-15T20:44:14", "orgId": "076d1eb6-cfab-4401-b34d-6dfc2a413bdb", "shortName": "schneider" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-162-01/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cybersecurity@schneider-electric.com", "ID": "CVE-2019-6824", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ProClima all versions prior to version 8.0.0", "version": { "version_data": [ { "version_value": "ProClima all versions prior to version 8.0.0" } ] } } ] }, "vendor_name": "ProClima" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A CWE-119: Buffer Errors vulnerability exists in ProClima (all versions prior to version 8.0.0) which allows an unauthenticated, remote attacker to execute arbitrary code on the targeted system in all versions of ProClima prior to version 8.0.0." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-119: Buffer Errors" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.schneider-electric.com/en/download/document/SEVD-2019-162-01/", "refsource": "MISC", "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-162-01/" } ] } } } }, "cveMetadata": { "assignerOrgId": "076d1eb6-cfab-4401-b34d-6dfc2a413bdb", "assignerShortName": "schneider", "cveId": "CVE-2019-6824", "datePublished": "2019-07-15T20:44:14", "dateReserved": "2019-01-25T00:00:00", "dateUpdated": "2024-08-04T20:31:04.436Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2019-6824\",\"sourceIdentifier\":\"cybersecurity@se.com\",\"published\":\"2019-07-15T21:15:10.727\",\"lastModified\":\"2024-11-21T04:47:13.570\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A CWE-119: Buffer Errors vulnerability exists in ProClima (all versions prior to version 8.0.0) which allows an unauthenticated, remote attacker to execute arbitrary code on the targeted system in all versions of ProClima prior to version 8.0.0.\"},{\"lang\":\"es\",\"value\":\"Una CWE-119: Se presenta una vulnerabilidad de Errores de b\u00fafer en ProClima (todas las versiones anteriores a la versi\u00f3n 8.0.0), que permite a un atacante remoto no autenticado ejecutar c\u00f3digo arbitrario en el sistema de destino en todas las versiones de ProClima anteriores a la versi\u00f3n 8.0.0.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"cybersecurity@se.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:schneider-electric:proclima:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.0.0\",\"matchCriteriaId\":\"1C7BB1CA-CCED-4EC9-81F4-16633561E4CF\"}]}]}],\"references\":[{\"url\":\"https://www.schneider-electric.com/en/download/document/SEVD-2019-162-01/\",\"source\":\"cybersecurity@se.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.schneider-electric.com/en/download/document/SEVD-2019-162-01/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
ICSA-19-295-01
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "names": [ "Haojun Hou" ], "summary": "reporting a vulnerability to CISA" }, { "names": [ "Kushal Arvind Shah" ], "organization": "Fortinet", "summary": "reporting vulnerabilities to Schneider Electric" }, { "names": [ "Yongjun Liu" ], "organization": "NSFOCUS security team", "summary": "reporting vulnerabilities to Schneider Electric" }, { "organization": "Telus", "summary": "reporting vulnerabilities to Schneider Electric" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "summary", "text": "Haojun Hou reported a vulnerability to CISA. Kushal Arvind Shah of Fortinet,Yongjun Liu of NSFOCUS security team, and Telus reported vulnerabilities to Schneider Electric.", "title": "Summary" }, { "category": "other", "text": "No known public exploits specifically target these vulnerabilities.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "CISAservicedesk@cisa.dhs.gov", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-19-295-01 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2019/icsa-19-295-01.json" }, { "category": "self", "summary": "ICS Advisory ICSA-19-295-01 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-19-295-01" } ], "title": "ICSA-19-295-01_Schneider Electric ProClima", "tracking": { "current_release_date": "2019-10-22T00:00:00.000000Z", "generator": { "engine": { "name": "CISA USCert CSAF Generator", "version": "1" } }, "id": "ICSA-19-295-01", "initial_release_date": "2019-10-22T00:00:00.000000Z", "revision_history": [ { "date": "2019-10-22T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-19-295-01 Schneider Electric ProClima" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c 8.0.0", "product": { "name": "ProClima: all versions prior to 8.0.0", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "ProClima" } ], "category": "vendor", "name": "Schneider Electric Software, LLC" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-6823", "cwe": { "id": "CWE-427", "name": "Uncontrolled Search Path Element" }, "notes": [ { "category": "summary", "text": "A code injection vulnerability could allow an unauthenticated, remote attacker to execute arbitrary code on the targeted system.CVE-2019-6823 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Schneider Electric has released Version 8.0.0 of ProClima and recommends users upgrade to this version or newer. ", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.schneider-electric.com/en/product-range-download/2560-proclima/#tabs-top" }, { "category": "mitigation", "details": "For more information on these vulnerabilities and the associated upgrade, please see Schneider Electric\u0027s SEVD-2019-162-01", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-162-01/" }, { "category": "mitigation", "details": "Locate control and safety system networks and remote devices behind firewalls and isolate them from the business network.