Vulnerabilites related to Schneider Electric - SoMachine HVAC
var-201607-0386
Vulnerability from variot
An unspecified ActiveX control in Schneider Electric SoMachine HVAC Programming Software for M171/M172 Controllers before 2.1.0 allows remote attackers to execute arbitrary code via unknown vectors, related to the INTERFACESAFE_FOR_UNTRUSTED_CALLER (aka safe for scripting) flag. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the SetDataIntf method of the AxEditGrid control. The control has an untrusted pointer dereference vulnerability because it blindly calls an attacker-supplied memory address. A remote attacker can leverage this vulnerability to execute arbitrary code under the context of the process. Schneider Electric SoMachine HVAC Programming Software for M171 / M172 Controllers is a set of M171 / M172 controller-specific programming software from Schneider Electric (France). Failed attacks will likely cause denial-of-service conditions
Show details on source website{ "affected_products": { "_id": null, "data": [ { "_id": null, "model": "somachine hvac", "scope": "lte", "trust": 1.0, "vendor": "schneider electric", "version": "2.0.2" }, { "_id": null, "model": "modicon m171 logic controller", "scope": null, "trust": 0.8, "vendor": "schneider electric", "version": null }, { "_id": null, "model": "modicon m172 logic controller", "scope": null, "trust": 0.8, "vendor": "schneider electric", "version": null }, { "_id": null, "model": "somachine hvac programming software", "scope": "lt", "trust": 0.8, "vendor": "schneider electric", "version": "2.1.0" }, { "_id": null, "model": "somachine hvac", "scope": null, "trust": 0.7, "vendor": "schneider electric", "version": null }, { "_id": null, "model": "electric somachine hvac programming software for m171/m172 controllers", "scope": "lt", "trust": 0.6, "vendor": "schneider", "version": "2.1.0" }, { "_id": null, "model": "m171", "scope": "eq", "trust": 0.6, "vendor": "schneider electric", "version": null }, { "_id": null, "model": "m172", "scope": "eq", "trust": 0.6, "vendor": "schneider electric", "version": null }, { "_id": null, "model": "somachine hvac-application", "scope": "eq", "trust": 0.3, "vendor": "schneider electric", "version": "2.0.2" }, { "_id": null, "model": "somachine hvac-application", "scope": "eq", "trust": 0.3, "vendor": "schneider electric", "version": "2.0" } ], "sources": [ { "db": "ZDI", "id": "ZDI-16-440" }, { "db": "CNVD", "id": "CNVD-2016-05142" }, { "db": "BID", "id": "91778" }, { "db": "JVNDB", "id": "JVNDB-2016-003794" }, { "db": "CNNVD", "id": "CNNVD-201607-435" }, { "db": "NVD", "id": "CVE-2016-4529" } ] }, "configurations": { "_id": null, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/h:schneider_electric:m171", "vulnerable": true }, { "cpe22Uri": "cpe:/h:schneider_electric:m172", "vulnerable": true }, { "cpe22Uri": "cpe:/o:schneider_electric:somachine_hvac_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-003794" } ] }, "credits": { "_id": null, "data": "rgod", "sources": [ { "db": "ZDI", "id": "ZDI-16-440" } ], "trust": 0.7 }, "cve": "CVE-2016-4529", "cvss": { "_id": null, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2016-4529", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 2.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2016-05142", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-93348", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "id": "CVE-2016-4529", "impactScore": 3.4, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "Low", "baseScore": 7.3, "baseSeverity": "High", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2016-4529", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2016-4529", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2016-4529", "trust": 0.8, "value": "High" }, { "author": "ZDI", "id": "CVE-2016-4529", "trust": 0.7, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2016-05142", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201607-435", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-93348", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2016-4529", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-16-440" }, { "db": "CNVD", "id": "CNVD-2016-05142" }, { "db": "VULHUB", "id": "VHN-93348" }, { "db": "VULMON", "id": "CVE-2016-4529" }, { "db": "JVNDB", "id": "JVNDB-2016-003794" }, { "db": "CNNVD", "id": "CNNVD-201607-435" }, { "db": "NVD", "id": "CVE-2016-4529" } ] }, "description": { "_id": null, "data": "An unspecified ActiveX control in Schneider Electric SoMachine HVAC Programming Software for M171/M172 Controllers before 2.1.0 allows remote attackers to execute arbitrary code via unknown vectors, related to the INTERFACESAFE_FOR_UNTRUSTED_CALLER (aka safe for scripting) flag. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the SetDataIntf method of the AxEditGrid control. The control has an untrusted pointer dereference vulnerability because it blindly calls an attacker-supplied memory address. A remote attacker can leverage this vulnerability to execute arbitrary code under the context of the process. Schneider Electric SoMachine HVAC Programming Software for M171 / M172 Controllers is a set of M171 / M172 controller-specific programming software from Schneider Electric (France). Failed attacks will likely cause denial-of-service conditions", "sources": [ { "db": "NVD", "id": "CVE-2016-4529" }, { "db": "JVNDB", "id": "JVNDB-2016-003794" }, { "db": "ZDI", "id": "ZDI-16-440" }, { "db": "CNVD", "id": "CNVD-2016-05142" }, { "db": "BID", "id": "91778" }, { "db": "VULHUB", "id": "VHN-93348" }, { "db": "VULMON", "id": "CVE-2016-4529" } ], "trust": 3.24 }, "external_ids": { "_id": null, "data": [ { "db": "NVD", "id": "CVE-2016-4529", "trust": 4.2 }, { "db": "ICS CERT", "id": "ICSA-16-196-03", "trust": 2.9 }, { "db": "ZDI", "id": "ZDI-16-440", "trust": 2.8 }, { "db": "BID", "id": "91778", "trust": 2.7 }, { "db": "SCHNEIDER", "id": "SEVD-2016-161-01", "trust": 2.4 }, { "db": "JVNDB", "id": "JVNDB-2016-003794", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-3581", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-201607-435", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2016-05142", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-93348", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2016-4529", "trust": 