var-201112-0252
Vulnerability from variot
The Schneider Electric Quantum Ethernet Module, as used in the Quantum 140NOE771 and 140CPU65 modules, the Premium TSXETY and TSXP57 modules, the M340 BMXNOE01 and BMXP3420 modules, and the STB DIO STBNIC2212 and STBNIP2* modules, uses hardcoded passwords for the (1) AUTCSE, (2) AUT_CSE, (3) fdrusers, (4) ftpuser, (5) loader, (6) nic2212, (7) nimrohs2212, (8) nip2212, (9) noe77111_v500, (10) ntpupdate, (11) pcfactory, (12) sysdiag, (13) target, (14) test, (15) USER, and (16) webserver accounts, which makes it easier for remote attackers to obtain access via the (a) TELNET, (b) Windriver Debug, or (c) FTP port. Schneider Electric Modicon Quantum is an automated control platform with a full range of complete processors for complex process control and infrastructure. Schneider Electric Modicon Quantum has several security vulnerabilities, including: (1) Communication between Unity software and PLC without authentication, allowing attackers to perform denial of service and remote code execution attacks. (2) There is a backdoor account that allows access to the system with user or administrator privileges. (3) The HTTP server has a buffer overflow, and the remote attacker can exploit the vulnerability for the denial of service attack. (4) There is a buffer overflow in the FTP server, and a remote attacker can exploit the vulnerability for a denial of service attack. (5) There is also a cross-site scripting attack. The firmware provided by Schneider Schneider Electric Quantum Ethernet Module has a hard-coded problem. Attackers can exploit this issue to gain access to the Telnet port service, Windriver Debug port service, and FTP service. Attackers can exploit this vulnerability to execute arbitrary code within the context of the vulnerable device.
1) Certain unspecified input is not properly sanitised before being returned to the user.
SOLUTION: Filter malicious characters and character sequences in a proxy.
PROVIDED AND/OR DISCOVERED BY: ICS-CERT credits Ruben Santamarta via Digital Bond\x92s SCADA Security Scientific Symposium (S4). ----------------------------------------------------------------------
Secunia is hiring!
Find your next job here:
http://secunia.com/company/jobs/
TITLE: Schneider Electric Ethernet Modules Undocumented Account Security Issues
SECUNIA ADVISORY ID: SA47019
VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/47019/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=47019
RELEASE DATE: 2011-12-14
DISCUSS ADVISORY: http://secunia.com/advisories/47019/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)
http://secunia.com/advisories/47019/
ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=47019
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION: Ruben Santamarta has reported some security issues in multiple Schneider Electric modules, which can be exploited by malicious people to bypass certain security restrictions. modify HTTP passwords and upload malicious firmware.
Please see the ICS-CERT's advisory for a list of affected products and versions.
SOLUTION: Restrict access to trusted hosts only.
PROVIDED AND/OR DISCOVERED BY: Ruben Santamarta
ORIGINAL ADVISORY: Ruben Santamarta: http://reversemode.com/index.php?option=com_content&task=view&id=80&Itemid=1
ICS-CERT: http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-346-01.pdf
OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201112-0252", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "electric quantum ethernet module", "scope": "eq", "trust": 2.4, "vendor": "schneider", "version": "x" }, { "model": "quantum ethernet module 140cpu65160", "scope": "lte", "trust": 1.0, "vendor": "schneider electric", "version": "3.5" }, { "model": "stb dio ethernet module stbnip2212", "scope": "lte", "trust": 1.0, "vendor": "schneider electric", "version": "2.73" }, { "model": "premium ethernet module tsxp575634m", "scope": "lte", "trust": 1.0, "vendor": "schneider electric", "version": "3.5" }, { "model": "quantum ethernet module 140noe77100", "scope": "lte", "trust": 1.0, "vendor": "schneider electric", "version": "3.4" }, { "model": "quantum ethernet module 140cpu65150", "scope": "lte", "trust": 1.0, "vendor": "schneider electric", "version": "3.5" }, { "model": "premium ethernet module tsxety5103", "scope": "lte", "trust": 1.0, "vendor": "schneider