Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2019-6827 (GCVE-0-2019-6827)
Vulnerability from cvelistv5
- CWE-787 - Out-of-bounds Write
URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Interactive Graphical SCADA System (IGSS) Version 14 and prior |
Version: Interactive Graphical SCADA System (IGSS) Version 14 and prior |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:31:04.402Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-190-02" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-19-671/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Interactive Graphical SCADA System (IGSS) Version 14 and prior", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Interactive Graphical SCADA System (IGSS) Version 14 and prior" } ] } ], "descriptions": [ { "lang": "en", "value": "A CWE-787: Out-of-bounds Write vulnerability exists in Interactive Graphical SCADA System (IGSS), Version 14 and prior, which could cause a software crash when data in the mdb database is manipulated." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787: Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-07-22T18:06:09", "orgId": "076d1eb6-cfab-4401-b34d-6dfc2a413bdb", "shortName": "schneider" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-190-02" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-19-671/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cybersecurity@schneider-electric.com", "ID": "CVE-2019-6827", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Interactive Graphical SCADA System (IGSS) Version 14 and prior", "version": { "version_data": [ { "version_value": "Interactive Graphical SCADA System (IGSS) Version 14 and prior" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A CWE-787: Out-of-bounds Write vulnerability exists in Interactive Graphical SCADA System (IGSS), Version 14 and prior, which could cause a software crash when data in the mdb database is manipulated." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-787: Out-of-bounds Write" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-190-02", "refsource": "MISC", "url": "https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-190-02" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-19-671/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-19-671/" } ] } } } }, "cveMetadata": { "assignerOrgId": "076d1eb6-cfab-4401-b34d-6dfc2a413bdb", "assignerShortName": "schneider", "cveId": "CVE-2019-6827", "datePublished": "2019-07-15T20:47:48", "dateReserved": "2019-01-25T00:00:00", "dateUpdated": "2024-08-04T20:31:04.402Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2019-6827\",\"sourceIdentifier\":\"cybersecurity@se.com\",\"published\":\"2019-07-15T21:15:10.883\",\"lastModified\":\"2024-11-21T04:47:13.910\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A CWE-787: Out-of-bounds Write vulnerability exists in Interactive Graphical SCADA System (IGSS), Version 14 and prior, which could cause a software crash when data in the mdb database is manipulated.\"},{\"lang\":\"es\",\"value\":\"Una CWE-787: Existe una vulnerabilidad de escritura fuera de l\u00edmites en Interactive Graphical SCADA System (IGSS), versi\u00f3n 14 y anteriores, que podr\u00eda causar un bloqueo del software cuando son manipulados los datos en la base de datos mdb.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"cybersecurity@se.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:schneider-electric:interactive_graphical_scada_system:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"12.0\",\"matchCriteriaId\":\"DA1E8EFC-6060-4BA0-95E5-81BBC3AF1353\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:schneider-electric:interactive_graphical_scada_system:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.0\",\"versionEndExcluding\":\"13.0.0.19140\",\"matchCriteriaId\":\"01B21B69-BA94-4C71-842F-5F59F6F99FBC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:schneider-electric:interactive_graphical_scada_system:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.0\",\"versionEndExcluding\":\"14.0.0.19120\",\"matchCriteriaId\":\"DE3A6FED-3CD4-4088-BD09-5DB4F37C14E2\"}]}]}],\"references\":[{\"url\":\"https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-190-02\",\"source\":\"cybersecurity@se.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.zerodayinitiative.com/advisories/ZDI-19-671/\",\"source\":\"cybersecurity@se.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-190-02\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.zerodayinitiative.com/advisories/ZDI-19-671/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]}]}}" } }
ghsa-w35v-55pp-hj6x
Vulnerability from github
A CWE-787: Out-of-bounds Write vulnerability exists in Interactive Graphical SCADA System (IGSS), Version 14 and prior, which could cause a software crash when data in the mdb database is manipulated.
