var-201401-0246
Vulnerability from variot
DNP3Driver.exe in the DNP3 driver in Schneider Electric ClearSCADA 2010 R2 through 2010 R3.1 and SCADA Expert ClearSCADA 2013 R1 through 2013 R1.2 allows remote attackers to cause a denial of service (resource consumption) via IP packets containing errors that trigger event-journal messages. ClearSCADA is an integrated SCADA host platform that includes a rotation training engine, real-time database, web server, alarm processor and reporting software. ClearSCADA is prone to a denial-of-service vulnerability. An attacker can exploit this issue to crash the affected application and cause denial-of-service condition. Both Schneider Electric ClearSCADA and SCADA Expert ClearSCADA are products of French Schneider Electric (Schneider Electric). ClearSCADA is an open software platform specially designed for SCADA systems with multiple remote controllers and sensors; SCADA Expert ClearSCADA is a set of energy efficiency management software monitoring platform in StruxureWare SCADAExpert (industrial automation and control system integration software)
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201401-0246", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "clearscada", "scope": "eq", "trust": 1.6, "vendor": "aveva", "version": "2013" }, { "model": "clearscada", "scope": "eq", "trust": 1.0, "vendor": "aveva", "version": "2010" }, { "model": null, "scope": "eq", "trust": 0.8, "vendor": "clearscada", "version": "2010" }, { "model": null, "scope": "eq", "trust": 0.8, "vendor": "clearscada", "version": "2013" }, { "model": "clearscada", "scope": "eq", "trust": 0.8, "vendor": "schneider electric", "version": "2010 r2 (build 71.4165)" }, { "model": "clearscada", "scope": "eq", "trust": 0.8, "vendor": "schneider electric", "version": "2010 r2.1 (build 71.4325)" }, { "model": "clearscada", "scope": "eq", "trust": 0.8, "vendor": "schneider electric", "version": "2010 r3 (build 72.4560)" }, { "model": "clearscada", "scope": "eq", "trust": 0.8, "vendor": "schneider electric", "version": "2010 r3.1 (build 72.4644)" }, { "model": "scada expert clearscada", "scope": "eq", "trust": 0.8, "vendor": "schneider electric", "version": "2013 r1 (build 73.4729)" }, { "model": "scada expert clearscada", "scope": "eq", "trust": 0.8, "vendor": "schneider electric", "version": "2013 r1.1 (build 73.4832)" }, { "model": "scada expert clearscada", "scope": "eq", "trust": 0.8, "vendor": "schneider electric", "version": "2013 r1.1a (build 73.4903)" }, { "model": "scada expert clearscada", "scope": "eq", "trust": 0.8, "vendor": "schneider electric", "version": "2013 r1.2 (build 73.4955)" }, { "model": "electric clearscada r2 r3.1", "scope": "eq", "trust": 0.6, "vendor": "schneider", "version": "2010-2010" }, { "model": "electric scada expert clearscada r1 r1.2", "scope": "eq", "trust": 0.6, "vendor": "schneider", "version": "2013-2013" }, { "model": "clearscada", "scope": "eq", "trust": 0.6, "vendor": "schneider electric", "version": "2010" }, { "model": "scada expert clearscada", "scope": "eq", "trust": 0.6, "vendor": "schneider electric", "version": "2013" }, { "model": "scada expert clearscada r1.2", "scope": "eq", "trust": 0.3, "vendor": "schneider electric", "version": "2013" }, { "model": "scada expert clearscada r1.1a", "scope": "eq", "trust": 0.3, "vendor": "schneider electric", "version": "2013" }, { "model": "scada expert clearscada r1.1", "scope": "eq", "trust": 0.3, "vendor": "schneider electric", "version": "2013" }, { "model": "scada expert clearscada r1", "scope": "eq", "trust": 0.3, "vendor": "schneider electric", "version": "2013" }, { "model": "clearscada r3.1", "scope": "eq", "trust": 0.3, "vendor": "schneider electric", "version": "2010" }, { "model": "clearscada r3", "scope": "eq", "trust": 0.3, "vendor": "schneider electric", "version": "2010" }, { "model": "clearscada r2.1", "scope": "eq", "trust": 0.3, "vendor": "schneider electric", "version": "2010" }, { "model": "clearscada r2", "scope": "eq", "trust": 0.3, "vendor": "schneider electric", "version": "2010" } ], "sources": [ { "db": "IVD", "id": "4ad3b3e4-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2014-00429" }, { "db": "BID", "id": "64813" }, { "db": "JVNDB", "id": "JVNDB-2013-005850" }, { "db": "CNNVD", "id": "CNNVD-201401-325" }, { "db": "NVD", "id": "CVE-2013-6142" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:schneider_electric:clearscada", "vulnerable": true }, { "cpe22Uri": "cpe:/a:schneider_electric:scada_expert_clearscada", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-005850" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Adam Crain of Automatak and Chris Sistrunk", "sources": [ { "db": "BID", "id": "64813" } ], "trust": 0.3 }, "cve": "CVE-2013-6142", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2013-6142", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CNVD-2014-00429", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "4ad3b3e4-2352-11e6-abef-000c29c66e3d", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-66144", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2013-6142", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2013-6142", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2014-00429", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201401-325", "trust": 0.6, "value": "MEDIUM" }, { "author": "IVD", "id": "4ad3b3e4-2352-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-66144", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "4ad3b3e4-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2014-00429" }, { "db": "VULHUB", "id": "VHN-66144" }, { "db": "JVNDB", "id": "JVNDB-2013-005850" }, { "db": "CNNVD", "id": "CNNVD-201401-325" }, { "db": "NVD", "id": "CVE-2013-6142" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "DNP3Driver.exe in the DNP3 driver in Schneider Electric ClearSCADA 2010 R2 through 