electric", "version": "5.0" }, { "model": "premium ethernet module tsxety4103", "scope": "lte", "trust": 1.0, "vendor": "schneider electric", "version": "5.0" }, { "model": "quantum ethernet module 140cpu65260", "scope": "lte", "trust": 1.0, "vendor": "schneider electric", "version": "3.5" }, { "model": "quantum ethernet module 140noe77100", "scope": "lte", "trust": 1.0, "vendor": "schneider electric", "version": "3.3" }, { "model": "premium ethernet module tsxp57163m", "scope": "lte", "trust": 1.0, "vendor": "schneider electric", "version": "4.9" }, { "model": "premium ethernet module tsxp573634m", "scope": "lte", "trust": 1.0, "vendor": "schneider electric", "version": "4.9" }, { "model": "m340 ethernet module bmxnoe0110", "scope": "lte", "trust": 1.0, "vendor": "schneider electric", "version": "4.65" }, { "model": "m340 ethernet module bmxp342030", "scope": "lte", "trust": 1.0, "vendor": "schneider electric", "version": "2.2" }, { "model": "quantum ethernet module 140noe77111", "scope": "lte", "trust": 1.0, "vendor": "schneider electric", "version": "5.0" }, { "model": "m340 ethernet module bmxp342020", "scope": "lte", "trust": 1.0, "vendor": "schneider electric", "version": "2.2" }, { "model": "quantum ethernet module 140noe77101", "scope": "lte", "trust": 1.0, "vendor": "schneider electric", "version": "4.9" }, { "model": "stb dio ethernet module stbnic2212", "scope": "lte", "trust": 1.0, "vendor": "schneider electric", "version": "2.10" }, { "model": "premium ethernet module tsxp574634m", "scope": "lte", "trust": 1.0, "vendor": "schneider electric", "version": "3.5" }, { "model": "m340 ethernet module bmxnoe0100", "scope": "lte", "trust": 1.0, "vendor": "schneider electric", "version": "2.3" }, { "model": "premium ethernet module tsxp572634m", "scope": "lte", "trust": 1.0, "vendor": "schneider electric", "version": "4.9" }, { "model": "premium ethernet module tsxp576634m", "scope": "lte", "trust": 1.0, "vendor": "schneider electric", "version": "3.5" }, { "model": "stb dio ethernet module stbnip2311", "scope": "lte", "trust": 1.0, "vendor": "schneider electric", "version": "3.01" }, { "model": "modicon m340 ethernet module bmxnoe0100", "scope": "lte", "trust": 0.8, "vendor": "schneider electric", "version": "v2.3" }, { "model": "modicon m340 ethernet module bmxnoe0110", "scope": "lte", "trust": 0.8, "vendor": "schneider electric", "version": "v4.65" }, { "model": "modicon m340 ethernet module bmxp342020", "scope": "lte", "trust": 0.8, "vendor": "schneider electric", "version": "v2.2" }, { "model": "modicon m340 ethernet module bmxp342030", "scope": "lte", "trust": 0.8, "vendor": "schneider electric", "version": "v2.2" }, { "model": "premium ethernet module tsxety4103", "scope": "lte", "trust": 0.8, "vendor": "schneider electric", "version": "v5.0" }, { "model": "premium ethernet module tsxety5103", "scope": "lte", "trust": 0.8, "vendor": "schneider electric", "version": "v5.0" }, { "model": "premium ethernet module tsxp571634m", "scope": "lte", "trust": 0.8, "vendor": "schneider electric", "version": "v4.9" }, { "model": "premium ethernet module tsxp572634m", "scope": "lte", "trust": 0.8, "vendor": "schneider electric", "version": "v4.9" }, { "model": "premium ethernet module tsxp573634m", "scope": "lte", "trust": 0.8, "vendor": "schneider electric", "version": "v4.9" }, { "model": "premium ethernet module tsxp574634m", "scope": "lte", "trust": 0.8, "vendor": "schneider electric", "version": "v3.5" }, { "model": "premium ethernet module tsxp575634m", "scope": "lte", "trust": 0.8, "vendor": "schneider electric", "version": "v3.5" }, { "model": "premium ethernet module tsxp576634m", "scope": "lte", "trust": 0.8, "vendor": "schneider electric", "version": "v3.5" }, { "model": "quantum ethernet module 140cpu65150", "scope": "lte", "trust": 0.8, "vendor": "schneider electric", "version": "v3.5" }, { "model": "quantum ethernet module 140cpu65160", "scope": "lte", "trust": 0.8, "vendor": "schneider electric", "version": "v3.5" }, { "model": "quantum ethernet module 140cpu65260", "scope": "lte", "trust": 0.8, "vendor": "schneider electric", "version": "v3.5" }, { "model": "quantum ethernet module 140noe77100", "scope": "lte", "trust": 0.8, "vendor": "schneider electric", "version": "v3.4" }, { "model": "quantum ethernet module 140noe77101", "scope": "lte", "trust": 