{ "affected": [], "aliases": [ "CVE-2019-6827" ], "database_specific": { "cwe_ids": [ "CWE-787" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2019-07-15T21:15:00Z", "severity": "HIGH" }, "details": "A CWE-787: Out-of-bounds Write vulnerability exists in Interactive Graphical SCADA System (IGSS), Version 14 and prior, which could cause a software crash when data in the mdb database is manipulated.", "id": "GHSA-w35v-55pp-hj6x", "modified": "2022-10-14T12:00:19Z", "published": "2022-05-24T16:50:25Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-6827" }, { "type": "WEB", "url": "https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-190-02" }, { "type": "WEB", "url": "https://www.zerodayinitiative.com/advisories/ZDI-19-671" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
icsa-19-192-06
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "names": [ "mdm", "rgod" ], "organization": "9SG Security Team", "summary": "reporting this vulnerability to NCCIC" }, { "organization": "Trend Micro Zero Day Initiative", "summary": "reporting this vulnerability to NCCIC" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of this vulnerability could allow an attacker to achieve arbitrary code execution or crash the software.", "title": "Risk evaluation" }, { "category": "other", "text": "Commercial Facilities, Critical Manufacturing, Energy", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "France", "title": "Company headquarters location" }, { "category": "general", "text": "NCCIC also recommends that users take the following measures to protect themselves from social engineering attacks:", "title": "Recommended Practices" }, { "category": "general", "text": "NCCIC reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.\nNCCIC also provides a section for control systems security recommended practices on the ICS webpage on us-cert.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.\nOrganizations observing any suspected malicious activity should follow their established internal procedures and report their findings to NCCIC for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "other", "text": "No known public exploits specifically target this vulnerability. This vulnerability is not exploitable remotely. High skill level is needed to exploit.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-19-192-06 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2019/icsa-19-192-06.json" }, { "category": "self", "summary": "ICS Advisory ICSA-19-192-06 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-19-192-06" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.us-cert.gov/cas/tips/ST04-014.html" }, { "category": "external", "summary": "Recommended Practices", "url": "https://ics-cert.us-cert.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.us-cert.gov/ics/tips/ICS-TIP-12-146-01B" } ], "title": "Schneider Electric Interactive Graphical SCADA System", "tracking": { "current_release_date": "2019-07-11T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-19-192-06", "initial_release_date": "2019-07-11T00:00:00.000000Z", "revision_history": [ { "date": "2019-07-11T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-19-192-06 Schneider Electric Interactive Graphical SCADA System" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c= 14", "product": { "name": "IGSS: Version 14 and prior", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "IGSS" } ], "category": "vendor", "name": "Schneider Electric Software, LLC" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-6827", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An out-of-bounds vulnerability exists and could be exploited by the application processing a specially crafted project file. Exploitation could cause a software crash when data in the mdb database is manipulated or allow code execution.CVE-2019-6827 has been assigned to this vulnerability. A CVSS v3 base score of 7.0 has been calculated; the CVSS vector string is (AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-6827" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Schneider Electric recommends upgrading to Version 13.0.0.19140 or 14.0.0.19120", "product_ids": [ "CSAFPID-0001" ], "url": "http://igss.schneider-electric.com/products/igss/download/licensed-versions.aspx" }, { "category": "vendor_fix", "details": "Do not allow untrusted access to the configuration database (mdb) and update IGSS to the latest version of IGSS, either Version 13 or Version 14.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "A restart of the software is required, but a reboot of the system is not required.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Locate control and safety system networks and remote devices behind firewalls and isolate them from the business network.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Physical controls should be in place so that no unauthorized person would have access to the ICS and safety controllers, peripheral equipment, or the ICS and safety networks.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "All controllers should reside in locked cabinets and never be left in \u201cProgram\u201d mode.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "All programming software should be kept in locked cabinets and should never be connected to any network other than the network intended for the devices.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "All methods of mobile data exchange with the isolated network, such as CDs, USB drives, etc., should be scanned before use in the terminals or any node connected to these networks.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Laptops that have connected to any other network besides the intended network should never be allowed to connect to the safety or control networks without proper sanitation.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Minimize network exposure for all control system devices and/or systems and ensure that they are not accessible from the Internet.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "When remote access is required, use secure methods such as virtual private networks (VPNs), recognizing that VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize that VPN is only as secure as the connected devices.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "For more information, please see Schneider Electric advisory: SEVD-2019-190-02", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-190-02/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] } ] }
