Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2019-6826 (GCVE-0-2019-6826)
Vulnerability from cvelistv5
- CWE-426 - Untrusted Search Path
Vendor | Product | Version | ||
---|---|---|---|---|
Schneider Electric SE | SoMachine HVAC |
Version: v2.4.1 and earlier versions |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:31:04.358Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-225-04/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SoMachine HVAC", "vendor": "Schneider Electric SE", "versions": [ { "status": "affected", "version": "v2.4.1 and earlier versions" } ] } ], "descriptions": [ { "lang": "en", "value": "A CWE-426: Untrusted Search Path vulnerability exists in SoMachine HVAC v2.4.1 and earlier versions, which could cause arbitrary code execution on the system running SoMachine HVAC when a malicious DLL library is loaded by the product." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-426", "description": "CWE-426: Untrusted Search Path", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-09-17T19:57:55", "orgId": "076d1eb6-cfab-4401-b34d-6dfc2a413bdb", "shortName": "schneider" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-225-04/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cybersecurity@schneider-electric.com", "ID": "CVE-2019-6826", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SoMachine HVAC", "version": { "version_data": [ { "version_value": "v2.4.1 and earlier versions" } ] } } ] }, "vendor_name": "Schneider Electric SE" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A CWE-426: Untrusted Search Path vulnerability exists in SoMachine HVAC v2.4.1 and earlier versions, which could cause arbitrary code execution on the system running SoMachine HVAC when a malicious DLL library is loaded by the product." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-426: Untrusted Search Path" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.schneider-electric.com/en/download/document/SEVD-2019-225-04/", "refsource": "CONFIRM", "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-225-04/" } ] } } } }, "cveMetadata": { "assignerOrgId": "076d1eb6-cfab-4401-b34d-6dfc2a413bdb", "assignerShortName": "schneider", "cveId": "CVE-2019-6826", "datePublished": "2019-09-17T19:57:55", "dateReserved": "2019-01-25T00:00:00", "dateUpdated": "2024-08-04T20:31:04.358Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2019-6826\",\"sourceIdentifier\":\"cybersecurity@se.com\",\"published\":\"2019-09-17T20:15:12.077\",\"lastModified\":\"2024-11-21T04:47:13.780\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A CWE-426: Untrusted Search Path vulnerability exists in SoMachine HVAC v2.4.1 and earlier versions, which could cause arbitrary code execution on the system running SoMachine HVAC when a malicious DLL library is loaded by the product.\"},{\"lang\":\"es\",\"value\":\"Una CWE-426: Se presenta una vulnerabilidad Ruta de B\u00fasqueda No Confiable en SoMachine HVAC versi\u00f3n v2.4.1 y anteriores, lo que podr\u00eda causar la ejecuci\u00f3n de c\u00f3digo arbitrario sobre el sistema que ejecuta SoMachine HVAC cuando es cargado mediante el producto una biblioteca DLL maliciosa.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"cybersecurity@se.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-426\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-426\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:schneider-electric:somachine_hvac:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.4.1\",\"matchCriteriaId\":\"A214DB60-CD2D-4529-81A4-8C2446C3B6C3\"}]}]}],\"references\":[{\"url\":\"https://www.schneider-electric.com/en/download/document/SEVD-2019-225-04/\",\"source\":\"cybersecurity@se.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.schneider-electric.com/en/download/document/SEVD-2019-225-04/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
fkie_cve-2019-6826
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