0.8, "vendor": "schneider electric", "version": "v4.9" }, { "model": "quantum ethernet module 140noe77110", "scope": "lte", "trust": 0.8, "vendor": "schneider electric", "version": "v3.3" }, { "model": "quantum ethernet module 140noe77111", "scope": "lte", "trust": 0.8, "vendor": "schneider electric", "version": "v5.0" }, { "model": "stb dio series module stbnic2212", "scope": "lte", "trust": 0.8, "vendor": "schneider electric", "version": "v2.10" }, { "model": "stb dio series module stbnip2212", "scope": "lte", "trust": 0.8, "vendor": "schneider electric", "version": "v2.73" }, { "model": "stb dio series module stbnip2311", "scope": "lte", "trust": 0.8, "vendor": "schneider electric", "version": "v3.01" }, { "model": "electric modicon quantum", "scope": "eq", "trust": 0.6, "vendor": "schneider", "version": "0" }, { "model": "m340 ethernet module bmxp342030", "scope": "eq", "trust": 0.6, "vendor": "schneider electric", "version": "2.2" }, { "model": "m340 ethernet module bmxnoe0110", "scope": "eq", "trust": 0.6, "vendor": "schneider electric", "version": "4.65" }, { "model": "stb dio ethernet module stbnip2212", "scope": "eq", "trust": 0.6, "vendor": "schneider electric", "version": "2.73" }, { "model": "m340 ethernet module bmxp342020", "scope": "eq", "trust": 0.6, "vendor": "schneider electric", "version": "2.2" }, { "model": "m340 ethernet module bmxnoe0100", "scope": "eq", "trust": 0.6, "vendor": "schneider electric", "version": "2.3" }, { "model": "premium ethernet module tsxp576634m", "scope": "eq", "trust": 0.6, "vendor": "schneider electric", "version": "3.5" }, { "model": "premium ethernet module tsxp574634m", "scope": "eq", "trust": 0.6, "vendor": "schneider electric", "version": "3.5" }, { "model": "stb dio ethernet module stbnip2311", "scope": "eq", "trust": 0.6, "vendor": "schneider electric", "version": "3.01" }, { "model": "stb dio ethernet module stbnic2212", "scope": "eq", "trust": 0.6, "vendor": "schneider electric", "version": "2.10" }, { "model": "premium ethernet module tsxp575634m", "scope": "eq", "trust": 0.6, "vendor": "schneider electric", "version": "3.5" }, { "model": null, "scope": "eq", "trust": 0.4, "vendor": "quantum ethernet module 140noe77100", "version": "*" }, { "model": "electric quantum ethernet module tsxp573634m", "scope": "eq", "trust": 0.3, "vendor": "schneider", "version": "4.9" }, { "model": "electric quantum ethernet module 140noc77101", "scope": "eq", "trust": 0.3, "vendor": "schneider", "version": "1.01" }, { "model": "electric quantum ethernet module bmxnoe0100", "scope": "eq", "trust": 0.3, "vendor": "schneider", "version": "2.3" }, { "model": "electric quantum ethernet module 140noe77101", "scope": "eq", "trust": 0.3, "vendor": "schneider", "version": "4.9" }, { "model": "electric quantum ethernet module bmxnoc0401", "scope": "eq", "trust": 0.3, "vendor": "schneider", "version": "1.01" }, { "model": "electric quantum ethernet module 140noc77100", "scope": "eq", "trust": 0.3, "vendor": "schneider", "version": "1.01" }, { "model": "electric quantum ethernet module tsxp571634m", "scope": "eq", "trust": 0.3, "vendor": "schneider", "version": "4.9" }, { "model": "electric quantum ethernet module 140noe77111", "scope": "eq", "trust": 0.3, "vendor": "schneider", "version": "5.0" }, { "model": "electric quantum ethernet module 140cpu65160", "scope": "eq", "trust": 0.3, "vendor": "schneider", "version": "3.5" }, { "model": "electric quantum ethernet module bmxnoe0110", "scope": "eq", "trust": 0.3, "vendor": "schneider", "version": "4.65" }, { "model": "electric quantum ethernet module 140noe77110", "scope": "eq", "trust": 0.3, "vendor": "schneider", "version": "3.3" }, { "model": "electric quantum ethernet module bmxp342020", "scope": "eq", "trust": 0.3, "vendor": "schneider", "version": "2.2" }, { "model": "electric quantum ethernet module tsxp575634m", "scope": "eq", "trust": 0.3, "vendor": "schneider", "version": "3.5" }, { "model": "electric quantum ethernet module tsxp574634m", "scope": "eq", "trust": 0.3, "vendor": "schneider", "version": "3.5" }, { "model": "electric quantum ethernet module tsxetc101", "scope": "eq", "trust": 0.3, "vendor": "schneider", "version": "1.01" }, { "model": "electric quantum ethernet module stbnip2311", "scope": "eq", "trust": 0.3, "vendor": "schneider", "version": "3.01" }, { "model": "electric quantum