2010 R3.1 and SCADA Expert ClearSCADA 2013 R1 through 2013 R1.2 allows remote attackers to cause a denial of service (resource consumption) via IP packets containing errors that trigger event-journal messages. ClearSCADA is an integrated SCADA host platform that includes a rotation training engine, real-time database, web server, alarm processor and reporting software. ClearSCADA is prone to a denial-of-service vulnerability. \nAn attacker can exploit this issue to crash the affected application and cause denial-of-service condition. Both Schneider Electric ClearSCADA and SCADA Expert ClearSCADA are products of French Schneider Electric (Schneider Electric). ClearSCADA is an open software platform specially designed for SCADA systems with multiple remote controllers and sensors; SCADA Expert ClearSCADA is a set of energy efficiency management software monitoring platform in StruxureWare SCADAExpert (industrial automation and control system integration software)", "sources": [ { "db": "NVD", "id": "CVE-2013-6142" }, { "db": "JVNDB", "id": "JVNDB-2013-005850" }, { "db": "CNVD", "id": "CNVD-2014-00429" }, { "db": "BID", "id": "64813" }, { "db": "IVD", "id": "4ad3b3e4-2352-11e6-abef-000c29c66e3d" }, { "db": "VULHUB", "id": "VHN-66144" } ], "trust": 2.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2013-6142", "trust": 3.6 }, { "db": "ICS CERT", "id": "ICSA-14-014-01", "trust": 3.4 }, { "db": "BID", "id": "64813", "trust": 1.0 }, { "db": "CNNVD", "id": "CNNVD-201401-325", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2014-00429", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2013-005850", "trust": 0.8 }, { "db": "IVD", "id": "4AD3B3E4-2352-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-66144", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "4ad3b3e4-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2014-00429" }, { "db": "VULHUB", "id": "VHN-66144" }, { "db": "BID", "id": "64813" }, { "db": "JVNDB", "id": "JVNDB-2013-005850" }, { "db": "CNNVD", "id": "CNNVD-201401-325" }, { "db": "NVD", "id": "CVE-2013-6142" } ] }, "id": "VAR-201401-0246", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "4ad3b3e4-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2014-00429" }, { "db": "VULHUB", "id": "VHN-66144" } ], "trust": 1.7611111166666666 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "4ad3b3e4-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2014-00429" } ] }, "last_update_date": "2024-11-23T22:31:21.497000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "StruxureWare SCADA Expert ClearSCADA - SCADA software for telemetry and remote SCADA applications", "trust": 0.8, "url": "http://www.schneider-electric.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.schneider-electric.com/products/ww/en/5100-software/5135-operating-monitoring/61264-struxureware-scada-expert-clearscada/?xtmc=ClearSCADA\u0026xtcr=1" }, { "title": "Schneider Electric ClearSCADA DNP3Driver.exe Remote Denial of Service Vulnerability Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/42539" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-00429" }, { "db": "JVNDB", "id": "JVNDB-2013-005850" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-399", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-66144" }, { "db": "JVNDB", "id": "JVNDB-2013-005850" }, { "db": "NVD", "id": "CVE-2013-6142" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.4, "url": "http://ics-cert.us-cert.gov/advisories/icsa-14-014-01" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-6142" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-6142" }, { "trust": 0.3, "url": "www.controlmicrosystems.com" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-00429" }, { "db": "VULHUB", "id": "VHN-66144" }, { "db": "BID", "id": "64813" }, { "db": "JVNDB", "id": "JVNDB-2013-005850" }, { "db": "CNNVD", "id": "CNNVD-201401-325" }, { "db": "NVD", "id": "CVE-2013-6142" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "4ad3b3e4-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2014-00429" }, { "db": "VULHUB", "id": "VHN-66144" }, { "db": "BID", "id": "64813" }, { "db": "JVNDB", "id": "JVNDB-2013-005850" }, { "db": "CNNVD", "id": "CNNVD-201401-325" }, { "db": "NVD", "id": "CVE-2013-6142" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-01-17T00:00:00", "db": "IVD", "id": "4ad3b3e4-2352-11e6-abef-000c29c66e3d" }, { "date": "2014-01-17T00:00:00", "db": "CNVD", "id": "CNVD-2014-00429" }, { "date": "2014-01-15T00:00:00", "db": "VULHUB", "id": "VHN-66144" }, { "date": "2014-01-14T00:00:00", "db": "BID", "id": "64813" }, { "date": "2014-01-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-005850" }, { "date": "2014-01-22T00:00:00", "db": "CNNVD", "id": "CNNVD-201401-325" }, { "date": "2014-01-15T16:11:08.363000", "db": "NVD", "id": "CVE-2013-6142" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-01-21T00:00:00", "db": "CNVD", "id": "CNVD-2014-00429" }, { "date": "2018-12-31T00:00:00", "db": "VULHUB", "id": "VHN-66144" }, { "date": "2015-03-19T08:34:00", "db": "BID", "id": "64813" }, { "date": "2014-01-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-005850" }, { "date": "2014-01-22T00:00:00", "db": "CNNVD", "id": "CNNVD-201401-325" }, { "date": "2024-11-21T01:58:44.847000", "db": "NVD", "id": "CVE-2013-6142" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201401-325" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Schneider Electric ClearSCADA DNP3Driver.exe Remote Denial of Service Vulnerability", "sources": [ { "db": "IVD", "id": "4ad3b3e4-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2014-00429" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Resource management error", "sources": [ { "db": "IVD", "id": "4ad3b3e4-2352-11e6-abef-000c29c66e3d" }, { "db": "CNNVD", "id": "CNNVD-201401-325" } ], "trust": 0.8 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.