0.1 } ], "sources": [ { "db": "ZDI", "id": "ZDI-16-440" }, { "db": "CNVD", "id": "CNVD-2016-05142" }, { "db": "VULHUB", "id": "VHN-93348" }, { "db": "VULMON", "id": "CVE-2016-4529" }, { "db": "BID", "id": "91778" }, { "db": "JVNDB", "id": "JVNDB-2016-003794" }, { "db": "CNNVD", "id": "CNNVD-201607-435" }, { "db": "NVD", "id": "CVE-2016-4529" } ] }, "id": "VAR-201607-0386", "iot": { "_id": null, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2016-05142" }, { "db": "VULHUB", "id": "VHN-93348" } ], "trust": 1.7 }, "iot_taxonomy": { "_id": null, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-05142" } ] }, "last_update_date": "2024-11-23T22:52:39.843000Z", "patch": { "_id": null, "data": [ { "title": "SEVD-2016-161-01", "trust": 0.8, "url": "http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2016-161-01" }, { "title": "Schneider Electric has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-196-03" }, { "title": "Patch for Schneider Electric SoMachine HVAC Programming Software for M171 / M172 Controllers Arbitrary Code Execution Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/79425" }, { "title": "Schneider Electric SoMachine HVAC Programming Software for M171/M172 Controllers Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=62977" }, { "title": "CVE-2016-4529", "trust": 0.1, "url": "https://github.com/AlAIAL90/CVE-2016-4529 " } ], "sources": [ { "db": "ZDI", "id": "ZDI-16-440" }, { "db": "CNVD", "id": "CNVD-2016-05142" }, { "db": "VULMON", "id": "CVE-2016-4529" }, { "db": "JVNDB", "id": "JVNDB-2016-003794" }, { "db": "CNNVD", "id": "CNNVD-201607-435" } ] }, "problemtype_data": { "_id": null, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2016-4529" } ] }, "references": { "_id": null, "data": [ { "trust": 3.7, "url": "https://ics-cert.us-cert.gov/advisories/icsa-16-196-03" }, { "trust": 2.4, "url": "http://download.schneider-electric.com/files?p_doc_ref=sevd-2016-161-01" }, { "trust": 1.8, "url": "http://www.securityfocus.com/bid/91778" }, { "trust": 1.8, "url": "http://www.zerodayinitiative.com/advisories/zdi-16-440" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-4529" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-4529" }, { "trust": 0.3, "url": "http://www.schneider-electric.com/site/home/index.cfm/ww/?selectcountry=true" }, { "trust": 0.3, "url": "http://www.zerodayinitiative.com/advisories/zdi-16-440/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://github.com/alaial90/cve-2016-4529" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "ZDI", "id": "ZDI-16-440" }, { "db": "CNVD", "id": "CNVD-2016-05142" }, { "db": "VULHUB", "id": "VHN-93348" }, { "db": "VULMON", "id": "CVE-2016-4529" }, { "db": "BID", "id": "91778" }, { "db": "JVNDB", "id": "JVNDB-2016-003794" }, { "db": "CNNVD", "id": "CNNVD-201607-435" }, { "db": "NVD", "id": "CVE-2016-4529" } ] }, "sources": { "_id": null, "data": [ { "db": "ZDI", "id": "ZDI-16-440", "ident": null }, { "db": "CNVD", "id": "CNVD-2016-05142", "ident": null }, { "db": "VULHUB", "id": "VHN-93348", "ident": null }, { "db": "VULMON", "id": "CVE-2016-4529", "ident": null }, { "db": "BID", "id": "91778", "ident": null }, { "db": "JVNDB", "id": "JVNDB-2016-003794", "ident": null }, { "db": "CNNVD", "id": "CNNVD-201607-435", "ident": null }, { "db": "NVD", "id": "CVE-2016-4529", "ident": null } ] }, "sources_release_date": { "_id": null, "data": [ { "date": "2016-07-20T00:00:00", "db": "ZDI", "id": "ZDI-16-440", "ident": null }, { "date": "2016-07-21T00:00:00", "db": "CNVD", "id": "CNVD-2016-05142", "ident": null }, { "date": "2016-07-15T00:00:00", "db": "VULHUB", "id": "VHN-93348", "ident": null }, { "date": "2016-07-15T00:00:00", "db": "VULMON", "id": "CVE-2016-4529", "ident": null }, { "date": "2016-07-14T00:00:00", "db": "BID", "id": "91778", "ident": null }, { "date": "2016-07-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-003794", "ident": null }, { "date": "2016-07-18T00:00:00", "db": "CNNVD", "id": "CNNVD-201607-435", "ident": null }, { "date": "2016-07-15T16:59:10.347000", "db": "NVD", "id": "CVE-2016-4529", "ident": null } ] }, "sources_update_date": { "_id": null, "data": [ { "date": "2016-07-20T00:00:00", "db": "ZDI", "id": "ZDI-16-440", "ident": null }, { "date": "2016-07-21T00:00:00", "db": "CNVD", "id": "CNVD-2016-05142", "ident": null }, { "date": "2016-11-28T00:00:00", "db": "VULHUB", "id": "VHN-93348", "ident": null }, { "date": "2021-08-19T00:00:00", "db": "VULMON", "id": "CVE-2016-4529", "ident": null }, { "date": "2016-07-22T00:00:00", "db": "BID", "id": "91778", "ident": null }, { "date": "2016-07-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-003794", "ident": null }, { "date": "2021-08-20T00:00:00", "db": "CNNVD", "id": "CNNVD-201607-435", "ident": null }, { "date": "2024-11-21T02:52:24.890000", "db": "NVD", "id": "CVE-2016-4529", "ident": null } ] }, "threat_type": { "_id": null, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201607-435" } ], "trust": 0.6 }, "title": { "_id": null, "data": "Schneider Electric M171/M172 Logic Controller for SoMachine HVAC Programming of ActiveX Vulnerability in arbitrary code execution in control", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-003794" } ], "trust": 0.8 }, "type": { "_id": null, "data": "lack of information", "sources": [ { "db": "CNNVD", "id": "CNNVD-201607-435" } ], "trust": 0.6 } }
var-201909-0043
Vulnerability from variot
A CWE-426: Untrusted Search Path vulnerability exists in SoMachine HVAC v2.4.1 and earlier versions, which could cause arbitrary code execution on the system running SoMachine HVAC when a malicious DLL library is loaded by the product. SoMachine HVAC Contains an unreliable search path vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Schneider Electric SoMachine HVAC is a set of programming software dedicated to Schneider Electric logic controllers by Schneider Electric in France.
Schneider Electric SoMachine HVAC v2.4.1 and previous versions have code issue vulnerabilities. The vulnerability stems from the problem of improper design or implementation in the code development process of network systems or products. There is currently no detailed vulnerability details provided