ethernet module tsxp572634m", "scope": "eq", "trust": 0.3, "vendor": "schneider", "version": "4.9" }, { "model": "electric quantum ethernet module 140noe77100", "scope": "eq", "trust": 0.3, "vendor": "schneider", "version": "3.4" }, { "model": "electric quantum ethernet module tsxp576634m", "scope": "eq", "trust": 0.3, "vendor": "schneider", "version": "3.5" }, { "model": "electric quantum ethernet module bmxp342030", "scope": "eq", "trust": 0.3, "vendor": "schneider", "version": "2.2" }, { "model": "electric quantum ethernet module stbnip2212", "scope": "eq", "trust": 0.3, "vendor": "schneider", "version": "2.73" }, { "model": "electric quantum ethernet module tsxety5103", "scope": "eq", "trust": 0.3, "vendor": "schneider", "version": "5.0" }, { "model": "electric quantum ethernet module 140cpu65150", "scope": "eq", "trust": 0.3, "vendor": "schneider", "version": "3.5" }, { "model": "electric quantum ethernet module 140cpu65260", "scope": "eq", "trust": 0.3, "vendor": "schneider", "version": "3.5" }, { "model": "electric quantum ethernet module stbnic2212", "scope": "eq", "trust": 0.3, "vendor": "schneider", "version": "2.10" }, { "model": "electric quantum ethernet module tsxety4103", "scope": "eq", "trust": 0.3, "vendor": "schneider", "version": "5.0" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "quantum ethernet module 140cpu65150", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "quantum ethernet module 140cpu65160", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "quantum ethernet module 140cpu65260", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "quantum ethernet module 140noe77101", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "quantum ethernet module 140noe77111", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "premium ethernet module tsxety4103", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "premium ethernet module tsxety5103", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "premium ethernet module tsxp57163m", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "premium ethernet module tsxp572634m", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "premium ethernet module tsxp573634m", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "premium ethernet module tsxp574634m", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "premium ethernet module tsxp575634m", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "premium ethernet module tsxp576634m", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "m340 ethernet module bmxnoe0100", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "m340 ethernet module bmxnoe0110", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "m340 ethernet module bmxp342020", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "m340 ethernet module bmxp342030", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "stb dio ethernet module stbnic2212", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "stb dio ethernet module stbnip2212", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "stb dio ethernet module stbnip2311", "version": "*" } ], "sources": [ { "db": "IVD", "id": "4cffae96-2354-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-0327" }, { "db": "CNVD", "id": "CNVD-2011-5607" }, { "db": "CNVD", "id": "CNVD-2011-5303" }, { "db": "CNVD", "id": "CNVD-2011-5304" }, { "db": "CNVD", "id": "CNVD-2011-5302" }, { "db": "BID", "id": "51046" }, { "db": "JVNDB", "id": "JVNDB-2011-003477" }, { "db": "CNNVD", "id": "CNNVD-201112-344" }, { "db": "NVD", "id": "CVE-2011-4859" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:schneider_electric:m340_ethernet_module_bmxnoe0100", "vulnerable": true }, { "cpe22Uri": "cpe:/a:schneider_electric:m340_ethernet_module_bmxnoe0110", "vulnerable": true }, { "cpe22Uri": "cpe:/a:schneider_electric:m340_ethernet_module_bmxp342020", "vulnerable": true }, { "cpe22Uri": "cpe:/a:schneider_electric:m340_ethernet_module_bmxp342030", "vulnerable": true }, { "cpe22Uri": "cpe:/a:schneider_electric:premium_ethernet_module_tsxety4103", "vulnerable": true }, { "cpe22Uri": "cpe:/a:schneider_electric:premium_ethernet_module_tsxety5103", "vulnerable": true }, { "cpe22Uri": "cpe:/a:schneider_electric:premium_ethernet_module_tsxp57163m", "vulnerable": true }, { "cpe22Uri": "cpe:/a:schneider_electric:premium_ethernet_module_tsxp572634m", "vulnerable": true }, { "cpe22Uri": "cpe:/a:schneider_electric:premium_ethernet_module_tsxp573634m", "vulnerable": true }, { "cpe22Uri": "cpe:/a:schneider_electric:premium_ethernet_module_tsxp574634m", "vulnerable": true }, { "cpe22Uri": "cpe:/a:schneider_electric:premium_ethernet_module_tsxp575634m", "vulnerable": true }, { "cpe22Uri": "cpe:/a:schneider_electric:premium_ethernet_module_tsxp576634m", "vulnerable": true }, { "cpe22Uri": "cpe:/a:schneider_electric:quantum_ethernet_module_140cpu65150", "vulnerable": true }, { "cpe22Uri": "cpe:/a:schneider_electric:quantum_ethernet_module_140cpu65160", "vulnerable": true }, { "cpe22Uri": "cpe:/a:schneider_electric:quantum_ethernet_module_140cpu65260", "vulnerable": true }, { "cpe22Uri": "cpe:/a:schneider_electric:quantum_ethernet_module_140noe77100", "vulnerable": true }, { "cpe22Uri": "cpe:/a:schneider_electric:quantum_ethernet_module_140noe77101", "vulnerable": true }, { "cpe22Uri": "cpe:/a:schneider_electric:quantum_ethernet_module_140noe77110", "vulnerable": true }, { "cpe22Uri": "cpe:/a:schneider_electric:quantum_ethernet_module_140noe77111", "vulnerable": true }, { "cpe22Uri": "cpe:/a:schneider_electric:stb_dio_ethernet_module_stbnic2212", "vulnerable": true }, { "cpe22Uri": "cpe:/a:schneider_electric:stb_dio_ethernet_module_stbnip2212", "vulnerable": true }, { "cpe22Uri": "cpe:/a:schneider_electric:stb_dio_ethernet_module_stbnip2311", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-003477" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Rub?n Santamarta", "sources": [ { "db": "CNNVD", "id": "CNNVD-201112-231" } ], "trust": 0.6 }, "cve": "CVE-2011-4859", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2011-4859", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2011-5607", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "4cffae96-2354-11e6-abef-000c29c66e3d", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-52804", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2011-4859", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2011-4859", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2011-5607", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201112-344", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "4cffae96-2354-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-52804", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2011-4859", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "4cffae96-2354-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2011-5607" }, { "db": "VULHUB", "id": "VHN-52804" }, { "db": "VULMON", "id": "CVE-2011-4859" }, { "db": "JVNDB", "id": "JVNDB-2011-003477" }, { "db": "CNNVD", "id": "CNNVD-201112-344" }, { "db": "NVD", "id": "CVE-2011-4859" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Schneider Electric Quantum Ethernet Module, as used in the Quantum 140NOE771* and 140CPU65* modules, the Premium TSXETY* and TSXP57* modules, the M340 BMXNOE01* and BMXP3420* modules, and the STB DIO STBNIC2212 and STBNIP2* modules, uses hardcoded passwords for the (1) AUTCSE, (2) AUT_CSE, (3) fdrusers, (4) ftpuser, (5) loader, (6) nic2212, (7) nimrohs2212, (8) nip2212, (9) noe77111_v500, (10) ntpupdate, (11) pcfactory, (12) sysdiag, (13) target, (14) test, (15) USER, and (16) webserver accounts, which makes it easier for remote attackers to obtain access via the (a) TELNET, (b) Windriver Debug, or (c) FTP port. Schneider Electric Modicon Quantum is an automated control platform with a full range of complete processors for complex process control and infrastructure. Schneider Electric Modicon Quantum has several security vulnerabilities, including: (1) Communication between Unity software and PLC without authentication, allowing attackers to perform denial of service and remote code execution attacks. (2) There is a backdoor account that allows access to the system with user or administrator privileges. (3) The HTTP server has a buffer overflow, and the remote attacker can exploit the vulnerability for the denial of service attack. (4) There is a buffer overflow in the FTP server, and a remote attacker can exploit the vulnerability for a denial of service attack. (5) There is also a cross-site scripting attack. The firmware provided by Schneider Schneider Electric Quantum Ethernet Module has a hard-coded problem. \nAttackers can exploit this issue to gain access to the Telnet port service, Windriver Debug port service, and FTP service. Attackers can exploit this vulnerability to execute arbitrary code within the context of the vulnerable device. \n\n1) Certain unspecified input is not properly sanitised before being\nreturned to the user. \n\nSOLUTION:\nFilter malicious characters and character sequences in a proxy. \n\nPROVIDED AND/OR DISCOVERED BY:\nICS-CERT credits Ruben Santamarta via Digital Bond\\x92s SCADA Security\nScientific Symposium (S4). ----------------------------------------------------------------------\n\nSecunia is hiring!