ICSA-19-192-06
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "names": [ "mdm", "rgod" ], "organization": "9SG Security Team", "summary": "reporting this vulnerability to NCCIC" }, { "organization": "Trend Micro Zero Day Initiative", "summary": "reporting this vulnerability to NCCIC" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of this vulnerability could allow an attacker to achieve arbitrary code execution or crash the software.", "title": "Risk evaluation" }, { "category": "other", "text": "Commercial Facilities, Critical Manufacturing, Energy", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "France", "title": "Company headquarters location" }, { "category": "general", "text": "NCCIC also recommends that users take the following measures to protect themselves from social engineering attacks:", "title": "Recommended Practices" }, { "category": "general", "text": "NCCIC reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.\nNCCIC also provides a section for control systems security recommended practices on the ICS webpage on us-cert.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.\nOrganizations observing any suspected malicious activity should follow their established internal procedures and report their findings to NCCIC for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "other", "text": "No known public exploits specifically target this vulnerability. This vulnerability is not exploitable remotely. High skill level is needed to exploit.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-19-192-06 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2019/icsa-19-192-06.json" }, { "category": "self", "summary": "ICS Advisory ICSA-19-192-06 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-19-192-06" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.us-cert.gov/cas/tips/ST04-014.html" }, { "category": "external", "summary": "Recommended Practices", "url": "https://ics-cert.us-cert.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.us-cert.gov/ics/tips/ICS-TIP-12-146-01B" } ], "title": "Schneider Electric Interactive Graphical SCADA System", "tracking": { "current_release_date": "2019-07-11T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-19-192-06", "initial_release_date": "2019-07-11T00:00:00.000000Z", "revision_history": [ { "date": "2019-07-11T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-19-192-06 Schneider Electric Interactive Graphical SCADA System" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c= 14", "product": { "name": "IGSS: Version 14 and prior", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "IGSS" } ], "category": "vendor", "name": "Schneider Electric Software, LLC" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-6827", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An out-of-bounds vulnerability exists and could be exploited by the application processing a specially crafted project file. Exploitation could cause a software crash when data in the mdb database is manipulated or allow code execution.CVE-2019-6827 has been assigned to this vulnerability. A CVSS v3 base score of 7.0 has been calculated; the CVSS vector string is (AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-6827" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Schneider Electric recommends upgrading to Version 13.0.0.19140 or 14.0.0.19120", "product_ids": [ "CSAFPID-0001" ], "url": "http://igss.schneider-electric.com/products/igss/download/licensed-versions.aspx" }, { "category": "vendor_fix", "details": "Do not allow untrusted access to the configuration database (mdb) and update IGSS to the latest version of IGSS, either Version 13 or Version 14.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "A restart of the software is required, but a reboot of the system is not required.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Locate control and safety system networks and remote devices behind firewalls and isolate them from the business network.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Physical controls should be in place so that no unauthorized person would have access to the ICS and safety controllers, peripheral equipment, or the ICS and safety networks.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "All controllers should reside in locked cabinets and never be left in \u201cProgram\u201d mode.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "All programming software should be kept in locked cabinets and should never be connected to any network other than the network intended for the devices.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "All methods of mobile data exchange with the isolated network, such as CDs, USB drives, etc., should be scanned before use in the terminals or any node connected to these networks.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Laptops that have connected to any other network besides the intended network should never be allowed to connect to the safety or control networks without proper sanitation.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Minimize network exposure for all control system devices and/or systems and ensure that they are not accessible from the Internet.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "When remote access is required, use secure methods such as virtual private networks (VPNs), recognizing that VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize that VPN is only as secure as the connected devices.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "For more information, please see Schneider Electric advisory: SEVD-2019-190-02", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-190-02/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] } ] }
var-201907-0071
Vulnerability from variot
A CWE-787: Out-of-bounds Write vulnerability exists in Interactive Graphical SCADA System (IGSS), Version 14 and prior, which could cause a software crash when data in the mdb database is manipulated. Interactive Graphical SCADA System (IGSS) Contains an out-of-bounds vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Schneider Electric IGSS. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within use of the UnitIdx data in the BaseUnits table. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Schneider Electric Interactive Graphical SCADA System (IGSS) is a set of SCADA (Data Acquisition and Supervisory Control System) system used to monitor and control industrial processes from Schneider Electric in France.