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201909-0043", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "somachine hvac", "scope": "lte", "trust": 1.0, "vendor": "schneider electric", "version": "2.4.1" }, { "model": "somachine hvac programming software", "scope": "lte", "trust": 0.8, "vendor": "schneider electric", "version": "2.4.1" }, { "model": "electric schneider electric somachine hvac", "scope": "lt", "trust": 0.6, "vendor": "schneider", "version": "v2.4.1" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-28493" }, { "db": "JVNDB", "id": "JVNDB-2019-009527" }, { "db": "NVD", "id": "CVE-2019-6826" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:schneider_electric:somachine_hvac_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-009527" } ] }, "cve": "CVE-2019-6826", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2019-6826", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CNVD-2020-28493", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2019-6826", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-6826", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-6826", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2019-6826", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2020-28493", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201909-820", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-28493" }, { "db": "JVNDB", "id": "JVNDB-2019-009527" }, { "db": "CNNVD", "id": "CNNVD-201909-820" }, { "db": "NVD", "id": "CVE-2019-6826" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A CWE-426: Untrusted Search Path vulnerability exists in SoMachine HVAC v2.4.1 and earlier versions, which could cause arbitrary code execution on the system running SoMachine HVAC when a malicious DLL library is loaded by the product. SoMachine HVAC Contains an unreliable search path vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Schneider Electric SoMachine HVAC is a set of programming software dedicated to Schneider Electric logic controllers by Schneider Electric in France. \n\r\n\r\nSchneider Electric SoMachine HVAC v2.4.1 and previous versions have code issue vulnerabilities. The vulnerability stems from the problem of improper design or implementation in the code development process of network systems or products. There is currently no detailed vulnerability details provided", "sources": [ { "db": "NVD", "id": "CVE-2019-6826" }, { "db": "JVNDB", "id": "JVNDB-2019-009527" }, { "db": "CNVD", "id": "CNVD-2020-28493" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-6826", "trust": 3.0 }, { "db": "SCHNEIDER", "id": "SEVD-2019-225-04", "trust": 2.2 }, { "db": "JVNDB", "id": "JVNDB-2019-009527", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2020-28493", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201909-820", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-28493" }, { "db": "JVNDB", "id": "JVNDB-2019-009527" }, { "db": "CNNVD", "id": "CNNVD-201909-820" }, { "db": "NVD", "id": "CVE-2019-6826" } ] }, "id": "VAR-201909-0043", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-28493" } ], "trust": 1.6 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-28493" } ] }, "last_update_date": "2024-11-23T22:51:40.344000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SEVD-2019-225-04", "trust": 0.8, "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-225-04/" }, { "title": "Patch for Schneider Electric SoMachine HVAC code issue vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/217741" }, { "title": "Schneider Electric SoMachine HVAC Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=98351" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-28493" }, { "db": "JVNDB", "id": "JVNDB-2019-009527" }, { "db": "CNNVD", "id": "CNNVD-201909-820" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-426", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-009527" }, { "db": "NVD", "id": "CVE-2019-6826" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://www.schneider-electric.com/en/download/document/sevd-2019-225-04/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-6826" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-6826" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-28493" }, { "db": "JVNDB", "id": "JVNDB-2019-009527" }, { "db": "CNNVD", "id": "CNNVD-201909-820" }, { "db": "NVD", "id": "CVE-2019-6826" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-28493" }, { "db": "JVNDB", "id": "JVNDB-2019-009527" }, { "db": "CNNVD", "id": "CNNVD-201909-820" }, { "db": "NVD", "id": "CVE-2019-6826" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-05-17T00:00:00", "db": "CNVD", "id": "CNVD-2020-28493" }, { "date": "2019-09-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-009527" }, { "date": "2019-09-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201909-820" }, { "date": "2019-09-17T20:15:12.077000", "db": "NVD", "id": "CVE-2019-6826" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-05-17T00:00:00", "db": "CNVD", "id": "CNVD-2020-28493" }, { "date": "2019-09-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-009527" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-201909-820" }, { "date": "2024-11-21T04:47:13.780000", "db": "NVD", "id": "CVE-2019-6826" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201909-820" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SoMachine HVAC Vulnerabilities related to untrusted search paths", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-009527" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-201909-820" } ], "trust": 0.6 } }
var-202301-2015
Vulnerability from variot
A CWE-787: Out-of-bounds Write vulnerability exists that could cause sensitive information leakage when accessing a malicious web page from the commissioning software. Affected Products: SoMachine HVAC (Versions prior to V2.1.0), EcoStruxure Machine Expert – HVAC (Versions prior to V1.4.0). Schneider Electric SoMachine HVAC is a set of programming software dedicated to Schneider Electric logic controllers from Schneider Electric in France.
