var-201307-0319
Vulnerability from variot

Alstom Grid MiCOM S1 Agile before 1.0.3 and Alstom Grid MiCOM S1 Studio use weak permissions for the MiCOM S1 %PROGRAMFILES% directory, which allows local users to gain privileges via a Trojan horse executable file. The MiCOM S1 software does not restrict user access to the installer. When the MiCOM S1 application runs, the malicious program is executed, and the successful exploitation of the vulnerability can improve the user. Permissions. Multiple Alstom Grid products are prone to a local access-bypass vulnerability. Local attackers can exploit this issue to bypass certain security restrictions and perform unauthorized actions; this may aid in launching further attacks. Note: An attacker can further exploit this issue to gain administrator privileges to the system

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201307-0319",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "micom s1 studio",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "alstom",
        "version": null
      },
      {
        "model": "micom s1 agile",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "alstom",
        "version": "1.0.2"
      },
      {
        "model": "grid micom s1 agile",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "alstom",
        "version": "1.0.3"
      },
      {
        "model": "grid micom s1 studio",
        "scope": null,
        "trust": 0.8,
        "vendor": "alstom",
        "version": null
      },
      {
        "model": "grid legacy micom s1 studio software",
        "scope": null,
        "trust": 0.6,
        "vendor": "alstom",
        "version": null
      },
      {
        "model": "grid micom s1 agile software",
        "scope": null,
        "trust": 0.6,
        "vendor": "alstom",
        "version": null
      },
      {
        "model": "micom s1 agile",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "alstom",
        "version": "1.0.2"
      },
      {
        "model": "micom s1 agile software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "alstom",
        "version": "1.0.2"
      },
      {
        "model": "legacy micom s1 studio software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "alstom",
        "version": "0"
      },
      {
        "model": "micom s1 agile software",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "alstom",
        "version": "1.0.3"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "micom s1 agile",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "micom s1 studio",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "87f7b1a9-cae2-4c38-a0e8-b8e02cfb5059"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-08914"
      },
      {
        "db": "BID",
        "id": "60942"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-003330"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201307-078"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-2786"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:alstom:micom_s1_agile",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:alstom:micom_s1_studio",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-003330"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The vendor reported this issue.",
    "sources": [
      {
        "db": "BID",
        "id": "60942"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2013-2786",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "SINGLE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.6,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 2.7,
            "id": "CVE-2013-2786",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:L/AC:M/Au:S/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "HIGH",
            "accessVector": "LOCAL",
            "authentication": "SINGLE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 1.5,
            "id": "CNVD-2013-08914",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "HIGH",
            "accessVector": "LOCAL",
            "authentication": "SINGLE",
            "author": "IVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 1.5,
            "id": "87f7b1a9-cae2-4c38-a0e8-b8e02cfb5059",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
            "version": "2.9 [IVD]"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2013-2786",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2013-2786",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2013-08914",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201307-078",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "IVD",
            "id": "87f7b1a9-cae2-4c38-a0e8-b8e02cfb5059",
            "trust": 0.2,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "87f7b1a9-cae2-4c38-a0e8-b8e02cfb5059"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-08914"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-003330"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201307-078"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-2786"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Alstom Grid MiCOM S1 Agile before 1.0.3 and Alstom Grid MiCOM S1 Studio use weak permissions for the MiCOM S1 %PROGRAMFILES% directory, which allows local users to gain privileges via a Trojan horse executable file. The MiCOM S1 software does not restrict user access to the installer. When the MiCOM S1 application runs, the malicious program is executed, and the successful exploitation of the vulnerability can improve the user. Permissions. Multiple Alstom Grid products are prone to a local access-bypass vulnerability. \nLocal attackers can exploit this issue to bypass certain security restrictions and perform unauthorized actions; this may aid in launching further attacks. \nNote: An attacker can further exploit this issue to gain administrator privileges to the system",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2013-2786"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-003330"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-08914"
      },
      {
        "db": "BID",
        "id": "60942"
      },
      {
        "db": "IVD",
        "id": "87f7b1a9-cae2-4c38-a0e8-b8e02cfb5059"
      }
    ],
    "trust": 2.61
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2013-2786",
        "trust": 3.5
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-13-184-01",
        "trust": 3.3
      },
      {
        "db": "BID",
        "id": "60942",
        "trust": 1.5
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-08914",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201307-078",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-003330",
        "trust": 0.8
      },
      {
        "db": "IVD",
        "id": "87F7B1A9-CAE2-4C38-A0E8-B8E02CFB5059",
        "trust": 0.2
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "87f7b1a9-cae2-4c38-a0e8-b8e02cfb5059"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-08914"
      },
      {
        "db": "BID",
        "id": "60942"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-003330"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201307-078"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-2786"
      }
    ]
  },
  "id": "VAR-201307-0319",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "87f7b1a9-cae2-4c38-a0e8-b8e02cfb5059"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-08914"
      }
    ],
    "trust": 1.55
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "87f7b1a9-cae2-4c38-a0e8-b8e02cfb5059"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-08914"
      }
    ]
  },
  "last_update_date": "2024-08-14T14:28:02.507000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://www.alstom.com/grid/"
      },
      {
        "title": "Alstom Grid multiple products local access bypass vulnerability patch",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/34993"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-08914"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-003330"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-264",
        "trust": 1.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-003330"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-2786"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.3,
        "url": "http://ics-cert.us-cert.gov/advisories/icsa-13-184-01"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-2786"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-2786"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/bid/60942"
      },
      {
        "trust": 0.3,
        "url": "http://www.alstom.com/grid/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-08914"
      },
      {
        "db": "BID",
        "id": "60942"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-003330"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201307-078"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-2786"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "87f7b1a9-cae2-4c38-a0e8-b8e02cfb5059"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-08914"
      },
      {
        "db": "BID",
        "id": "60942"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-003330"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201307-078"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-2786"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-07-08T00:00:00",
        "db": "IVD",
        "id": "87f7b1a9-cae2-4c38-a0e8-b8e02cfb5059"
      },
      {
        "date": "2013-07-08T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-08914"
      },
      {
        "date": "2013-07-03T00:00:00",
        "db": "BID",
        "id": "60942"
      },
      {
        "date": "2013-07-16T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-003330"
      },
      {
        "date": "2013-07-12T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201307-078"
      },
      {
        "date": "2013-07-10T22:55:03.500000",
        "db": "NVD",
        "id": "CVE-2013-2786"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-07-08T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-08914"
      },
      {
        "date": "2013-07-03T00:00:00",
        "db": "BID",
        "id": "60942"
      },
      {
        "date": "2013-07-16T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-003330"
      },
      {
        "date": "2013-07-12T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201307-078"
      },
      {
        "date": "2013-07-11T04:00:00",
        "db": "NVD",
        "id": "CVE-2013-2786"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "BID",
        "id": "60942"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201307-078"
      }
    ],
    "trust": 0.9
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Alstom Grid MiCOM S1 Agile and  Alstom Grid MiCOM S1 Studio Vulnerability gained in",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-003330"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "permissions and access control",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201307-078"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…