\n\nFind your next job here:\n\nhttp://secunia.com/company/jobs/\n\n----------------------------------------------------------------------\n\nTITLE:\nSchneider Electric Ethernet Modules Undocumented Account Security\nIssues\n\nSECUNIA ADVISORY ID:\nSA47019\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/47019/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=47019\n\nRELEASE DATE:\n2011-12-14\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/47019/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/47019/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=47019\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nRuben Santamarta has reported some security issues in multiple\nSchneider Electric modules, which can be exploited by malicious\npeople to bypass certain security restrictions. modify HTTP\npasswords and upload malicious firmware. \n\nPlease see the ICS-CERT\u0027s advisory for a list of affected products\nand versions. \n\nSOLUTION:\nRestrict access to trusted hosts only. \n\nPROVIDED AND/OR DISCOVERED BY:\nRuben Santamarta\n\nORIGINAL ADVISORY:\nRuben Santamarta:\nhttp://reversemode.com/index.php?option=com_content\u0026task=view\u0026id=80\u0026Itemid=1\n\nICS-CERT:\nhttp://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-346-01.pdf\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2011-4859" }, { "db": "JVNDB", "id": "JVNDB-2011-003477" }, { "db": "CNVD", "id": "CNVD-2012-0327" }, { "db": "CNVD", "id": "CNVD-2011-5607" }, { "db": "CNVD", "id": "CNVD-2011-5303" }, { "db": "CNVD", "id": "CNVD-2011-5304" }, { "db": "CNVD", "id": "CNVD-2011-5302" }, { "db": "BID", "id": "51046" }, { "db": "IVD", "id": "4cffae96-2354-11e6-abef-000c29c66e3d" }, { "db": "VULHUB", "id": "VHN-52804" }, { "db": "VULMON", "id": "CVE-2011-4859" }, { "db": "PACKETSTORM", "id": "108988" }, { "db": "PACKETSTORM", "id": "107894" } ], "trust": 5.13 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "ICS CERT ALERT", "id": "ICS-ALERT-11-346-01", "trust": 4.8 }, { "db": "NVD", "id": "CVE-2011-4859", "trust": 3.7 }, { "db": "BID", "id": "51046", "trust": 2.9 }, { "db": "ICS CERT ALERT", "id": "ICS-ALERT-12-020-03", "trust": 2.7 }, { "db": "BID", "id": "51605", "trust": 2.4 }, { "db": "ICS CERT", "id": "ICSA-12-018-01", "trust": 2.0 }, { "db": "SECUNIA", "id": "47723", "trust": 1.4 }, { "db": "CNNVD", "id": "CNNVD-201112-344", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2011-5607", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2011-003477", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2012-0327", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2011-5303", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2011-5304", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2011-5302", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201112-231", "trust": 0.6 }, { "db": "IVD", "id": "4CFFAE96-2354-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "SECUNIA", "id": "47019", "trust": 0.2 }, { "db": "SEEBUG", "id": "SSVID-89384", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-52804", "trust": 0.1 }, { "db": "ICS CERT", "id": "ICSA-12-018-01B", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2011-4859", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "108988", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "107894", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "4cffae96-2354-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-0327" }, { "db": "CNVD", "id": "CNVD-2011-5607" }, { "db": "CNVD", "id": "CNVD-2011-5303" }, { "db": "CNVD", "id": "CNVD-2011-5304" }, { "db": "CNVD", "id": "CNVD-2011-5302" }, { "db": "VULHUB", "id": "VHN-52804" }, { "db": "VULMON", "id": "CVE-2011-4859" }, { "db": "BID", "id": "51046" }, { "db": "JVNDB", "id": "JVNDB-2011-003477" }, { "db": "PACKETSTORM", "id": "108988" }, { "db": "PACKETSTORM", "id": "107894" }, { "db": "CNNVD", "id": "CNNVD-201112-231" }, { "db": "CNNVD", "id": "CNNVD-201112-344" }, { "db": "NVD", "id": "CVE-2011-4859" } ] }, "id": "VAR-201112-0252", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "4cffae96-2354-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-0327" }, { "db": "CNVD", "id": "CNVD-2011-5607" }, { "db": "CNVD", "id": "CNVD-2011-5303" }, { "db": "CNVD", "id": "CNVD-2011-5304" }, { "db": "CNVD", "id": "CNVD-2011-5302" }, { "db": "VULHUB", "id": "VHN-52804" } ], "trust": 