schneider-electric | somachine_hvac | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:schneider-electric:somachine_hvac:*:*:*:*:*:*:*:*", "matchCriteriaId": "A214DB60-CD2D-4529-81A4-8C2446C3B6C3", "versionEndIncluding": "2.4.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A CWE-426: Untrusted Search Path vulnerability exists in SoMachine HVAC v2.4.1 and earlier versions, which could cause arbitrary code execution on the system running SoMachine HVAC when a malicious DLL library is loaded by the product." }, { "lang": "es", "value": "Una CWE-426: Se presenta una vulnerabilidad Ruta de B\u00fasqueda No Confiable en SoMachine HVAC versi\u00f3n v2.4.1 y anteriores, lo que podr\u00eda causar la ejecuci\u00f3n de c\u00f3digo arbitrario sobre el sistema que ejecuta SoMachine HVAC cuando es cargado mediante el producto una biblioteca DLL maliciosa." } ], "id": "CVE-2019-6826", "lastModified": "2024-11-21T04:47:13.780", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-09-17T20:15:12.077", "references": [ { "source": "cybersecurity@se.com", "tags": [ "Vendor Advisory" ], "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-225-04/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-225-04/" } ], "sourceIdentifier": "cybersecurity@se.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-426" } ], "source": "cybersecurity@se.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-426" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
var-201909-0043
Vulnerability from variot
A CWE-426: Untrusted Search Path vulnerability exists in SoMachine HVAC v2.4.1 and earlier versions, which could cause arbitrary code execution on the system running SoMachine HVAC when a malicious DLL library is loaded by the product. SoMachine HVAC Contains an unreliable search path vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Schneider Electric SoMachine HVAC is a set of programming software dedicated to Schneider Electric logic controllers by Schneider Electric in France.
Schneider Electric SoMachine HVAC v2.4.1 and previous versions have code issue vulnerabilities. The vulnerability stems from the problem of improper design or implementation in the code development process of network systems or products. There is currently no detailed vulnerability details provided
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201909-0043", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "somachine hvac", "scope": "lte", "trust": 1.0, "vendor": "schneider electric", "version": "2.4.1" }, { "model": "somachine hvac programming software", "scope": "lte", "trust": 0.8, "vendor": "schneider electric", "version": "2.4.1" }, { "model": "electric schneider electric somachine hvac", "scope": "lt", "trust": 0.6, "vendor": "schneider", "version": "v2.4.1" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-28493" }, { "db": "JVNDB", "id": "JVNDB-2019-009527" }, { "db": "NVD", "id": "CVE-2019-6826" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:schneider_electric:somachine_hvac_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-009527" } ] }, "cve": "CVE-2019-6826", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2019-6826", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CNVD-2020-28493", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2019-6826", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-6826", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-6826", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2019-6826", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2020-28493", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201909-820", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-28493" }, { "db": "JVNDB", "id": "JVNDB-2019-009527" }, { "db": "CNNVD", "id": "CNNVD-201909-820" }, { "db": "NVD", "id": "CVE-2019-6826" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A CWE-426: Untrusted Search Path vulnerability exists in SoMachine HVAC v2.4.1 and earlier versions, which could cause arbitrary code execution on the system running SoMachine HVAC when a malicious DLL library is loaded by the product. SoMachine HVAC Contains an unreliable search path vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Schneider Electric SoMachine HVAC is a set of programming software dedicated to Schneider Electric logic controllers by Schneider Electric in France. \n\r\n\r\nSchneider Electric SoMachine HVAC v2.4.1 and previous versions have code issue vulnerabilities. The vulnerability stems from the problem of improper design or implementation in the code development process of network systems or products. There is currently no detailed vulnerability details provided", "sources": [ { "db": "NVD", "id": "CVE-2019-6826" }, { "db": "JVNDB", "id": "JVNDB-2019-009527" }, { "db": "CNVD", "id": "CNVD-2020-28493" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-6826", "trust": 3.0 }, { "db": "SCHNEIDER", "id": "SEVD-2019-225-04", "trust": 2.2 }, { "db": "JVNDB", "id": "JVNDB-2019-009527", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2020-28493", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201909-820", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-28493" }, { "db": "JVNDB", "id": "JVNDB-2019-009527" }, { "db": "CNNVD", "id": "CNNVD-201909-820" }, { "db": "NVD", "id": "CVE-2019-6826" } ] }, "id": "VAR-201909-0043", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-28493" } ], "trust": 1.6 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-28493" } ] }, "last_update_date": "2024-11-23T22:51:40.344000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SEVD-2019-225-04", "trust": 0.8, "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-225-04/" }, { "title": "Patch for Schneider Electric SoMachine HVAC code issue vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/217741" }, { "title": "Schneider Electric SoMachine HVAC Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=98351" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-28493" }, { "db": "JVNDB", "id": "JVNDB-2019-009527" }, { "db": "CNNVD", "id": "CNNVD-201909-820" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-426", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-009527" }, { "db": "NVD", "id": "CVE-2019-6826" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://www.schneider-electric.com/en/download/document/sevd-2019-225-04/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-6826" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-6826" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-28493" }, { "db": "JVNDB", "id": "JVNDB-2019-009527" }, { "db": "CNNVD", "id": "CNNVD-201909-820" }, { "db": "NVD", "id": "CVE-2019-6826" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-28493" }, { "db": "JVNDB", "id": "JVNDB-2019-009527" }, { "db": "CNNVD", "id": "CNNVD-201909-820" }, { "db": "NVD", "id": "CVE-2019-6826" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-05-17T00:00:00", "db": "CNVD", "id": "CNVD-2020-28493" }, { "date": "2019-09-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-009527" }, { "date": "2019-09-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201909-820" }, { "date": "2019-09-17T20:15:12.077000", "db": "NVD", "id": "CVE-2019-6826" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-05-17T00:00:00", "db": "CNVD", "id": "CNVD-2020-28493" }, { "date": "2019-09-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-009527" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-201909-820" }, { "date": "2024-11-21T04:47:13.780000", "db": "NVD", "id": "CVE-2019-6826" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201909-820" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SoMachine HVAC Vulnerabilities related to untrusted search paths", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-009527" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-201909-820" } ], "trust": 0.6 } }
gsd-2019-6826
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2019-6826", "description": "A CWE-426: Untrusted Search Path vulnerability exists in SoMachine HVAC v2.4.1 and earlier versions, which could cause arbitrary code execution on the system running SoMachine HVAC when a malicious DLL library is loaded by the product.", "id": "GSD-2019-6826" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2019-6826" ], "details": "A CWE-426: Untrusted Search Path vulnerability exists in SoMachine HVAC v2.4.1 and earlier versions, which could cause arbitrary code execution on the system running SoMachine HVAC when a malicious DLL library is loaded by the product.", "id": "GSD-2019-6826", "modified": "2023-12-13T01:23:49.568276Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cybersecurity@schneider-electric.com", "ID": "CVE-2019-6826", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SoMachine HVAC", "version": { "version_data": [ { "version_value": "v2.4.1 and earlier versions" } ] } } ] }, "vendor_name": "Schneider Electric SE" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A CWE-426: Untrusted Search Path vulnerability exists in SoMachine HVAC v2.4.1 and earlier versions, which could cause arbitrary code execution on the system running SoMachine HVAC when a malicious DLL library is loaded by the product." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-426: Untrusted Search Path" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.schneider-electric.com/en/download/document/SEVD-2019-225-04/", "refsource": "CONFIRM", "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-225-04/" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:schneider-electric:somachine_hvac:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.4.1", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cybersecurity@schneider-electric.com", "ID": "CVE-2019-6826" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "A CWE-426: Untrusted Search Path vulnerability exists in SoMachine HVAC v2.4.1 and earlier versions, which could cause arbitrary code execution on the system running SoMachine HVAC when a malicious DLL library is loaded by the product." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-426" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.schneider-electric.com/en/download/document/SEVD-2019-225-04/", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-225-04/" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": true }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9 } }, "lastModifiedDate": "2022-02-03T14:24Z", "publishedDate": "2019-09-17T20:15Z" } } }
cnvd-2020-28493
Vulnerability from cnvd
目前厂商已发布升级补丁以修复漏洞,补丁获取链接: https://www.schneider-electric.com/en/download/document/SEVD-2019-225-04/
Name | Schneider Electric Schneider Electric SoMachine HVAC <v2.4.1 |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2019-6826", "cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2019-6826" } }, "description": "Schneider Electric SoMachine HVAC\u662f\u6cd5\u56fd\u65bd\u8010\u5fb7\u7535\u6c14\uff08Schneider Electric\uff09\u516c\u53f8\u7684\u4e00\u5957\u4e13\u7528\u4e8eSchneider Electric\u903b\u8f91\u63a7\u5236\u5668\u7684\u7f16\u7a0b\u8f6f\u4ef6\u3002\n\nSchneider Electric SoMachine HVAC v2.4.1\u53ca\u4e4b\u524d\u7248\u672c\u4e2d\u5b58\u5728\u4ee3\u7801\u95ee\u9898\u6f0f\u6d1e\u3002\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7f51\u7edc\u7cfb\u7edf\u6216\u4ea7\u54c1\u7684\u4ee3\u7801\u5f00\u53d1\u8fc7\u7a0b\u4e2d\u5b58\u5728\u8bbe\u8ba1\u6216\u5b9e\u73b0\u4e0d\u5f53\u7684\u95ee\u9898\u3002\u76ee\u524d\u6ca1\u6709\u8be6\u7ec6\u7684\u6f0f\u6d1e\u7ec6\u8282\u63d0\u4f9b\u3002", "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://www.schneider-electric.com/en/download/document/SEVD-2019-225-04/", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2020-28493", "openTime": "2020-05-17", "patchDescription": "Schneider Electric SoMachine HVAC\u662f\u6cd5\u56fd\u65bd\u8010\u5fb7\u7535\u6c14\uff08Schneider Electric\uff09\u516c\u53f8\u7684\u4e00\u5957\u4e13\u7528\u4e8eSchneider Electric\u903b\u8f91\u63a7\u5236\u5668\u7684\u7f16\u7a0b\u8f6f\u4ef6\u3002\r\n\r\nSchneider Electric SoMachine HVAC v2.4.1\u53ca\u4e4b\u524d\u7248\u672c\u4e2d\u5b58\u5728\u4ee3\u7801\u95ee\u9898\u6f0f\u6d1e\u3002\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7f51\u7edc\u7cfb\u7edf\u6216\u4ea7\u54c1\u7684\u4ee3\u7801\u5f00\u53d1\u8fc7\u7a0b\u4e2d\u5b58\u5728\u8bbe\u8ba1\u6216\u5b9e\u73b0\u4e0d\u5f53\u7684\u95ee\u9898\u3002\u76ee\u524d\u6ca1\u6709\u8be6\u7ec6\u7684\u6f0f\u6d1e\u7ec6\u8282\u63d0\u4f9b\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "Schneider Electric SoMachine HVAC\u4ee3\u7801\u95ee\u9898\u6f0f\u6d1e\u7684\u8865\u4e01", "products": { "product": "Schneider Electric Schneider Electric SoMachine HVAC \u003cv2.4.1" }, "referenceLink": "https://www.schneider-electric.com/en/download/document/SEVD-2019-225-04/", "serverity": "\u4e2d", "submitTime": "2019-09-23", "title": "Schneider Electric SoMachine HVAC\u4ee3\u7801\u95ee\u9898\u6f0f\u6d1e" }
CERTFR-2019-AVI-384
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Schneider Electric. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Schneider Electric | N/A | EcoStruxure Machine Expert HVAC (anciennement SoMachine HVAC) versions antérieures à 1.1.0 | ||
Schneider Electric | N/A | Wiser for KNX (anciennement homeLYnk) versions antérieures à 2.4.0 | ||
Schneider Electric | N/A | Modicon Premium | ||
Schneider Electric | N/A | TelevisGO versions produites avant le 15 juillet 2019 et utilisant une version de UltraVNC, 1.0.9.6.1 et antérieure, sans le correctif de sécurité TelevisGo_HotFix_20190715.exe | ||
Schneider Electric | N/A | Magelis HMIGTO series | ||
Schneider Electric | N/A | Magelis XBTGH series | ||
Schneider Electric | N/A | Magelis HMIGTUX series | ||
Schneider Electric | N/A | Magelis XBTGC series | ||
Schneider Electric | N/A | Modicon M580 versions antérieures à V2.90 | ||
Schneider Electric | N/A | Magelis HMIGTU series | ||
Schneider Electric | N/A | BMXNOR0200H Ethernet / Serial RTU module | ||
Schneider Electric | N/A | Magelis HMISTO series | ||
Schneider Electric | N/A | Magelis HMISCU series | ||
Schneider Electric | N/A | Magelis HMIGXO series | ||
Schneider Electric | Modicon M340 | Modicon M340 versions antérieures à V3.10 | ||
Schneider Electric | N/A | Schneider Electric Software Update (SESU) SUT Service component versions antérieures à 2.3.1 | ||
Schneider Electric | N/A | Magelis XBTGT series | ||
Schneider Electric | N/A | Magelis HMIGXU series | ||
Schneider Electric | N/A | Magelis HMISTU series | ||
Schneider Electric | N/A | spaceLYnk versions antérieures à 2.4.0 | ||
Schneider Electric | N/A | Modicon Quantum |
Title | Publication Time | Tags | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "EcoStruxure Machine Expert HVAC (anciennement SoMachine HVAC) versions ant\u00e9rieures \u00e0 1.1.0", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "Wiser for KNX (anciennement homeLYnk) versions ant\u00e9rieures \u00e0 2.4.0", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "Modicon Premium", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "TelevisGO versions produites avant le 15 juillet 2019 et utilisant une version de UltraVNC, 1.0.9.6.1 et ant\u00e9rieure, sans le correctif de s\u00e9curit\u00e9 TelevisGo_HotFix_20190715.exe", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "Magelis HMIGTO series", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "Magelis XBTGH series", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "Magelis HMIGTUX series", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "Magelis XBTGC series", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "Modicon M580 versions ant\u00e9rieures \u00e0 V2.90", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "Magelis HMIGTU series", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "BMXNOR0200H Ethernet / Serial RTU module", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "Magelis HMISTO series", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "Magelis HMISCU series", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "Magelis HMIGXO series", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "Modicon M340 versions ant\u00e9rieures \u00e0 V3.10", "product": { "name": "Modicon M340", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "Schneider Electric Software Update (SESU) SUT Service component versions ant\u00e9rieures \u00e0 2.3.1", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "Magelis XBTGT series", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "Magelis HMIGXU series", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "Magelis HMISTU series", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "spaceLYnk versions ant\u00e9rieures \u00e0 2.4.0", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "Modicon Quantum", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2018-15361", "url": "https://www.cve.org/CVERecord?id=CVE-2018-15361" }, { "name": "CVE-2019-8262", "url": "https://www.cve.org/CVERecord?id=CVE-2019-8262" }, { "name": "CVE-2019-8277", "url": "https://www.cve.org/CVERecord?id=CVE-2019-8277" }, { "name": "CVE-2019-6828", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6828" }, { "name": "CVE-2019-8265", "url": "https://www.cve.org/CVERecord?id=CVE-2019-8265" }, { "name": "CVE-2019-8269", "url": "https://www.cve.org/CVERecord?id=CVE-2019-8269" }, { "name": "CVE-2019-8260", "url": "https://www.cve.org/CVERecord?id=CVE-2019-8260" }, { "name": "CVE-2019-8263", "url": "https://www.cve.org/CVERecord?id=CVE-2019-8263" }, { "name": "CVE-2019-6832", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6832" }, { "name": "CVE-2019-8261", "url": "https://www.cve.org/CVERecord?id=CVE-2019-8261" }, { "name": "CVE-2019-8276", "url": "https://www.cve.org/CVERecord?id=CVE-2019-8276" }, { "name": "CVE-2018-7846", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7846" }, { "name": "CVE-2019-8259", "url": "https://www.cve.org/CVERecord?id=CVE-2019-8259" }, { "name": "CVE-2018-7842", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7842" }, { "name": "CVE-2018-7849", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7849" }, { "name": "CVE-2019