Schneider Electric SoMachine HVAC has a buffer overflow vulnerability, which can be exploited by remote attackers to submit special requests, resulting in the leakage of sensitive information
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202301-2015", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ecostruxure machine expert - hvac", "scope": "lt", "trust": 1.0, "vendor": "schneider electric", "version": "1.4.0" }, { "model": "somachine hvac", "scope": "lt", "trust": 1.0, "vendor": "schneider electric", "version": "2.1.0" }, { "model": "ecostruxure machine expert - hvac", "scope": null, "trust": 0.8, "vendor": "schneider electric", "version": null }, { "model": "somachine - hvac", "scope": "eq", "trust": 0.8, "vendor": "schneider electric", "version": "2.1.0" }, { "model": "electric somachine hvac", "scope": "lt", "trust": 0.6, "vendor": "schneider", "version": "2.1.0" }, { "model": "electric ecostruxure machine expert hvac", "scope": "lt", "trust": 0.6, "vendor": "schneider", "version": "1.4.0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2023-40179" }, { "db": "JVNDB", "id": "JVNDB-2023-003082" }, { "db": "NVD", "id": "CVE-2022-2988" } ] }, "cve": "CVE-2022-2988", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2023-40179", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-2988", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "cybersecurity@se.com", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "id": "CVE-2022-2988", "impactScore": 1.4, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-2988", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-2988", "trust": 1.0, "value": "HIGH" }, { "author": "cybersecurity@se.com", "id": "CVE-2022-2988", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2022-2988", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2023-40179", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202301-2351", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2023-40179" }, { "db": "JVNDB", "id": "JVNDB-2023-003082" }, { "db": "CNNVD", "id": "CNNVD-202301-2351" }, { "db": "NVD", "id": "CVE-2022-2988" }, { "db": "NVD", "id": "CVE-2022-2988" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A CWE-787: Out-of-bounds Write vulnerability exists that could cause sensitive information leakage when accessing a malicious web page from the commissioning software. Affected Products: SoMachine HVAC (Versions prior to V2.1.0), EcoStruxure Machine Expert \u2013 HVAC (Versions prior to V1.4.0). Schneider Electric SoMachine HVAC is a set of programming software dedicated to Schneider Electric logic controllers from Schneider Electric in France. \n\r\n\r\nSchneider Electric SoMachine HVAC has a buffer overflow vulnerability, which can be exploited by remote attackers to submit special requests, resulting in the leakage of sensitive information", "sources": [ { "db": "NVD", "id": "CVE-2022-2988" }, { "db": "JVNDB", "id": "JVNDB-2023-003082" }, { "db": "CNVD", "id": "CNVD-2023-40179" }, { "db": "VULMON", "id": "CVE-2022-2988" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-2988", "trust": 3.9 }, { "db": "SCHNEIDER", "id": "SEVD-2023-010-01", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2023-003082", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2023-40179", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202301-2351", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2022-2988", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2023-40179" }, { "db": "VULMON", "id": "CVE-2022-2988" }, { "db": "JVNDB", "id": "JVNDB-2023-003082" }, { "db": "CNNVD", "id": "CNNVD-202301-2351" }, { "db": "NVD", "id": "CVE-2022-2988" } ] }, "id": "VAR-202301-2015", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2023-40179" } ], "trust": 1.6 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2023-40179" } ] }, "last_update_date": "2024-08-14T15:00:33.806000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SEVD-2023-010-01", "trust": 0.8, "url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-010-01\u0026p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=SEVD-2023-010-01_EcoStruxure_Machine_Expert_Machine_HVAC_Security_Notification.pdf" }, { "title": "Patch for Schneider Electric SoMachine HVAC Buffer Overflow Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/428686" }, { "title": "Schneider Electric SoMachine HVAC Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=223601" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2023-40179" }, { "db": "JVNDB", "id": "JVNDB-2023-003082" }, { "db": "CNNVD", "id": "CNNVD-202301-2351" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.0 }, { "problemtype": "Out-of-bounds writing (CWE-787) [ others ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003082" }, { "db": "NVD", "id": "CVE-2022-2988" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://download.schneider-electric.com/files?p_doc_ref=sevd-2023-010-01\u0026p_endoctype=security+and+safety+notice\u0026p_file_name=sevd-2023-010-01_ecostruxure_machine_expert_machine_hvac_security_notification.pdf" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-2988" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-2988/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/787.