4.088046045454545 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 3.2 } ], "sources": [ { "db": "IVD", "id": "4cffae96-2354-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-0327" }, { "db": "CNVD", "id": "CNVD-2011-5607" }, { "db": "CNVD", "id": "CNVD-2011-5303" }, { "db": "CNVD", "id": "CNVD-2011-5304" }, { "db": "CNVD", "id": "CNVD-2011-5302" } ] }, "last_update_date": "2024-11-23T21:46:38.792000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "http://www.schneider-electric.com" }, { "title": "\u30b5\u30dd\u30fc\u30c8", "trust": 0.8, "url": "http://www.schneider-electric.co.jp/sites/japan/jp/support/contact/we-care.page" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.schneider-electric.com/site/home/index.cfm/jp/" }, { "title": "Schneider Electric Quantum Ethernet Module Security Vulnerability Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/37440" }, { "title": "Patch for Schneider Electric Quantum Ether Module Hardcoded Validation Credential Validation Bypass Vulnerability (CNVD-2011-5303)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/6294" }, { "title": "Patch for Schneider Electric Quantum Ether Module Hardcoded Validation Credential Validation Bypass Vulnerability (CNVD-2011-5304)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/6296" }, { "title": "Patch for Schneider Electric Quantum Ether Module Hardcoded Validation Credential Validation Bypass Vulnerability (CNVD-2011-5302)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/6297" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-5607" }, { "db": "CNVD", "id": "CNVD-2011-5303" }, { "db": "CNVD", "id": "CNVD-2011-5304" }, { "db": "CNVD", "id": "CNVD-2011-5302" }, { "db": "JVNDB", "id": "JVNDB-2011-003477" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "CWE-DesignError", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-003477" }, { "db": "NVD", "id": "CVE-2011-4859" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.0, "url": "http://www.us-cert.gov/control_systems/pdf/ics-alert-11-346-01.pdf" }, { "trust": 2.7, "url": "http://www.us-cert.gov/control_systems/pdf/ics-alert-12-020-03.pdf" }, { "trust": 2.1, "url": "http://reversemode.com/index.php?option=com_content\u0026task=view\u0026id=80\u0026itemid=1" }, { "trust": 2.0, "url": "http://www.us-cert.gov/control_systems/pdf/icsa-12-018-01.pdf" }, { "trust": 1.8, "url": "http://www.securityfocus.com/bid/51605" }, { "trust": 1.8, "url": "http://www.us-cert.gov/control_systems/pdf/ics-alert-11-346-01.pdfhttp" }, { "trust": 1.2, "url": "http://secunia.com/advisories/47723" }, { "trust": 1.2, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72587" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-4859" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-4859" }, { "trust": 0.7, "url": "http://www.securityfocus.com/bid/51046" }, { "trust": 0.3, "url": "http://www.schneider-electric.com/site/home/index.cfm/ww/?selectcountry=true" }, { "trust": 0.3, "url": "ics-cert advisory " }, { "trust": 0.2, "url": "http://secunia.com/company/jobs/" }, { "trust": 0.2, "url": "http://secunia.com/vulnerability_intelligence/" }, { "trust": 0.2, "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/" }, { "trust": 0.2, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.2, "url": "http://secunia.com/vulnerability_scanning/personal/" }, { "trust": 0.2, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.2, "url": "http://secunia.com/advisories/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://reversemode.com/index.php?option=com_content\u0026amp;task=view\u0026amp;id=80\u0026amp;itemid=1" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://ics-cert.us-cert.gov/advisories/icsa-12-018-01b" }, { "trust": 