-8271", "url": "https://www.cve.org/CVERecord?id=CVE-2019-8271" }, { "name": "CVE-2019-6831", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6831" }, { "name": "CVE-2019-6813", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6813" }, { "name": "CVE-2019-6809", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6809" }, { "name": "CVE-2019-6829", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6829" }, { "name": "CVE-2018-7852", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7852" }, { "name": "CVE-2019-8267", "url": "https://www.cve.org/CVERecord?id=CVE-2019-8267" }, { "name": "CVE-2019-6830", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6830" }, { "name": "CVE-2019-6810", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6810" }, { "name": "CVE-2018-7854", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7854" }, { "name": "CVE-2019-8280", "url": "https://www.cve.org/CVERecord?id=CVE-2019-8280" }, { "name": "CVE-2018-7844", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7844" }, { "name": "CVE-2018-7847", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7847" }, { "name": "CVE-2018-7855", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7855" }, { "name": "CVE-2019-8275", "url": "https://www.cve.org/CVERecord?id=CVE-2019-8275" }, { "name": "CVE-2019-8274", "url": "https://www.cve.org/CVERecord?id=CVE-2019-8274" }, { "name": "CVE-2019-6808", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6808" }, { "name": "CVE-2019-6826", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6826" }, { "name": "CVE-2018-7850", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7850" }, { "name": "CVE-2018-7856", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7856" }, { "name": "CVE-2019-8266", "url": "https://www.cve.org/CVERecord?id=CVE-2019-8266" }, { "name": "CVE-2019-8270", "url": "https://www.cve.org/CVERecord?id=CVE-2019-8270" }, { "name": "CVE-2019-6834", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6834" }, { "name": "CVE-2019-68067", "url": "https://www.cve.org/CVERecord?id=CVE-2019-68067" }, { "name": "CVE-2018-7845", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7845" }, { "name": "CVE-2019-8258", "url": "https://www.cve.org/CVERecord?id=CVE-2019-8258" }, { "name": "CVE-2018-7857", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7857" }, { "name": "CVE-2019-8264", "url": "https://www.cve.org/CVERecord?id=CVE-2019-8264" }, { "name": "CVE-2019-6833", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6833" }, { "name": "CVE-2019-8272", "url": "https://www.cve.org/CVERecord?id=CVE-2019-8272" }, { "name": "CVE-2019-8268", "url": "https://www.cve.org/CVERecord?id=CVE-2019-8268" }, { "name": "CVE-2019-68077", "url": "https://www.cve.org/CVERecord?id=CVE-2019-68077" }, { "name": "CVE-2019-8273", "url": "https://www.cve.org/CVERecord?id=CVE-2019-8273" }, { "name": "CVE-2018-7853", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7853" }, { "name": "CVE-2018-7843", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7843" }, { "name": "CVE-2018-7848", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7848" } ], "initial_release_date": "2019-08-13T00:00:00", "last_revision_date": "2019-08-14T00:00:00", "links": [], "reference": "CERTFR-2019-AVI-384", "revisions": [ { "description": "Version initiale", "revision_date": "2019-08-13T00:00:00.000000" }, { "description": "Ajout du bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2019-225-04 du 13 ao\u00fbt 2019", "revision_date": "2019-08-14T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSchneider Electric. Certaines d\u0027entre elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de\nservice \u00e0 distance et un contournement de la politique de s\u00e9curit\u00e9.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Schneider Electric", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2019-225-06 du 13 ao\u00fbt 2019", "url": "https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet\u0026p_File_Name=SEVD-2019-225-06-SESU_SUT_Service.pdf\u0026p_Doc_Ref=SEVD-2019-225-06" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2019-225-04 du 13 ao\u00fbt 2019", "url": "https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet\u0026p_File_Name=SEVD-2019-225-04_SoMachine_HVAC_Security_Notification.pdf\u0026p_Doc_Ref=SEVD-2019-225-04" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2019-225-01 du 13 ao\u00fbt 