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2023-40179" }, { "db": "VULMON", "id": "CVE-2022-2988" }, { "db": "JVNDB", "id": "JVNDB-2023-003082" }, { "db": "CNNVD", "id": "CNNVD-202301-2351" }, { "db": "NVD", "id": "CVE-2022-2988" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2023-40179" }, { "db": "VULMON", "id": "CVE-2022-2988" }, { "db": "JVNDB", "id": "JVNDB-2023-003082" }, { "db": "CNNVD", "id": "CNNVD-202301-2351" }, { "db": "NVD", "id": "CVE-2022-2988" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-05-18T00:00:00", "db": "CNVD", "id": "CNVD-2023-40179" }, { "date": "2023-01-30T00:00:00", "db": "VULMON", "id": "CVE-2022-2988" }, { "date": "2023-08-31T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-003082" }, { "date": "2023-01-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202301-2351" }, { "date": "2023-01-30T11:15:08.807000", "db": "NVD", "id": "CVE-2022-2988" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-05-23T00:00:00", "db": "CNVD", "id": "CNVD-2023-40179" }, { "date": "2023-02-03T00:00:00", "db": "VULMON", "id": "CVE-2022-2988" }, { "date": "2023-08-31T04:36:00", "db": "JVNDB", "id": "JVNDB-2023-003082" }, { "date": "2023-02-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202301-2351" }, { "date": "2023-02-07T17:34:53.647000", "db": "NVD", "id": "CVE-2022-2988" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202301-2351" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SoMachine\u00a0HVAC\u00a0 and \u00a0EcoStruxure\u00a0Machine\u00a0Expert\u00a0-\u00a0HVAC\u00a0 Out-of-bounds write vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003082" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202301-2351" } ], "trust": 0.6 } }
var-201706-0651
Vulnerability from variot
A DLL Hijacking vulnerability in the programming software in Schneider Electric's SoMachine HVAC v2.1.0 allows a remote attacker to execute arbitrary code on the targeted system. The vulnerability exists due to the improper loading of a DLL. SoMachine HVAC is a PLC programming software
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201706-0651", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "somachine", "scope": "eq", "trust": 1.6, "vendor": "schneider electric", "version": "2.1.0" }, { "model": "somachine", "scope": "eq", "trust": 0.8, "vendor": "schneider electric", "version": "hvac 2.1.0" }, { "model": "electric somachine hvac", "scope": "eq", "trust": 0.6, "vendor": "schneider", "version": "2.1.0" }, { "model": "somachine hvac", "scope": "eq", "trust": 0.3, "vendor": "schneider electric", "version": "2.1" }, { "model": "somachine hvac", "scope": "ne", "trust": 0.3, "vendor": "schneider electric", "version": "2.2" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "somachine", "version": "2.1.0" } ], "sources": [ { "db": "IVD", "id": "d24e5bf7-8f13-41cd-9ff1-9b9f830fd317" }, { "db": "CNVD", "id": "CNVD-2017-10359" }, { "db": "BID", "id": "98446" }, { "db": "JVNDB", "id": "JVNDB-2017-004715" }, { "db": "CNNVD", "id": "CNNVD-201704-902" }, { "db": "NVD", "id": "CVE-2017-7966" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:schneider_electric:somachine", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-004715" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Himanshu Mehta", "sources": [ { "db": "BID", "id": "98446" } ], "trust": 0.3 }, "cve": "CVE-2017-7966", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2017-7966", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CNVD-2017-10359", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "d24e5bf7-8f13-41cd-9ff1-9b9f830fd317", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-116169", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2017-7966", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2017-7966", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2017-7966", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2017-10359", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201704-902", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "d24e5bf7-8f13-41cd-9ff1-9b9f830fd317", "trust": 0.2, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-116169", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "d24e5bf7-8f13-41cd-9ff1-9b9f830fd317" }, { "db": "CNVD", "id": "CNVD-2017-10359" }, { "db": "VULHUB", "id": "VHN-116169" }, { "db": "JVNDB", "id": "JVNDB-2017-004715" }, { "db": "CNNVD", "id": "CNNVD-201704-902" }, { "db": "NVD", "id": "CVE-2017-7966" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A DLL Hijacking vulnerability in the programming software in Schneider Electric\u0027s SoMachine HVAC v2.1.0 allows a remote attacker to execute arbitrary code on the targeted system. The vulnerability exists due to the improper loading of a DLL. SoMachine HVAC is a PLC programming software", "sources": [ { "db": "NVD", "id": "CVE-2017-7966" }, { "db": "JVNDB", "id": "JVNDB-2017-004715" }, { "db": "CNVD", "id": "CNVD-2017-10359" }, { "db": "BID", "id": "98446" }, { "db": "IVD", "id": "d24e5bf7-8f13-41cd-9ff1-9b9f830fd317" }, { "db": "VULHUB", "id": "VHN-116169" } ], "trust": 2.7 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-116169", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-116169" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-7966", "trust": 3.6 }, { "db": "BID", "id": "98446", "trust": 2.6 }, { "db": "SCHNEIDER", "id": "SEVD-2017-125-02", "trust": 2.0 }, { "db": "CNNVD", "id": "CNNVD-201704-902", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2017-10359", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2017-004715", "trust": 