0.1, "url": "http://secunia.com/advisories/47723/" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=47723" }, { "trust": 0.1, "url": "http://secunia.com/advisories/47723/#comments" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=47019" }, { "trust": 0.1, "url": "http://secunia.com/advisories/47019/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/47019/#comments" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-0327" }, { "db": "CNVD", "id": "CNVD-2011-5607" }, { "db": "CNVD", "id": "CNVD-2011-5303" }, { "db": "CNVD", "id": "CNVD-2011-5304" }, { "db": "CNVD", "id": "CNVD-2011-5302" }, { "db": "VULHUB", "id": "VHN-52804" }, { "db": "VULMON", "id": "CVE-2011-4859" }, { "db": "BID", "id": "51046" }, { "db": "JVNDB", "id": "JVNDB-2011-003477" }, { "db": "PACKETSTORM", "id": "108988" }, { "db": "PACKETSTORM", "id": "107894" }, { "db": "CNNVD", "id": "CNNVD-201112-231" }, { "db": "CNNVD", "id": "CNNVD-201112-344" }, { "db": "NVD", "id": "CVE-2011-4859" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "4cffae96-2354-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-0327" }, { "db": "CNVD", "id": "CNVD-2011-5607" }, { "db": "CNVD", "id": "CNVD-2011-5303" }, { "db": "CNVD", "id": "CNVD-2011-5304" }, { "db": "CNVD", "id": "CNVD-2011-5302" }, { "db": "VULHUB", "id": "VHN-52804" }, { "db": "VULMON", "id": "CVE-2011-4859" }, { "db": "BID", "id": "51046" }, { "db": "JVNDB", "id": "JVNDB-2011-003477" }, { "db": "PACKETSTORM", "id": "108988" }, { "db": "PACKETSTORM", "id": "107894" }, { "db": "CNNVD", "id": "CNNVD-201112-231" }, { "db": "CNNVD", "id": "CNNVD-201112-344" }, { "db": "NVD", "id": "CVE-2011-4859" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-12-20T00:00:00", "db": "IVD", "id": "4cffae96-2354-11e6-abef-000c29c66e3d" }, { "date": "2012-02-01T00:00:00", "db": "CNVD", "id": "CNVD-2012-0327" }, { "date": "2011-12-20T00:00:00", "db": "CNVD", "id": "CNVD-2011-5607" }, { "date": "2011-12-15T00:00:00", "db": "CNVD", "id": "CNVD-2011-5303" }, { "date": "2011-12-15T00:00:00", "db": "CNVD", "id": "CNVD-2011-5304" }, { "date": "2011-12-15T00:00:00", "db": "CNVD", "id": "CNVD-2011-5302" }, { "date": "2011-12-17T00:00:00", "db": "VULHUB", "id": "VHN-52804" }, { "date": "2011-12-17T00:00:00", "db": "VULMON", "id": "CVE-2011-4859" }, { "date": "2011-12-13T00:00:00", "db": "BID", "id": "51046" }, { "date": "2011-12-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-003477" }, { "date": "2012-01-23T08:11:38", "db": "PACKETSTORM", "id": "108988" }, { "date": "2011-12-15T08:07:24", "db": "PACKETSTORM", "id": "107894" }, { "date": "1900-01-01T00:00:00", "db": "CNNVD", "id": "CNNVD-201112-231" }, { "date": "2011-12-20T00:00:00", "db": "CNNVD", "id": "CNNVD-201112-344" }, { "date": "2011-12-17T11:55:11.917000", "db": "NVD", "id": "CVE-2011-4859" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-02-01T00:00:00", "db": "CNVD", "id": "CNVD-2012-0327" }, { "date": "2011-12-20T00:00:00", "db": "CNVD", "id": "CNVD-2011-5607" }, { "date": "2011-12-15T00:00:00", "db": "CNVD", "id": "CNVD-2011-5303" }, { "date": "2011-12-15T00:00:00", "db": "CNVD", "id": "CNVD-2011-5304" }, { "date": "2011-12-15T00:00:00", "db": "CNVD", "id": "CNVD-2011-5302" }, { "date": "2017-08-29T00:00:00", "db": "VULHUB", "id": "VHN-52804" }, { "date": "2017-08-29T00:00:00", "db": "VULMON", "id": "CVE-2011-4859" }, { "date": "2013-09-25T00:15:00", "db": "BID", "id": "51046" }, { "date": "2011-12-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-003477" }, { "date": "2011-12-15T00:00:00", "db": "CNNVD", "id": "CNNVD-201112-231" }, { "date": "2012-01-06T00:00:00", "db": "CNNVD", "id": "CNNVD-201112-344" }, { "date": "2024-11-21T01:33:08.170000", "db": "NVD", "id": "CVE-2011-4859" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201112-231" }, { "db": "CNNVD", "id": "CNNVD-201112-344" } ], "trust": 1.2 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Schneider Electric Quantum Ethernet Module Security Vulnerability", "sources": [ { "db": "IVD", "id": "4cffae96-2354-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2011-5607" }, { "db": "CNNVD", "id": "CNNVD-201112-344" } ], "trust": 1.4 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Design error", "sources": [ { "db": "IVD", "id": "4cffae96-2354-11e6-abef-000c29c66e3d" }, { "db": "CNNVD", "id": "CNNVD-201112-344" } ], "trust": 0.8 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.