A buffer error vulnerability exists in Schneider Electric IGSS 14 and earlier versions. Attackers can use this vulnerability to cause software crashes with the help of specially crafted project files
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201907-0071", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "interactive graphical scada system", "scope": "gte", "trust": 1.0, "vendor": "schneider electric", "version": "14.0" }, { "model": "interactive graphical scada system", "scope": "lt", "trust": 1.0, "vendor": "schneider electric", "version": "13.0.0.19140" }, { "model": "interactive graphical scada system", "scope": "lte", "trust": 1.0, "vendor": "schneider electric", "version": "12.0" }, { "model": "interactive graphical scada system", "scope": "lt", "trust": 1.0, "vendor": "schneider electric", "version": "14.0.0.19120" }, { "model": "interactive graphical scada system", "scope": "gte", "trust": 1.0, "vendor": "schneider electric", "version": "13.0" }, { "model": "interactive graphical scada system", "scope": "lte", "trust": 0.8, "vendor": "schneider electric", "version": "14" }, { "model": "igss", "scope": null, "trust": 0.7, "vendor": "schneider electric", "version": null }, { "model": "electric interactive graphical scada system", "scope": "lte", "trust": 0.6, "vendor": "schneider", "version": "\u003c=14" }, { "model": "interactive graphical scada system", "scope": "eq", "trust": 0.3, "vendor": "schneider electric", "version": "14" }, { "model": "interactive graphical scada system", "scope": "eq", "trust": 0.3, "vendor": "schneider electric", "version": "13" }, { "model": "interactive graphical scada system", "scope": "ne", "trust": 0.3, "vendor": "schneider electric", "version": "14.0.0.19120" }, { "model": "interactive graphical scada system", "scope": "ne", "trust": 0.3, "vendor": "schneider electric", "version": "13.0.0.19140" } ], "sources": [ { "db": "ZDI", "id": "ZDI-19-671" }, { "db": "CNVD", "id": "CNVD-2020-60834" }, { "db": "BID", "id": "109150" }, { "db": "JVNDB", "id": "JVNDB-2019-006479" }, { "db": "NVD", "id": "CVE-2019-6827" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:schneider_electric:interactive_graphical_scada_system", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-006479" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "mdm and rgod of 9SG Security Team.", "sources": [ { "db": "BID", "id": "109150" }, { "db": "CNNVD", "id": "CNNVD-201907-688" } ], "trust": 0.9 }, "cve": "CVE-2019-6827", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2019-6827", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CNVD-2020-60834", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-158262", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2019-6827", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-6827", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "HIGH", "attackVector": "LOCAL", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.0, "id": "CVE-2019-6827", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 0.7, "userInteraction": "REQUIRED", "vectorString": "AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-6827", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2019-6827", "trust": 0.8, "value": "High" }, { "author": "ZDI", "id": "CVE-2019-6827", "trust": 0.7, "value": "CRITICAL" }, { "author": "CNVD", "id": "CNVD-2020-60834", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201907-688", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-158262", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2019-6827", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-19-671" }, { "db": "CNVD", "id": "CNVD-2020-60834" }, { "db": "VULHUB", "id": "VHN-158262" }, { "db": "VULMON", "id": "CVE-2019-6827" }, { "db": "JVNDB", "id": "JVNDB-2019-006479" }, { "db": "CNNVD", "id": "CNNVD-201907-688" }, { "db": "NVD", "id": "CVE-2019-6827" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A CWE-787: Out-of-bounds Write vulnerability exists in Interactive Graphical SCADA System (IGSS), Version 14 and prior, which could cause a software crash when data in the mdb database is manipulated. Interactive Graphical SCADA System (IGSS) Contains an out-of-bounds vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Schneider Electric IGSS. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within use of the UnitIdx data in the BaseUnits table. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Schneider Electric Interactive Graphical SCADA System (IGSS) is a set of SCADA (Data Acquisition and Supervisory Control System) system used to monitor and control industrial processes from Schneider Electric in France. \n\r\n\r\nA buffer error vulnerability exists in Schneider Electric IGSS 14 and earlier versions. Attackers can use this vulnerability to cause software crashes with the help of specially crafted project files", "sources": [ { "db": "NVD", "id": "CVE-2019-6827" }, { "db": "JVNDB", "id": "JVNDB-2019-006479" }, { "db": "ZDI", "id": "ZDI-19-671" }, { "db": "CNVD", "id": "CNVD-2020-60834" }, { "db": "BID", "id": "109150" }, { "db": "VULHUB", "id": "VHN-158262" }, { "db": "VULMON", "id": "CVE-2019-6827" } ], "trust": 3.24 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-6827", "trust": 4.2 }, { "db": "ZDI", "id": "ZDI-19-671", "trust": 2.5 }, { "db": "SCHNEIDER", "id": "SEVD-2019-190-02", "trust": 2.1 }, { "db": "ICS CERT", "id": "ICSA-19-192-06", "trust": 1.7 }, { "db": "BID", "id": "109150", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2019-006479", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-8284", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-201907-688", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2020-60834", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.2580", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-158262", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2019-6827", "trust": 0.1 } ], "sources": [ { "db": "ZDI", "id": "ZDI-19-671" }, { "db": "CNVD", "id": "CNVD-2020-60834" }, { "db": "VULHUB", "id": "VHN-158262" }, { "db": "VULMON", "id": "CVE-2019-6827" }, { "db": "BID", "id": "109150" }, { "db": "JVNDB", "id": "JVNDB-2019-006479" }, { "db": "CNNVD", "id": "CNNVD-201907-688" }, { "db": "NVD", "id": "CVE-2019-6827" } ] }, "id": "VAR-201907-0071", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-60834" }, { "db": "VULHUB", "id": "VHN-158262" } ], "trust": 1.6749999999999998 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-60834" } ] }, "last_update_date": "2024-11-23T21:37:08.156000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SEVD-2019-190-02", "trust": 0.8, "url": "https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-190-02" }, { "title": "Schneider Electric has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-192-06" }, { "title": "Schneider Electric Interactive Graphical SCADA System Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=95222" }, { "title": "", "trust": 0.1, "url": "https://github.com/Live-Hack-CVE/CVE-2019-6827 " } ], "sources": [ { "db": "ZDI", "id": "ZDI-19-671" }, { "db": "VULMON", "id": "CVE-2019-6827" }, { "db": "JVNDB", "id": "JVNDB-2019-006479" }, { "db": "CNNVD", "id": "CNNVD-201907-688" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-158262" }, { "db": "JVNDB", "id": "JVNDB-2019-006479" }, { "db": "NVD", "id": "CVE-2019-6827" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-192-06" }, { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-6827" }, { "trust": 1.8, "url": "https://www.schneider-electric.com/ww/en/download/document/sevd-2019-190-02" }, { "trust": 1.8, "url": "https://www.zerodayinitiative.com/advisories/zdi-19-671/" }, { "trust": 0.9, "url": "http://www.schneider-electric.com/products/ww/en/" }, { "trust": 0.9, "url": "https://download.schneider-electric.com/files?p_endoctype=technical+leaflet\u0026p_file_name=sevd-2019-190-02-igss.pdf\u0026p_doc_ref=sevd-2019-190-02" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-6827" }, { "trust": 0.7, "url": "https://www.securityfocus.com/bid/109150" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.2580/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/787.html" }, { "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2019-6827" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "ZDI", "id": "ZDI-19-671" }, { "db": "CNVD", "id": "CNVD-2020-60834" }, { "db": "VULHUB", "id": "VHN-158262" }, { "db": "VULMON", "id": "CVE-2019-6827" }, { "db": "BID", "id": "109150" }, { "db": "JVNDB", "id": "JVNDB-2019-006479" }, { "db": "CNNVD", "id": "CNNVD-201907-688" }, { "db": "NVD", "id": "CVE-2019-6827" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "ZDI", "id": "ZDI-19-671" }, { "db": "CNVD", "id": "CNVD-2020-60834" }, { "db": "VULHUB", "id": "VHN-158262" }, { "db": "VULMON", "id": "CVE-2019-6827" }, { "db": "BID", "id": "109150" }, { "db": "JVNDB", "id": "JVNDB-2019-006479" }, { "db": "CNNVD", "id": "CNNVD-201907-688" }, { "db": "NVD", "id": "CVE-2019-6827" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-07-22T00:00:00", "db": "ZDI", "id": "ZDI-19-671" }, { "date": "2019-08-29T00:00:00", "db": "CNVD", "id": "CNVD-2020-60834" }, { "date": "2019-07-15T00:00:00", "db": "VULHUB", "id": "VHN-158262" }, { "date": "2019-07-15T00:00:00", "db": "VULMON", "id": "CVE-2019-6827" }, { "date": "2019-07-11T00:00:00", "db": "BID", "id": "109150" }, { "date": "2019-07-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-006479" }, { "date": "2019-07-11T00:00:00", "db": "CNNVD", "id": "CNNVD-201907-688" }, { "date": "2019-07-15T21:15:10.883000", "db": "NVD", "id": "CVE-2019-6827" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-07-22T00:00:00", "db": "ZDI", "id": "ZDI-19-671" }, { "date": "2020-11-06T00:00:00", "db": "CNVD", "id": "CNVD-2020-60834" }, { "date": "2019-07-22T00:00:00", "db": "VULHUB", "id": "VHN-158262" }, { "date": "2022-10-14T00:00:00", "db": "VULMON", "id": "CVE-2019-6827" }, { "date": "2019-07-11T00:00:00", "db": "BID", "id": "109150" }, { "date": "2019-08-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-006479" }, { "date": "2019-07-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201907-688" }, { "date": "2024-11-21T04:47:13.910000", "db": "NVD", "id": "CVE-2019-6827" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "109150" }, { "db": "CNNVD", "id": "CNNVD-201907-688" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Interactive Graphical SCADA System Vulnerable to out-of-bounds writing", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-006479" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201907-688" } ], "trust": 0.6 } }
fkie_cve-2019-6827
Vulnerability from fkie_nvd
URL | Tags | ||
---|---|---|---|
cybersecurity@se.com | https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-190-02 | Vendor Advisory | |
cybersecurity@se.com | https://www.zerodayinitiative.com/advisories/ZDI-19-671/ | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-190-02 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.zerodayinitiative.com/advisories/ZDI-19-671/ | Third Party Advisory, VDB Entry |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:schneider-electric:interactive_graphical_scada_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "DA1E8EFC-6060-4BA0-95E5-81BBC3AF1353", "versionEndIncluding": "12.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:schneider-electric:interactive_graphical_scada_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "01B21B69-BA94-4C71-842F-5F59F6F99FBC", "versionEndExcluding": "13.0.0.19140", "versionStartIncluding": "13.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:schneider-electric:interactive_graphical_scada_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "DE3A6FED-3CD4-4088-BD09-5DB4F37C14E2", "versionEndExcluding": "14.0.0.19120", "versionStartIncluding": "14.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A CWE-787: Out-of-bounds Write vulnerability exists in Interactive Graphical SCADA System (IGSS), Version 14 and prior, which could cause a software crash when data in the mdb database is manipulated." }, { "lang": "es", "value": "Una CWE-787: Existe una vulnerabilidad de escritura fuera de l\u00edmites en Interactive Graphical SCADA System (IGSS), versi\u00f3n 14 y anteriores, que podr\u00eda causar un bloqueo del software cuando son manipulados los datos en la base de datos mdb." } ], "id": "CVE-2019-6827", "lastModified": "2024-11-21T04:47:13.910", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-07-15T21:15:10.883", "references": [ { "source": "cybersecurity@se.com", "tags": [ "Vendor Advisory" ], "url": "https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-190-02" }, { "source": "cybersecurity@se.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-19-671/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-190-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-19-671/" } ], "sourceIdentifier": "cybersecurity@se.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "cybersecurity@se.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
gsd-2019-6827
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2019-6827", "description": "A CWE-787: Out-of-bounds Write vulnerability exists in Interactive Graphical SCADA System (IGSS), Version 14 and prior, which could cause a software crash when data in the mdb database is manipulated.", "id": "GSD-2019-6827" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2019-6827" ], "details": "A CWE-787: Out-of-bounds Write vulnerability exists in Interactive Graphical SCADA System (IGSS), Version 14 and prior, which could cause a software crash when data in the mdb database is manipulated.", "id": "GSD-2019-6827", "modified": "2023-12-13T01:23:49.219268Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cybersecurity@schneider-electric.com", "ID": "CVE-2019-6827", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Interactive Graphical SCADA System (IGSS) Version 14 and prior", "version": { "version_data": [ { "version_value": "Interactive Graphical SCADA System (IGSS) Version 14 and prior" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A CWE-787: Out-of-bounds Write vulnerability exists in Interactive Graphical SCADA System (IGSS), Version 14 and prior, which could cause a software crash when data in the mdb database is manipulated." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-787: Out-of-bounds Write" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-190-02", "refsource": "MISC", "url": "https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-190-02" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-19-671/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-19-671/" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:schneider-electric:interactive_graphical_scada_system:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "12.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:schneider-electric:interactive_graphical_scada_system:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "13.0.0.19140", "versionStartIncluding": "13.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:schneider-electric:interactive_graphical_scada_system:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "14.0.0.19120", "versionStartIncluding": "14.0", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cybersecurity@schneider-electric.com", "ID": "CVE-2019-6827" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "A CWE-787: Out-of-bounds Write vulnerability exists in Interactive Graphical SCADA System (IGSS), Version 14 and prior, which could cause a software crash when data in the mdb database is manipulated." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-787" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-190-02", "refsource": "MISC", "tags": [ "Vendor Advisory" ], "url": "https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-190-02" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-19-671/", "refsource": "MISC", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-19-671/" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": true }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9 } }, "lastModifiedDate": "2022-10-14T03:06Z", "publishedDate": "2019-07-15T21:15Z" } } }
CERTFR-2019-AVI-312
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Schneider Electric. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Schneider Electric | N/A | SCADAPack 300 E et 500 E series RTU (312E, 313E, 314E, 330E, 333E, 337E, 350E, 530E, 535E) | ||
Schneider Electric | N/A | SCADAPack 57x RTU (570, 575) | ||
Schneider Electric | N/A | SCADAPack 300 series RTU (314, 330, 334, 350) | ||
Schneider Electric | Modicon M340 | Modicon M340 versions antérieures à V2.70 | ||
Schneider Electric | N/A | Modicon M580 versions antérieures à V2.90 | ||
Schneider Electric | N/A | Modicon Quantum versions antérieures à V3.12 | ||
Schneider Electric | N/A | Interactive Graphical SCADA System (IGSS) versions antérieures à 13.0.0.19140 | ||
Schneider Electric | N/A | Modicon M580 versions antérieures à V2.01 | ||
Schneider Electric | N/A | Modicon Ethernet Module BMENOC0301 versions antérieures à V2.16 | ||
Schneider Electric | Modicon M340 | Modicon M340 versions antérieures à V3.01 | ||
Schneider Electric | N/A | Interactive Graphical SCADA System (IGSS) versions 14.x antérieures à 14.0.0.19120 | ||
Schneider Electric | N/A | Modicon M221 | ||
Schneider Electric | N/A | Zelio Soft 2 versions antérieures à v5.3 | ||
Schneider Electric | N/A | Modicon Premium versions antérieures à V3.10 | ||
Schneider Electric | N/A | SCADAPack 32 RTU | ||
Schneider Electric | N/A | Control Expert versions antérieures à V14.0 sans le dernier correctif de sécurité | ||
Schneider Electric | N/A | Modicon Momentum M1E 171CBU98090Modicon Momentum M1E 171CBU98091 |
Title | Publication Time | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "SCADAPack 300 E et 500 E series RTU (312E, 313E, 314E, 330E, 333E, 337E, 350E, 530E, 535E)", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "SCADAPack 57x RTU (570, 575)", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "SCADAPack 300 series RTU (314, 330, 334, 350)", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "Modicon M340 versions ant\u00e9rieures \u00e0 V2.70", "product": { "name": "Modicon M340", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "Modicon M580 versions ant\u00e9rieures \u00e0 V2.90", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "Modicon Quantum versions ant\u00e9rieures \u00e0 V3.12", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "Interactive Graphical SCADA System (IGSS) versions ant\u00e9rieures \u00e0 13.0.0.19140", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "Modicon M580 versions ant\u00e9rieures \u00e0 V2.01", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "Modicon Ethernet Module BMENOC0301 versions ant\u00e9rieures \u00e0 V2.16", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "Modicon M340 versions