0.8 }, { "db": "ICS CERT", "id": "ICSA-17-136-02", "trust": 0.3 }, { "db": "IVD", "id": "D24E5BF7-8F13-41CD-9FF1-9B9F830FD317", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-116169", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "d24e5bf7-8f13-41cd-9ff1-9b9f830fd317" }, { "db": "CNVD", "id": "CNVD-2017-10359" }, { "db": "VULHUB", "id": "VHN-116169" }, { "db": "BID", "id": "98446" }, { "db": "JVNDB", "id": "JVNDB-2017-004715" }, { "db": "CNNVD", "id": "CNNVD-201704-902" }, { "db": "NVD", "id": "CVE-2017-7966" } ] }, "id": "VAR-201706-0651", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "d24e5bf7-8f13-41cd-9ff1-9b9f830fd317" }, { "db": "CNVD", "id": "CNVD-2017-10359" }, { "db": "VULHUB", "id": "VHN-116169" } ], "trust": 1.9 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "d24e5bf7-8f13-41cd-9ff1-9b9f830fd317" }, { "db": "CNVD", "id": "CNVD-2017-10359" } ] }, "last_update_date": "2024-11-23T22:34:37.060000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SEVD-2017-125-02", "trust": 0.8, "url": "http://www.schneider-electric.com/en/download/document/SEVD-2017-125-02/" }, { "title": "Schneider Electric SoMachine HVAC patch for arbitrary code execution vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/95695" }, { "title": "Schneider Electric SoMachine HVAC Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=99739" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-10359" }, { "db": "JVNDB", "id": "JVNDB-2017-004715" }, { "db": "CNNVD", "id": "CNNVD-201704-902" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-427", "trust": 1.1 }, { "problemtype": "CWE-284", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-116169" }, { "db": "JVNDB", "id": "JVNDB-2017-004715" }, { "db": "NVD", "id": "CVE-2017-7966" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "http://www.securityfocus.com/bid/98446" }, { "trust": 2.0, "url": "http://www.schneider-electric.com/en/download/document/sevd-2017-125-02/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-7966" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-7966" }, { "trust": 0.3, "url": "http://blog.rapid7.com/?p=5325" }, { "trust": 0.3, "url": "http://blog.metasploit.com/2010/08/exploiting-dll-hijacking-flaws.html" }, { "trust": 0.3, "url": "http://blogs.technet.com/b/srd/archive/2010/08/23/more-information-about-dll-preloading-remote-attack-vector.aspx" }, { "trust": 0.3, "url": "http://www.schneider-electric.com/site/home/index.cfm/ww/?selectcountry=true" }, { "trust": 0.3, "url": "https://ics-cert.us-cert.gov/advisories/icsa-17-136-02" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-10359" }, { "db": "VULHUB", "id": "VHN-116169" }, { "db": "BID", "id": "98446" }, { "db": "JVNDB", "id": "JVNDB-2017-004715" }, { "db": "CNNVD", "id": "CNNVD-201704-902" }, { "db": "NVD", "id": "CVE-2017-7966" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "d24e5bf7-8f13-41cd-9ff1-9b9f830fd317" }, { "db": "CNVD", "id": "CNVD-2017-10359" }, { "db": "VULHUB", "id": "VHN-116169" }, { "db": "BID", "id": "98446" }, { "db": "JVNDB", "id": "JVNDB-2017-004715" }, { "db": "CNNVD", "id": "CNNVD-201704-902" }, { "db": "NVD", "id": "CVE-2017-7966" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-06-20T00:00:00", "db": "IVD", "id": "d24e5bf7-8f13-41cd-9ff1-9b9f830fd317" }, { "date": "2017-06-20T00:00:00", "db": "CNVD", "id": "CNVD-2017-10359" }, { "date": "2017-06-07T00:00:00", "db": "VULHUB", "id": "VHN-116169" }, { "date": "2017-05-05T00:00:00", "db": "BID", "id": "98446" }, { "date": "2017-07-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-004715" }, { "date": "2017-04-20T00:00:00", "db": "CNNVD", "id": "CNNVD-201704-902" }, { "date": "2017-06-07T19:29:00.227000", "db": "NVD", "id": "CVE-2017-7966" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-06-20T00:00:00", "db": "CNVD", "id": "CNVD-2017-10359" }, { "date": "2019-10-03T00:00:00", "db": "VULHUB", "id": "VHN-116169" }, { "date": "2017-05-23T16:26:00", "db": "BID", "id": "98446" }, { "date": "2017-07-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-004715" }, { "date": "2019-10-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201704-902" }, { "date": "2024-11-21T03:33:03.770000", "db": "NVD", "id": "CVE-2017-7966" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201704-902" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Schneider Electric SoMachine HVAC Arbitrary code execution vulnerability", "sources": [ { "db": "IVD", "id": "d24e5bf7-8f13-41cd-9ff1-9b9f830fd317" }, { "db": "CNVD", "id": "CNVD-2017-10359" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Code problem", "sources": [ { "db": "IVD", "id": "d24e5bf7-8f13-41cd-9ff1-9b9f830fd317" }, { "db": "CNNVD", "id": "CNNVD-201704-902" } ], "trust": 0.8 } }
var-201706-0650
Vulnerability from variot
A buffer overflow vulnerability exists in Programming Software executable AlTracePrint.exe, in Schneider Electric's SoMachine HVAC v2.1.0 for Modicon M171/M172 Controller. SoMachine HVAC is a PLC programming software. This vulnerability stems from a security vulnerability in the call to AlTracePrint.exe, which can be exploited by an attacker to cause a buffer overflow. Schneider Electric SoMachine HVAC is prone to a local buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. Successful exploits may allow attackers to execute arbitrary code in context of the application. Failed exploits may result in denial-of-service conditions. Schneider Electric SoMachine HVAC 2.1.0 is vulnerable; other versions may also be affected