2019", "url": "https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet\u0026p_File_Name=SEVD-2019-225-01-Magelis_Security_Notification.pdf\u0026p_Doc_Ref=SEVD-2019-225-01" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2019-225-03 du 13 ao\u00fbt 2019", "url": "https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet\u0026p_File_Name=SEVD-2019-225-03-Modicon-Ethernet+-Serial-RTU-Module-Security_Notification.pdf\u0026p_Doc_Ref=SEVD-2019-225-03" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2019-225-07 du 13 ao\u00fbt 2019", "url": "https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet\u0026p_File_Name=SEVD-2019-225-07-spaceLYnk-homeLYnk.pdf\u0026p_Doc_Ref=SEVD-2019-225-07" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2019-225-02 du 13 ao\u00fbt 2019", "url": "https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet\u0026p_File_Name=SEVD-2019-225-02-Modicon_M340_Controllers_Security_Notification.pdf\u0026p_Doc_Ref=SEVD-2019-225-02" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2019-134-11 du 13 ao\u00fbt 2019", "url": "https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet\u0026p_File_Name=SEVD-2019-134-11-V2-Modicon-Controllers.pdf\u0026p_Doc_Ref=SEVD-2019-134-11" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2019-225-05 du 13 ao\u00fbt 2019", "url": "https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet\u0026p_File_Name=SEVD-2019-225-05-TelevisGO_Security_Notification.pdf\u0026p_Doc_Ref=SEVD-2019-225-05" } ] }
CERTFR-2019-AVI-488
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Schneider Electric. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Schneider Electric | N/A | Modicon Premium | ||
Schneider Electric | Modicon M340 | Modicon M340 | ||
Schneider Electric | N/A | EcoStruxure Power Monitoring Expert versions antérieures à PME 9.0 CU2 | ||
Schneider Electric | N/A | Modicon BMxCRA et les modules 140CRA | ||
Schneider Electric | N/A | Modicon BMENOC 0321 | ||
Schneider Electric | N/A | Modicon BMENOC 0311 | ||
Schneider Electric | N/A | Modicon M580 | ||
Schneider Electric | N/A | SoMove FDT versions v2.7.5 et antérieures | ||
Schneider Electric | N/A | EcoStruxure Power Monitoring Expert version 8.2 sans le dernier correctif de sécurité | ||
Schneider Electric | N/A | Modicon Quantum |
Title | Publication Time | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Modicon Premium", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "Modicon M340", "product": { "name": "Modicon M340", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "EcoStruxure Power Monitoring Expert versions ant\u00e9rieures \u00e0 PME 9.0 CU2", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "Modicon BMxCRA et les modules 140CRA", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "Modicon BMENOC 0321", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "Modicon BMENOC 0311", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "Modicon M580", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "SoMove FDT versions v2.7.5 et ant\u00e9rieures", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "EcoStruxure Power Monitoring Expert version 8.2 sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "Modicon Quantum", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2018-7833", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7833" }, { "name": "CVE-2019-6846", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6846" }, { "name": "CVE-2018-7830", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7830" }, { "name": "CVE-2018-7809", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7809" }, { "name": "CVE-2019-6841", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6841" }, { "name": "CVE-2019-6848", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6848" }, { "name": "CVE-2018-7810", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7810" }, { "name": "CVE-2018-7831", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7831" }, { "name": "CVE-2018-20031", "url": "https://www.cve.org/CVERecord?id=CVE-2018-20031" }, { "name": "CVE-2019-6845", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6845" }, { "name": "CVE-2018-20032", "url": "https://www.cve.org/CVERecord?id=CVE-2018-20032" }, { "name": "CVE-2019-6844", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6844" }, { "name": "CVE-2019-6842", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6842" }, { "name": "CVE-2018-20034", "url": "https://www.cve.org/CVERecord?id=CVE-2018-20034" }, { "name": "CVE-2019-6851", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6851" }, { "name": "CVE-2018-20033", "url": "https://www.cve.org/CVERecord?id=CVE-2018-20033" }, { "name": "CVE-2019-6826", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6826" }, { "name": "CVE-2018-7811", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7811" }, { "name": "CVE-2019-6849", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6849" }, { "name": "CVE-2019-6847", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6847" }, { "name": "CVE-2018-7804", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7804" }, { "name": "CVE-2019-6843", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6843" }, { "name": "CVE-2019-6850", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6850" }, { "name": "CVE-2018-7812", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7812" } ], "initial_release_date": "2019-10-08T00:00:00", "last_revision_date": "2019-10-08T00:00:00", "links": [], "reference": "CERTFR-2019-AVI-488", "revisions": [ { "description": "Version initiale", "revision_date": "2019-10-08T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Injection de code indirecte \u00e0 distance (XSS)" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSchneider Electric. Certaines d\u0027entre elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de\nservice \u00e0 distance et un contournement de la politique de s\u00e9curit\u00e9.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Schneider Electric", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2019-281-02 du 08 octobre 2019", "url": "https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet\u0026p_File_Name=SEVD-2019-281-02_Modicon_Controllers.pdf\u0026p_Doc_Ref=SEVD-2019-281-02" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2019-134-04 du 08 octobre 2019", "url": "https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet\u0026p_File_Name=SEVD-2019-134-04-Floating-License-Manager-Update_V2.1.pdf\u0026p_Doc_Ref=SEVD-2019-134-04" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2018-327-01 du 08 octobre 2019", "url": "https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet\u0026p_File_Name=SEVD-2018-327-01-Embedded-Web-Servers-Modicon+V3.0.pdf\u0026p_Doc_Ref=SEVD-2018-327-01" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2019-281-04 du 08 octobre 2019", "url": "https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet\u0026p_File_Name=SEVD-2019-281-04_Modicon_Controllers.pdf\u0026p_Doc_Ref=SEVD-2019-281-04" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2019-281-01 du 08 octobre 2019", "url": "https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet\u0026p_File_Name=SEVD-2019-281-01_Modicon_Controllers.pdf\u0026p_Doc_Ref=SEVD-2019-281-01" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2019-225-04 du 08 octobre 2019", "url": "https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet\u0026p_File_Name=SEVD-2019-225-04_SoMachine_SoMove_V2.0.pdf\u0026p_Doc_Ref=SEVD-2019-225-04" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2019-281-03 du 08 octobre 2019", "url": "https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet\u0026p_File_Name=SEVD-2019-281-03_Modicon_Controllers.pdf\u0026p_Doc_Ref=SEVD-2019-281-03" } ] }
ghsa-xxmq-q3f3-wvpg
Vulnerability from github
A CWE-426: Untrusted Search Path vulnerability exists in SoMachine HVAC v2.4.1 and earlier versions, which could cause arbitrary code execution on the system running SoMachine HVAC when a malicious DLL library is loaded by the product.
{ "affected": [], "aliases": [ "CVE-2019-6826" ], "database_specific": { "cwe_ids": [ "CWE-426" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2019-09-17T20:15:00Z", "severity": "HIGH" }, "details": "A CWE-426: Untrusted Search Path vulnerability exists in SoMachine HVAC v2.4.1 and earlier versions, which could cause arbitrary code execution on the system running SoMachine HVAC when a malicious DLL library is loaded by the product.", "id": "GHSA-xxmq-q3f3-wvpg", "modified": "2022-05-24T16:56:24Z", "published": "2022-05-24T16:56:24Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-6826" }, { "type": "WEB", "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-225-04" } ], "schema_version": "1.4.0", "severity": [] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.