ant\u00e9rieures \u00e0 V3.01", "product": { "name": "Modicon M340", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "Interactive Graphical SCADA System (IGSS) versions 14.x ant\u00e9rieures \u00e0 14.0.0.19120", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "Modicon M221", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "Zelio Soft 2 versions ant\u00e9rieures \u00e0 v5.3", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "Modicon Premium versions ant\u00e9rieures \u00e0 V3.10", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "SCADAPack 32 RTU", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "Control Expert versions ant\u00e9rieures \u00e0 V14.0 sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "Modicon Momentum M1E 171CBU98090Modicon Momentum M1E 171CBU98091", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2017-6028", "url": "https://www.cve.org/CVERecord?id=CVE-2017-6028" }, { "name": "CVE-2018-7846", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7846" }, { "name": "CVE-2019-6822", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6822" }, { "name": "CVE-2018-7842", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7842" }, { "name": "CVE-2018-7849", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7849" }, { "name": "CVE-2018-7838", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7838" }, { "name": "CVE-2019-6827", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6827" }, { "name": "CVE-2018-7854", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7854" }, { "name": "CVE-2018-7844", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7844" }, { "name": "CVE-2018-7847", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7847" }, { "name": "CVE-2019-6808", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6808" }, { "name": "CVE-2018-7850", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7850" }, { "name": "CVE-2018-7856", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7856" }, { "name": "CVE-2018-7845", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7845" }, { "name": "CVE-2018-7857", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7857" }, { "name": "CVE-2019-6807", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6807" }, { "name": "CVE-2019-6819", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6819" }, { "name": "CVE-2019-6806", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6806" }, { "name": "CVE-2018-7853", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7853" }, { "name": "CVE-2018-7843", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7843" }, { "name": "CVE-2018-7848", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7848" } ], "initial_release_date": "2019-07-09T00:00:00", "last_revision_date": "2019-07-09T00:00:00", "links": [], "reference": "CERTFR-2019-AVI-312", "revisions": [ { "description": "Version initiale", "revision_date": "2019-07-09T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSchneider Electric. Certaines d\u0027entre elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de\nservice \u00e0 distance et un contournement de la politique de s\u00e9curit\u00e9.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Schneider Electric", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2019-134-05 du 02 juillet 2019", "url": "https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet\u0026p_File_Name=SEVD-2019-134-05-Modicon+Controllers-V1.1.pdf\u0026p_Doc_Ref=SEVD-2019-134-05" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2019-190-01 du 09 juillet 2019", "url": "https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet\u0026p_File_Name=SEVD-2019-190-01-Zelio-Soft-2.pdf\u0026p_Doc_Ref=SEVD-2019-190-01" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2017-065-01 du 09 juillet 2019", "url": "https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet\u0026p_File_Name=SEVD-2017-065-01-Modicon-SCADAPack-V2.0.pdf\u0026p_Doc_Ref=SEVD-2017-065-01" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2019-134-11 du 09 juillet 2019", "url": "https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet\u0026p_File_Name=SEVD-2019-134-11-Modicon-Controllers-V1.1.pdf\u0026p_Doc_Ref=SEVD-2019-134-11" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2019-190-02 du 09 juillet 2019", "url": "https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet\u0026p_File_Name=SEVD-2019-190-02-IGSS.pdf\u0026p_Doc_Ref=SEVD-2019-190-02" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2019-190-03 du 09 juillet 2019", "url": "https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet\u0026p_File_Name=SEVD-2019-190-03-Modicon-M580-Controller.pdf\u0026p_Doc_Ref=SEVD-2019-190-03" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.