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Physical controls should be in place so no unauthorized person has access to the ICS and safety controllers, peripheral equipment, or the ICS and safety networks.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "All controllers should reside in locked cabinets and never be left in \u201cProgram\u201d mode.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "All programming software should be kept in locked cabinets and should never be connected to any network other than the network for devices intended.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "All methods of mobile data exchange with the isolated network, such as CDs, USB drives, etc., should be scanned before use in the terminals or any node connected to these networks.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Laptops that have connected to any other network besides the intended network should never be allowed to connect to the safety or control networks without proper sanitation.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Minimize network exposure for all control system devices and/or systems and ensure they are not accessible from the Internet.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "When remote access is required, use secure methods, such as virtual private networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize that VPN is only as secure as the connected devices.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "For further information related to cybersecurity in Schneider Electric\u0027s products, please visit the company\u0027s cybersecurity webpage", "product_ids": [ "CSAFPID-0001" ], "url": "http://www2.schneider-electric.com/sites/corporate/en/support/cybersecurity/cybersecurity.page" }, { "category": "mitigation", "details": "If you require additional support, Schneider Electric Industrial Cybersecurity Services team is available to help. Please visit", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.schneider-electric.com/en/work/services/field-services/industrial-automation/industrial-cybersecurity/industrial-cybersecurity.jsp" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-6823" }, { "cve": "CVE-2019-6824", "cwe": { "id": "CWE-427", "name": "Uncontrolled Search Path Element" }, "notes": [ { "category": "summary", "text": "A buffer error vulnerability could allow an unauthenticated, remote attacker to execute arbitrary code on the targeted system.CVE-2019-6824 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Schneider Electric has released Version 8.0.0 of ProClima and recommends users upgrade to this version or newer. ", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.schneider-electric.com/en/product-range-download/2560-proclima/#tabs-top" }, { "category": "mitigation", "details": "For more information on these vulnerabilities and the associated upgrade, please see Schneider Electric\u0027s SEVD-2019-162-01", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-162-01/" }, { "category": "mitigation", "details": "Locate control and safety system networks and remote devices behind firewalls and isolate them from the business network.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Physical controls should be in place so no unauthorized person has access to the ICS and safety controllers, peripheral equipment, or the ICS and safety networks.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "All controllers should reside in locked cabinets and never be left in \u201cProgram\u201d mode.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "All programming software should be kept in locked cabinets and should never be connected to any network other than the network for devices intended.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "All methods of mobile data exchange with the isolated network, such as CDs, USB drives, etc., should be scanned before use in the terminals or any node connected to these networks.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Laptops that have connected to any other network besides the intended network should never be allowed to connect to the safety or control networks without proper sanitation.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Minimize network exposure for all control system devices and/or systems and ensure they are not accessible from the Internet.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "When remote access is required, use secure methods, such as virtual private networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize that VPN is only as secure as the connected devices.