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201706-0650", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "somachine hvac", "scope": "eq", "trust": 1.0, "vendor": "schneider electric", "version": "2.1.0" }, { "model": "somachine", "scope": "eq", "trust": 0.8, "vendor": "schneider electric", "version": "v2.1.0" }, { "model": "electric somachine hvac", "scope": "eq", "trust": 0.6, "vendor": "schneider", "version": "2.1.0" }, { "model": "somachine", "scope": "eq", "trust": 0.6, "vendor": "schneider electric", "version": "2.1.0" }, { "model": "somachine hvac", "scope": "eq", "trust": 0.3, "vendor": "schneider electric", "version": "2.1" }, { "model": "somachine hvac", "scope": "ne", "trust": 0.3, "vendor": "schneider electric", "version": "2.2" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "somachine hvac", "version": "2.1.0" } ], "sources": [ { "db": "IVD", "id": "11b1075a-684e-41ec-9aa9-c1b9110102d1" }, { "db": "CNVD", "id": "CNVD-2017-10357" }, { "db": "BID", "id": "98449" }, { "db": "JVNDB", "id": "JVNDB-2017-004756" }, { "db": "CNNVD", "id": "CNNVD-201704-903" }, { "db": "NVD", "id": "CVE-2017-7965" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:schneider_electric:somachine", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-004756" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Zhou Yu", "sources": [ { "db": "BID", "id": "98449" } ], "trust": 0.3 }, "cve": "CVE-2017-7965", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2017-7965", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CNVD-2017-10357", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "11b1075a-684e-41ec-9aa9-c1b9110102d1", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-116168", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.3, "id": "CVE-2017-7965", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.3, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2017-7965", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2017-7965", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2017-7965", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2017-10357", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201704-903", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "11b1075a-684e-41ec-9aa9-c1b9110102d1", "trust": 0.2, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-116168", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "11b1075a-684e-41ec-9aa9-c1b9110102d1" }, { "db": "CNVD", "id": "CNVD-2017-10357" }, { "db": "VULHUB", "id": "VHN-116168" }, { "db": "JVNDB", "id": "JVNDB-2017-004756" }, { "db": "CNNVD", "id": "CNNVD-201704-903" }, { "db": "NVD", "id": "CVE-2017-7965" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A buffer overflow vulnerability exists in Programming Software executable AlTracePrint.exe, in Schneider Electric\u0027s SoMachine HVAC v2.1.0 for Modicon M171/M172 Controller. SoMachine HVAC is a PLC programming software. This vulnerability stems from a security vulnerability in the call to AlTracePrint.exe, which can be exploited by an attacker to cause a buffer overflow. Schneider Electric SoMachine HVAC is prone to a local buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. \nSuccessful exploits may allow attackers to execute arbitrary code in context of the application. Failed exploits may result in denial-of-service conditions. \nSchneider Electric SoMachine HVAC 2.1.0 is vulnerable; other versions may also be affected", "sources": [ { "db": "NVD", "id": "CVE-2017-7965" }, { "db": "JVNDB", "id": "JVNDB-2017-004756" }, { "db": "CNVD", "id": "CNVD-2017-10357" }, { "db": "BID", "id": "98449" }, { "db": "IVD", "id": "11b1075a-684e-41ec-9aa9-c1b9110102d1" }, { "db": "VULHUB", "id": "VHN-116168" } ], "trust": 2.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-7965", "trust": 3.6 }, { "db": "BID", "id": "98449", "trust": 2.6 }, { "db": "SCHNEIDER", "id": "SEVD-2017-125-01", "trust": 2.0 }, { "db": "CNNVD", "id": "CNNVD-201704-903", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2017-10357", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2017-004756", "trust": 0.8 }, { "db": "ICS CERT", "id": "ICSA-17-136-02", "trust": 0.3 }, { "db": "IVD", "id": "11B1075A-684E-41EC-9AA9-C1B9110102D1", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-116168", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "11b1075a-684e-41ec-9aa9-c1b9110102d1" }, { "db": "CNVD", "id": "CNVD-2017-10357" }, { "db": "VULHUB", "id": "VHN-116168" }, { "db": "BID", "id": "98449" }, { "db": "JVNDB", "id": "JVNDB-2017-004756" }, { "db": "CNNVD", "id": "CNNVD-201704-903" }, { "db": "NVD", "id": "CVE-2017-7965" } ] }, "id": "VAR-201706-0650", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "11b1075a-684e-41ec-9aa9-c1b9110102d1" }, { "db": "CNVD", "id": "CNVD-2017-10357" }, { "db": "VULHUB", "id": "VHN-116168" } ], "trust": 1.9 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "11b1075a-684e-41ec-9aa9-c1b9110102d1" }, { "db": "CNVD", "id": "CNVD-2017-10357" } ] }, "last_update_date": "2024-11-23T22:34:37.099000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SEVD-2017-125-01", "trust": 