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "For further information related to cybersecurity in Schneider Electric\u0027s products, please visit the company\u0027s cybersecurity webpage", "product_ids": [ "CSAFPID-0001" ], "url": "http://www2.schneider-electric.com/sites/corporate/en/support/cybersecurity/cybersecurity.page" }, { "category": "mitigation", "details": "If you require additional support, Schneider Electric Industrial Cybersecurity Services team is available to help. Please visit", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.schneider-electric.com/en/work/services/field-services/industrial-automation/industrial-cybersecurity/industrial-cybersecurity.jsp" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-6824" }, { "cve": "CVE-2019-6825", "cwe": { "id": "CWE-427", "name": "Uncontrolled Search Path Element" }, "notes": [ { "category": "summary", "text": "An uncontrolled search path element vulnerability could allow a malicious DLL file with the same name of any resident DLLs inside the software installation to execute arbitrary code.CVE-2019-6825 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Schneider Electric has released Version 8.0.0 of ProClima and recommends users upgrade to this version or newer. ", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.schneider-electric.com/en/product-range-download/2560-proclima/#tabs-top" }, { "category": "mitigation", "details": "For more information on these vulnerabilities and the associated upgrade, please see Schneider Electric\u0027s SEVD-2019-162-01", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-162-01/" }, { "category": "mitigation", "details": "Locate control and safety system networks and remote devices behind firewalls and isolate them from the business network.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Physical controls should be in place so no unauthorized person has access to the ICS and safety controllers, peripheral equipment, or the ICS and safety networks.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "All controllers should reside in locked cabinets and never be left in \u201cProgram\u201d mode.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "All programming software should be kept in locked cabinets and should never be connected to any network other than the network for devices intended.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "All methods of mobile data exchange with the isolated network, such as CDs, USB drives, etc., should be scanned before use in the terminals or any node connected to these networks.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Laptops that have connected to any other network besides the intended network should never be allowed to connect to the safety or control networks without proper sanitation.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Minimize network exposure for all control system devices and/or systems and ensure they are not accessible from the Internet.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "When remote access is required, use secure methods, such as virtual private networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize that VPN is only as secure as the connected devices.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "For further information related to cybersecurity in Schneider Electric\u0027s products, please visit the company\u0027s cybersecurity webpage", "product_ids": [ "CSAFPID-0001" ], "url": "http://www2.schneider-electric.com/sites/corporate/en/support/cybersecurity/cybersecurity.page" }, { "category": "mitigation", "details": "If you require additional support, Schneider Electric Industrial Cybersecurity Services team is available to help. Please visit", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.schneider-electric.com/en/work/services/field-services/industrial-automation/industrial-cybersecurity/industrial-cybersecurity.jsp" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-6825" } ] }
icsa-19-295-01
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "names": [ "Haojun Hou" ], "summary": "reporting a vulnerability to CISA" }, { "names": [ "Kushal Arvind Shah" ], "organization": "Fortinet", "summary": "reporting vulnerabilities to Schneider Electric" }, { "names": [ "Yongjun Liu" ], "organization": "NSFOCUS security team", "summary": "reporting vulnerabilities to Schneider Electric" }, { "organization": "Telus", "summary": "reporting vulnerabilities to Schneider Electric" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "summary", "text": "Haojun Hou reported a vulnerability to CISA. Kushal Arvind Shah of Fortinet,Yongjun Liu of NSFOCUS security team, and Telus reported vulnerabilities to Schneider Electric.", "title": "Summary" }, { "category": "other", "text": "No known public exploits specifically target these vulnerabilities.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "CISAservicedesk@cisa.dhs.gov", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-19-295-01 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2019/icsa-19-295-01.json" }, { "category": "self", "summary": "ICS Advisory ICSA-19-295-01 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-19-295-01" } ], "title": "ICSA-19-295-01_Schneider Electric ProClima", "tracking": { "current_release_date": "2019-10-22T00:00:00.000000Z", "generator": { "engine": { "name": "CISA USCert CSAF Generator", "version": "1" } }, "id": "ICSA-19-295-01", "initial_release_date": "2019-10-22T00:00:00.000000Z", "revision_history": [ { "date": "2019-10-22T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-19-295-01 Schneider Electric ProClima" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c 8.0.0", "product": { "name": "ProClima: all versions prior to 8.0.0", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "ProClima" } ], "category": "vendor", "name": "Schneider Electric Software, LLC" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-6823", "cwe": { "id": "CWE-427", "name": "Uncontrolled Search Path Element" }, "notes": [ { "category": "summary", "text": "A code injection vulnerability could allow an unauthenticated, remote attacker to execute arbitrary code on the targeted system.CVE-2019-6823 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Schneider Electric has released Version 8.0.0 of ProClima and recommends users upgrade to this version or newer. ", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.schneider-electric.com/en/product-range-download/2560-proclima/#tabs-top" }, { "category": "mitigation", "details": "For more information on these vulnerabilities and the associated upgrade, please see Schneider Electric\u0027s SEVD-2019-162-01", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-162-01/" }, { "category": "mitigation", "details": "Locate control and safety system networks and remote devices behind firewalls and isolate them from the business network.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Physical controls should be in place so no unauthorized person has access to the ICS and safety controllers, peripheral equipment, or the ICS and safety networks.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "All controllers should reside in locked cabinets and never be left in \u201cProgram\u201d mode.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "All programming software should be kept in locked cabinets and should never be connected to any network other than the network for devices intended.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "All methods of mobile data exchange with the isolated network, such as CDs, USB drives, etc., should be scanned before use in the terminals or any node connected to these networks.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Laptops that have connected to any other network besides the intended network should never be allowed to connect to the safety or control networks without proper sanitation.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Minimize network exposure for all control system devices and/or systems and ensure they are not accessible from the Internet.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "When remote access is required, use secure methods, such as virtual private networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize that VPN is only as secure as the connected devices.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "For further information related to cybersecurity in Schneider Electric\u0027s products, please visit the company\u0027s cybersecurity webpage", "product_ids": [ "CSAFPID-0001" ], "url": "http://www2.schneider-electric.com/sites/corporate/en/support/cybersecurity/cybersecurity.page" }, { "category": "mitigation", "details": "If you require additional support, Schneider Electric Industrial Cybersecurity Services team is available to help. Please visit", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.schneider-electric.com/en/work/services/field-services/industrial-automation/industrial-cybersecurity/industrial-cybersecurity.jsp" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-6823" }, { "cve": "CVE-2019-6824", "cwe": { "id": "CWE-427", "name": "Uncontrolled Search Path Element" }, "notes": [ { "category": "summary", "text": "A buffer error vulnerability could allow an unauthenticated, remote attacker to execute arbitrary code on the targeted system.CVE-2019-6824 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Schneider Electric has released Version 8.0.0 of ProClima and recommends users upgrade to this version or newer. ", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.schneider-electric.com/en/product-range-download/2560-proclima/#tabs-top" }, { "category": "mitigation", "details": "For more information on these vulnerabilities and the associated upgrade, please see Schneider Electric\u0027s SEVD-2019-162-01", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-162-01/" }, { "category": "mitigation", "details": "Locate control and safety system networks and remote devices behind firewalls and isolate them from the business network.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Physical controls should be in place so no unauthorized person has access to the ICS and safety controllers, peripheral equipment, or the ICS and safety networks.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "All controllers should reside in locked cabinets and never be left in \u201cProgram\u201d mode.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "All programming software should be kept in locked cabinets and should never be connected to any network other than the network for devices intended.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "All methods of mobile data exchange with the isolated network, such as CDs, USB drives, etc., should be scanned before use in the terminals or any node connected to these networks.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Laptops that have connected to any other network besides the intended network should never be allowed to connect to the safety or control networks without proper sanitation.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Minimize network exposure for all control system devices and/or systems and ensure they are not accessible from the Internet.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "When remote access is required, use secure methods, such as virtual private networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize that VPN is only as secure as the connected devices.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "For further information related to cybersecurity in Schneider Electric\u0027s products, please visit the company\u0027s cybersecurity webpage", "product_ids": [ "CSAFPID-0001" ], "url": "http://www2.schneider-electric.com/sites/corporate/en/support/cybersecurity/cybersecurity.page" }, { "category": "mitigation", "details": "If you require additional support, Schneider Electric Industrial Cybersecurity Services team is available to help. Please visit", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.schneider-electric.com/en/work/services/field-services/industrial-automation/industrial-cybersecurity/industrial-cybersecurity.jsp" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-6824" }, { "cve": "CVE-2019-6825", "cwe": { "id": "CWE-427", "name": "Uncontrolled Search Path Element" }, "notes": [ { "category": "summary", "text": "An uncontrolled search path element vulnerability could allow a malicious DLL file with the same name of any resident DLLs inside the software installation to execute arbitrary code.CVE-2019-6825 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Schneider Electric has released Version 8.0.0 of ProClima and recommends users upgrade to this version or newer. ", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.schneider-electric.com/en/product-range-download/2560-proclima/#tabs-top" }, { "category": "mitigation", "details": "For more information on these vulnerabilities and the associated upgrade, please see Schneider Electric\u0027s SEVD-2019-162-01", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-162-01/" }, { "category": "mitigation", "details": "Locate control and safety system networks and remote devices behind firewalls and isolate them from the business network.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Physical controls should be in place so no unauthorized person has access to the ICS and safety controllers, peripheral equipment, or the ICS and safety networks.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "All controllers should reside in locked cabinets and never be left in \u201cProgram\u201d mode.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "All programming software should be kept in locked cabinets and should never be connected to any network other than the network for devices intended.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "All methods of mobile data exchange with the isolated network, such as CDs, USB drives, etc., should be scanned before use in the terminals or any node connected to these networks.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Laptops that have connected to any other network besides the intended network should never be allowed to connect to the safety or control networks without proper sanitation.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Minimize network exposure for all control system devices and/or systems and ensure they are not accessible from the Internet.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "When remote access is required, use secure methods, such as virtual private networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize that VPN is only as secure as the connected devices.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "For further information related to cybersecurity in Schneider Electric\u0027s products, please visit the company\u0027s cybersecurity webpage", "product_ids": [ "CSAFPID-0001" ], "url": "http://www2.schneider-electric.com/sites/corporate/en/support/cybersecurity/cybersecurity.page" }, { "category": "mitigation", "details": "If you require additional support, Schneider Electric Industrial Cybersecurity Services team is available to help. Please visit", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.schneider-electric.com/en/work/services/field-services/industrial-automation/industrial-cybersecurity/industrial-cybersecurity.jsp" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-6825" } ] }
fkie_cve-2019-6824
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
schneider-electric | proclima | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:schneider-electric:proclima:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C7BB1CA-CCED-4EC9-81F4-16633561E4CF", "versionEndExcluding": "8.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A CWE-119: Buffer Errors vulnerability exists in ProClima (all versions prior to version 8.0.0) which allows an unauthenticated, remote attacker to execute arbitrary code on the targeted system in all versions of ProClima prior to version 8.0.0." }, { "lang": "es", "value": "Una CWE-119: Se presenta una vulnerabilidad de Errores de b\u00fafer en ProClima (todas las versiones anteriores a la versi\u00f3n 8.0.0), que permite a un atacante remoto no autenticado ejecutar c\u00f3digo arbitrario en el sistema de destino en todas las versiones de ProClima anteriores a la versi\u00f3n 8.0.0." } ], "id": "CVE-2019-6824", "lastModified": "2024-11-21T04:47:13.570", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-07-15T21:15:10.727", "references": [ { "source": "cybersecurity@se.com", "tags": [ "Vendor Advisory" ], "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-162-01/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-162-01/" } ], "sourceIdentifier": "cybersecurity@se.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "cybersecurity@se.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cnvd-2019-23784
Vulnerability from cnvd
Title: ProClima缓冲区溢出漏洞
Description:
Schneider Electric ProClima是法国施耐德电气(Schneider Electric)公司的一套热量计算软件。该软件通过分析指定的热量数据,为控制面板内安装的环境和电气/电子设备提供热量管理功能。
Schneider Electric ProClima 8.0.0之前版本中存在缓冲区溢出漏洞。该漏洞源于网络系统或产品在内存上执行操作时,未正确验证数据边界,导致向关联的其他内存位置上执行了错误的读写操作。攻击者可利用该漏洞导致缓冲区溢出或堆溢出等。
Severity: 高
Patch Name: ProClima缓冲区错误漏洞的补丁
Patch Description:
ProClima是Schneider Electric推出的一款热计算软件,可用于确定控制面板的最佳散热解决方案。 ProClima 8.0.0之前版本存在缓冲区错误漏洞。远程未认证攻击者可利用该漏洞在目标系统上执行任意代码。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
厂商已发布了漏洞修复程序,请及时关注更新: https://www.schneider-electric.com/en/product-range-download/2560-proclima/#tabs-top
Reference: https://nvd.nist.gov/vuln/detail/CVE-2019-6824
Name | Schneider Electric ProClima <8.0.0 |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2019-6824", "cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2019-6824" } }, "description": "Schneider Electric ProClima\u662f\u6cd5\u56fd\u65bd\u8010\u5fb7\u7535\u6c14\uff08Schneider Electric\uff09\u516c\u53f8\u7684\u4e00\u5957\u70ed\u91cf\u8ba1\u7b97\u8f6f\u4ef6\u3002\u8be5\u8f6f\u4ef6\u901a\u8fc7\u5206\u6790\u6307\u5b9a\u7684\u70ed\u91cf\u6570\u636e\uff0c\u4e3a\u63a7\u5236\u9762\u677f\u5185\u5b89\u88c5\u7684\u73af\u5883\u548c\u7535\u6c14/\u7535\u5b50\u8bbe\u5907\u63d0\u4f9b\u70ed\u91cf\u7ba1\u7406\u529f\u80fd\u3002\n\nSchneider Electric ProClima 8.0.0\u4e4b\u524d\u7248\u672c\u4e2d\u5b58\u5728\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\u3002\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7f51\u7edc\u7cfb\u7edf\u6216\u4ea7\u54c1\u5728\u5185\u5b58\u4e0a\u6267\u884c\u64cd\u4f5c\u65f6\uff0c\u672a\u6b63\u786e\u9a8c\u8bc1\u6570\u636e\u8fb9\u754c\uff0c\u5bfc\u81f4\u5411\u5173\u8054\u7684\u5176\u4ed6\u5185\u5b58\u4f4d\u7f6e\u4e0a\u6267\u884c\u4e86\u9519\u8bef\u7684\u8bfb\u5199\u64cd\u4f5c\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u7f13\u51b2\u533a\u6ea2\u51fa\u6216\u5806\u6ea2\u51fa\u7b49\u3002", "discovererName": "unKnow", "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://www.schneider-electric.com/en/product-range-download/2560-proclima/#tabs-top", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2019-23784", "openTime": "2019-07-23", "patchDescription": "ProClima\u662fSchneider Electric\u63a8\u51fa\u7684\u4e00\u6b3e\u70ed\u8ba1\u7b97\u8f6f\u4ef6\uff0c\u53ef\u7528\u4e8e\u786e\u5b9a\u63a7\u5236\u9762\u677f\u7684\u6700\u4f73\u6563\u70ed\u89e3\u51b3\u65b9\u6848\u3002\nProClima 8.0.0\u4e4b\u524d\u7248\u672c\u5b58\u5728\u7f13\u51b2\u533a\u9519\u8bef\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u672a\u8ba4\u8bc1\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5728\u76ee\u6807\u7cfb\u7edf\u4e0a\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "ProClima\u7f13\u51b2\u533a\u9519\u8bef\u6f0f\u6d1e\u7684\u8865\u4e01", "products": { "product": "Schneider Electric ProClima \u003c8.0.0" }, "referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2019-6824", "serverity": "\u9ad8", "submitTime": "2019-07-16", "title": "ProClima\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e" }
ghsa-9763-m8h5-r3wc
Vulnerability from github
A CWE-119: Buffer Errors vulnerability exists in ProClima (all versions prior to version 8.0.0) which allows an unauthenticated, remote attacker to execute arbitrary code on the targeted system in all versions of ProClima prior to version 8.0.0.
{ "affected": [], "aliases": [ "CVE-2019-6824" ], "database_specific": { "cwe_ids": [ "CWE-119" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2019-07-15T21:15:00Z", "severity": "CRITICAL" }, "details": "A CWE-119: Buffer Errors vulnerability exists in ProClima (all versions prior to version 8.0.0) which allows an unauthenticated, remote attacker to execute arbitrary code on the targeted system in all versions of ProClima prior to version 8.0.0.", "id": "GHSA-9763-m8h5-r3wc", "modified": "2022-10-14T12:00:19Z", "published": "2022-05-24T16:50:25Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-6824" }, { "type": "WEB", "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-162-01" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
var-201907-0069
Vulnerability from variot
A CWE-119: Buffer Errors vulnerability exists in ProClima (all versions prior to version 8.0.0) which allows an unauthenticated, remote attacker to execute arbitrary code on the targeted system in all versions of ProClima prior to version 8.0.0. ProClima Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Schneider Electric ProClima is a set of heat calculation software from Schneider Electric, France. This software provides thermal management functions for the environment and electrical/electronic equipment installed in the control panel by analyzing specified thermal data. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations. Attackers can exploit this vulnerability to cause buffer overflow or heap overflow, etc
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201907-0069", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "proclima", "scope": "lt", "trust": 1.8, "vendor": "schneider electric", "version": "8.0.0" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-006406" }, { "db": "NVD", "id": "CVE-2019-6824" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:schneider_electric:proclima", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-006406" } ] }, "cve": "CVE-2019-6824", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2019-6824", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-158259", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2019-6824", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-6824", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-6824", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2019-6824", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-201907-781", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-158259", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2019-6824", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-158259" }, { "db": "VULMON", "id": "CVE-2019-6824" }, { "db": "JVNDB", "id": "JVNDB-2019-006406" }, { "db": "CNNVD", "id": "CNNVD-201907-781" }, { "db": "NVD", "id": "CVE-2019-6824" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A CWE-119: Buffer Errors vulnerability exists in ProClima (all versions prior to version 8.0.0) which allows an unauthenticated, remote attacker to execute arbitrary code on the targeted system in all versions of ProClima prior to version 8.0.0. ProClima Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Schneider Electric ProClima is a set of heat calculation software from Schneider Electric, France. This software provides thermal management functions for the environment and electrical/electronic equipment installed in the control panel by analyzing specified thermal data. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations. Attackers can exploit this vulnerability to cause buffer overflow or heap overflow, etc", "sources": [ { "db": "NVD", "id": "CVE-2019-6824" }, { "db": "JVNDB", "id": "JVNDB-2019-006406" }, { "db": "VULHUB", "id": "VHN-158259" }, { "db": "VULMON", "id": "CVE-2019-6824" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-6824", "trust": 2.6 }, { "db": "SCHNEIDER", "id": "SEVD-2019-162-01", "trust": 1.8 }, { "db": "ICS CERT", "id": "ICSA-19-295-01", "trust": 1.4 }, { "db": "JVNDB", "id": "JVNDB-2019-006406", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201907-781", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-158259", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2019-6824", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-158259" }, { "db": "VULMON", "id": "CVE-2019-6824" }, { "db": "JVNDB", "id": "JVNDB-2019-006406" }, { "db": "CNNVD", "id": "CNNVD-201907-781" }, { "db": "NVD", "id": "CVE-2019-6824" } ] }, "id": "VAR-201907-0069", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-158259" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T22:06:09.292000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SEVD-2019-162-01", "trust": 0.8, "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-162-01/" }, { "title": "Schneider Electric ProClima Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=95257" }, { "title": "", "trust": 0.1, "url": "https://github.com/Live-Hack-CVE/CVE-2019-6824 " } ], "sources": [ { "db": "VULMON", "id": "CVE-2019-6824" }, { "db": "JVNDB", "id": "JVNDB-2019-006406" }, { "db": "CNNVD", "id": "CNNVD-201907-781" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-158259" }, { "db": "JVNDB", "id": "JVNDB-2019-006406" }, { "db": "NVD", "id": "CVE-2019-6824" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://www.schneider-electric.com/en/download/document/sevd-2019-162-01/" }, { "trust": 1.4, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-295-01" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-6824" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-6824" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2019-6824" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-158259" }, { "db": "VULMON", "id": "CVE-2019-6824" }, { "db": "JVNDB", "id": "JVNDB-2019-006406" }, { "db": "CNNVD", "id": "CNNVD-201907-781" }, { "db": "NVD", "id": "CVE-2019-6824" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-158259" }, { "db": "VULMON", "id": "CVE-2019-6824" }, { "db": "JVNDB", "id": "JVNDB-2019-006406" }, { "db": "CNNVD", "id": "CNNVD-201907-781" }, { "db": "NVD", "id": "CVE-2019-6824" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-07-15T00:00:00", "db": "VULHUB", "id": "VHN-158259" }, { "date": "2019-07-15T00:00:00", "db": "VULMON", "id": "CVE-2019-6824" }, { "date": "2019-07-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-006406" }, { "date": "2019-07-15T00:00:00", "db": "CNNVD", "id": "CNNVD-201907-781" }, { "date": "2019-07-15T21:15:10.727000", "db": "NVD", "id": "CVE-2019-6824" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-10-09T00:00:00", "db": "VULHUB", "id": "VHN-158259" }, { "date": "2022-10-14T00:00:00", "db": "VULMON", "id": "CVE-2019-6824" }, { "date": "2019-10-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-006406" }, { "date": "2019-10-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201907-781" }, { "date": "2024-11-21T04:47:13.570000", "db": "NVD", "id": "CVE-2019-6824" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201907-781" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ProClima Buffer error vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-006406" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201907-781" } ], "trust": 0.6 } }
gsd-2019-6824
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2019-6824", "description": "A CWE-119: Buffer Errors vulnerability exists in ProClima (all versions prior to version 8.0.0) which allows an unauthenticated, remote attacker to execute arbitrary code on the targeted system in all versions of ProClima prior to version 8.0.0.", "id": "GSD-2019-6824" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2019-6824" ], "details": "A CWE-119: Buffer Errors vulnerability exists in ProClima (all versions prior to version 8.0.0) which allows an unauthenticated, remote attacker to execute arbitrary code on the targeted system in all versions of ProClima prior to version 8.0.0.", "id": "GSD-2019-6824", "modified": "2023-12-13T01:23:48.914559Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cybersecurity@schneider-electric.com", "ID": "CVE-2019-6824", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ProClima all versions prior to version 8.0.0", "version": { "version_data": [ { "version_value": "ProClima all versions prior to version 8.0.0" } ] } } ] }, "vendor_name": "ProClima" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A CWE-119: Buffer Errors vulnerability exists in ProClima (all versions prior to version 8.0.0) which allows an unauthenticated, remote attacker to execute arbitrary code on the targeted system in all versions of ProClima prior to version 8.0.0." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-119: Buffer Errors" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.schneider-electric.com/en/download/document/SEVD-2019-162-01/", "refsource": "MISC", "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-162-01/" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:schneider-electric:proclima:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "8.0.0", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cybersecurity@schneider-electric.com", "ID": "CVE-2019-6824" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "A CWE-119: Buffer Errors vulnerability exists in ProClima (all versions prior to version 8.0.0) which allows an unauthenticated, remote attacker to execute arbitrary code on the targeted system in all versions of ProClima prior to version 8.0.0." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.schneider-electric.com/en/download/document/SEVD-2019-162-01/", "refsource": "MISC", "tags": [ "Vendor Advisory" ], "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-162-01/" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9 } }, "lastModifiedDate": "2022-10-14T03:04Z", "publishedDate": "2019-07-15T21:15Z" } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.