0.8, "url": "http://www.schneider-electric.com/en/download/document/SEVD-2017-125-01/" }, { "title": "Schneider Electric SoMachine HVAC Stack Buffer Overflow Vulnerability Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/95693" }, { "title": "Schneider Electric Modicon M171/M172 Controller SoMachine HVAC Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=100390" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-10357" }, { "db": "JVNDB", "id": "JVNDB-2017-004756" }, { "db": "CNNVD", "id": "CNNVD-201704-903" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-116168" }, { "db": "JVNDB", "id": "JVNDB-2017-004756" }, { "db": "NVD", "id": "CVE-2017-7965" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "http://www.securityfocus.com/bid/98449" }, { "trust": 2.0, "url": "http://www.schneider-electric.com/en/download/document/sevd-2017-125-01/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-7965" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-7965" }, { "trust": 0.3, "url": "http://www.schneider-electric.com/site/home/index.cfm/ww/?selectcountry=true" }, { "trust": 0.3, "url": "https://ics-cert.us-cert.gov/advisories/icsa-17-136-02" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-10357" }, { "db": "VULHUB", "id": "VHN-116168" }, { "db": "BID", "id": "98449" }, { "db": "JVNDB", "id": "JVNDB-2017-004756" }, { "db": "CNNVD", "id": "CNNVD-201704-903" }, { "db": "NVD", "id": "CVE-2017-7965" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "11b1075a-684e-41ec-9aa9-c1b9110102d1" }, { "db": "CNVD", "id": "CNVD-2017-10357" }, { "db": "VULHUB", "id": "VHN-116168" }, { "db": "BID", "id": "98449" }, { "db": "JVNDB", "id": "JVNDB-2017-004756" }, { "db": "CNNVD", "id": "CNNVD-201704-903" }, { "db": "NVD", "id": "CVE-2017-7965" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-06-20T00:00:00", "db": "IVD", "id": "11b1075a-684e-41ec-9aa9-c1b9110102d1" }, { "date": "2017-06-20T00:00:00", "db": "CNVD", "id": "CNVD-2017-10357" }, { "date": "2017-06-07T00:00:00", "db": "VULHUB", "id": "VHN-116168" }, { "date": "2017-05-05T00:00:00", "db": "BID", "id": "98449" }, { "date": "2017-07-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-004756" }, { "date": "2017-04-20T00:00:00", "db": "CNNVD", "id": "CNNVD-201704-903" }, { "date": "2017-06-07T19:29:00.197000", "db": "NVD", "id": "CVE-2017-7965" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-06-20T00:00:00", "db": "CNVD", "id": "CNVD-2017-10357" }, { "date": "2019-10-03T00:00:00", "db": "VULHUB", "id": "VHN-116168" }, { "date": "2017-05-23T16:26:00", "db": "BID", "id": "98449" }, { "date": "2017-07-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-004756" }, { "date": "2021-08-24T00:00:00", "db": "CNNVD", "id": "CNNVD-201704-903" }, { "date": "2024-11-21T03:33:03.640000", "db": "NVD", "id": "CVE-2017-7965" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "98449" }, { "db": "CNNVD", "id": "CNNVD-201704-903" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Schneider Electric SoMachine HVAC Stack Buffer Overflow Vulnerability", "sources": [ { "db": "IVD", "id": "11b1075a-684e-41ec-9aa9-c1b9110102d1" }, { "db": "CNVD", "id": "CNVD-2017-10357" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer error", "sources": [ { "db": "IVD", "id": "11b1075a-684e-41ec-9aa9-c1b9110102d1" }, { "db": "CNNVD", "id": "CNNVD-201704-903" } ], "trust": 0.8 } }
cve-2022-2988
Vulnerability from cvelistv5
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Schneider Electric | SoMachine HVAC |
Version: All < V2.1.0 |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T00:53:00.478Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-010-01\u0026p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=SEVD-2023-010-01_EcoStruxure_Machine_Expert_Machine_HVAC_Security_Notification.pdf" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-2988", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-05T19:50:42.632868Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-05T20:08:49.920Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "SoMachine HVAC", "vendor": "Schneider Electric", "versions": [ { "lessThan": "V2.1.0", "status": "affected", "version": "All", "versionType": "custom" } ] }, { "product": "EcoStruxure Machine Expert \u2013 HVAC", "vendor": "Schneider Electric", "versions": [ { "lessThan": "V1.4.0", "status": "affected", "version": "All", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "A CWE-787: Out-of-bounds Write vulnerability exists that could cause sensitive information leakage when accessing a malicious web page from the commissioning software. Affected Products: SoMachine HVAC (Versions prior to V2.1.0), EcoStruxure Machine Expert \u2013 HVAC (Versions prior to V1.4.0)" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-03T00:00:00.000Z", "orgId": "076d1eb6-cfab-4401-b34d-6dfc2a413bdb", "shortName": "schneider" }, "references": [ { "url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-010-01\u0026p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=SEVD-2023-010-01_EcoStruxure_Machine_Expert_Machine_HVAC_Security_Notification.pdf" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "076d1eb6-cfab-4401-b34d-6dfc2a413bdb", "assignerShortName": "schneider", "cveId": "CVE-2022-2988", "datePublished": "2023-01-30T00:00:00.000Z", "dateReserved": "2022-08-25T00:00:00.000Z", "dateUpdated": "2025-02-05T20:08:49.920Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }