Vulnerabilites related to indusoft - web_studio
Vulnerability from fkie_nvd
Published
2011-01-18 18:03
Modified
2024-11-21 01:24
Severity ?
Summary
Stack-based buffer overflow in NTWebServer.exe in the test web service in InduSoft NTWebServer, as distributed in Advantech Studio 6.1 and InduSoft Web Studio 7.0, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a long request to TCP port 80.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
advantech | advantech_studio | 6.1 | |
indusoft | web_studio | 7.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:advantech:advantech_studio:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "5FDDF09B-92F4-4CAC-8897-07C281ACCF65", "vulnerable": true }, { "criteria": "cpe:2.3:a:indusoft:web_studio:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "9033E5E6-3FC5-448A-BA52-A03DDEA638A6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in NTWebServer.exe in the test web service in InduSoft NTWebServer, as distributed in Advantech Studio 6.1 and InduSoft Web Studio 7.0, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a long request to TCP port 80." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en pila en NTWebServer.exe en el servicio web de prueba en InduSoft NTWebServer, seg\u00fan se ha distribuido en Advantech Studio v6.1 y InduSoft Web Studio v7.0, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de demonio) o posiblemente ejecutar c\u00f3digo arbitrario a trav\u00e9s de una petici\u00f3n larga al puerto TCP 80." } ], "id": "CVE-2011-0488", "lastModified": "2024-11-21T01:24:07.093", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-01-18T18:03:09.033", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://downloadt.advantech.com/download/downloadsr.aspx?File_Id=1-I1D7QD" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42883" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42903" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.advantechdirect.com/emarketingprograms/AStudio_Patch/AStudio_Patch.htm" }, { "source": "cve@mitre.org", "url": "http://www.indusoft.com/blog/?p=337" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/506864" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/70396" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/45783" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-10-337-01.pdf" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0092" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0093" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64678" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://downloadt.advantech.com/download/downloadsr.aspx?File_Id=1-I1D7QD" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42883" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42903" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.advantechdirect.com/emarketingprograms/AStudio_Patch/AStudio_Patch.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.indusoft.com/blog/?p=337" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/506864" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/70396" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/45783" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-10-337-01.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0092" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0093" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64678" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-05-04 22:55
Modified
2024-11-21 01:23
Severity ?
Summary
Multiple buffer overflows in the ISSymbol ActiveX control in ISSymbol.ocx 61.6.0.0 and 301.1009.2904.0 in the ISSymbol virtual machine, as distributed in Advantech Studio 6.1 SP6 61.6.01.05, InduSoft Web Studio before 7.0+SP1, and InduSoft Thin Client 7.0, allow remote attackers to execute arbitrary code via a long (1) InternationalOrder, (2) InternationalSeparator, or (3) LogFileName property value; or (4) a long bstrFileName argument to the OpenScreen method.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
advantech | advantech_studio | 6.1 | |
indusoft | thin_client | 7.0 | |
indusoft | web_studio | * | |
indusoft | web_studio | 6.1 | |
indusoft | web_studio | 6.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:advantech:advantech_studio:6.1:sp6_61.6.01.05:*:*:*:*:*:*", "matchCriteriaId": "9D2F2836-EF2C-4110-8740-0F32957B0FCA", "vulnerable": true }, { "criteria": "cpe:2.3:a:indusoft:thin_client:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "26902C28-F3E8-488D-B8F5-4A1E8C731FC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:indusoft:web_studio:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E16C750-58D3-4BED-AB96-52B7365ED5C2", "versionEndIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:indusoft:web_studio:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "82BF1958-F098-4E55-B97C-F15253A63228", "vulnerable": true }, { "criteria": "cpe:2.3:a:indusoft:web_studio:6.1:sp6:*:*:*:*:*:*", "matchCriteriaId": "88A43470-16F3-4B89-A8A3-8B77880A315D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in the ISSymbol ActiveX control in ISSymbol.ocx 61.6.0.0 and 301.1009.2904.0 in the ISSymbol virtual machine, as distributed in Advantech Studio 6.1 SP6 61.6.01.05, InduSoft Web Studio before 7.0+SP1, and InduSoft Thin Client 7.0, allow remote attackers to execute arbitrary code via a long (1) InternationalOrder, (2) InternationalSeparator, or (3) LogFileName property value; or (4) a long bstrFileName argument to the OpenScreen method." }, { "lang": "es", "value": "M\u00faltiples desbordamientos de buffer en el control ActiveX ISSymbol de ISSymbol.ocx 61.6.0.0 y 301.1009.2904.0 de la m\u00e1quina virtual ISSymbol, como se ha distribu\u00eddo en Advantech Studio 6.1 SP6 61.6.01.05, InduSoft Web Studio anteriores a 7.0+SP1, y InduSoft Thin Client 7.0. Permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de los valores de propiedades extensos (1) InternationalOrder, (2) InternationalSeparator, o (3) LogFileName; o (4) un argumento bstrFileName extenso al m\u00e9todo OpenScreen." } ], "id": "CVE-2011-0340", "lastModified": "2024-11-21T01:23:46.210", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-05-04T22:55:01.467", "references": [ { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://ics-cert.us-cert.gov/advisories/ICSA-12-249-03" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42928" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43116" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2011-36/" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2011-37/" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.advantechdirect.com/eMarketingPrograms/AStudio_Patch/AStudio7.0_Patch_Final.htm" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.indusoft.com/hotfixes/hotfixes.php" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.securityfocus.com/bid/47596" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-137-02.pdf" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/1115" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/1116" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://ics-cert.us-cert.gov/advisories/ICSA-12-249-03" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42928" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43116" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2011-36/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2011-37/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.advantechdirect.com/eMarketingPrograms/AStudio_Patch/AStudio7.0_Patch_Final.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.indusoft.com/hotfixes/hotfixes.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/47596" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-137-02.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/1115" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/1116" } ], "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-03-11 17:55
Modified
2024-11-21 01:50
Severity ?
Summary
Absolute path traversal vulnerability in NTWebServer.exe in Indusoft Studio 7.0 and earlier and Advantech Studio 7.0 and earlier allows remote attackers to read arbitrary files via a full pathname in an argument to the sub_401A90 CreateFileW function.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
advantech | advantech_studio | 6.1 | |
advantech | advantech_studio | 6.1 | |
indusoft | web_studio | 6.1 | |
indusoft | web_studio | 6.1 | |
indusoft | web_studio | 7.0 | |
indusoft | web_studio | 7.0b2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:advantech:advantech_studio:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "5FDDF09B-92F4-4CAC-8897-07C281ACCF65", "vulnerable": true }, { "criteria": "cpe:2.3:a:advantech:advantech_studio:6.1:sp6_61.6.01.05:*:*:*:*:*:*", "matchCriteriaId": "9D2F2836-EF2C-4110-8740-0F32957B0FCA", "vulnerable": true }, { "criteria": "cpe:2.3:a:indusoft:web_studio:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "82BF1958-F098-4E55-B97C-F15253A63228", "vulnerable": true }, { "criteria": "cpe:2.3:a:indusoft:web_studio:6.1:sp6:*:*:*:*:*:*", "matchCriteriaId": "88A43470-16F3-4B89-A8A3-8B77880A315D", "vulnerable": true }, { "criteria": "cpe:2.3:a:indusoft:web_studio:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "9033E5E6-3FC5-448A-BA52-A03DDEA638A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:indusoft:web_studio:7.0b2:hotfix7.0.01.04:*:*:*:*:*:*", "matchCriteriaId": "6FB9C6B8-8C0B-4AD1-9F20-034F3A025C19", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Absolute path traversal vulnerability in NTWebServer.exe in Indusoft Studio 7.0 and earlier and Advantech Studio 7.0 and earlier allows remote attackers to read arbitrary files via a full pathname in an argument to the sub_401A90 CreateFileW function." }, { "lang": "es", "value": "Vulnerabilidad de salto de directorio absoluto en NTWebServer.exe en Indusoft Studio v7.0 y anteriores, y Advantech Studio v7.0 y anteriores, permite a atacantes remotos leer archivos de su elecci\u00f3n a trav\u00e9s de un nombre de ruta absoluto en un argumento a la funci\u00f3n sub_401A90 CreateFileW." } ], "id": "CVE-2013-1627", "lastModified": "2024-11-21T01:50:01.667", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-03-11T17:55:01.810", "references": [ { "source": "ics-cert@hq.dhs.gov", "url": "http://ics-cert.us-cert.gov/pdf/ICSA-13-067-01.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://ics-cert.us-cert.gov/pdf/ICSA-13-067-01.pdf" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-04-25 05:12
Modified
2025-02-12 20:56
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
Directory traversal vulnerability in NTWebServer in InduSoft Web Studio 7.1 before SP2 Patch 4 allows remote attackers to read administrative passwords in APP files, and consequently execute arbitrary code, via unspecified web requests.
References
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | http://ics-cert.us-cert.gov/advisories/ICSA-14-107-02 | Patch, Third Party Advisory, US Government Resource | |
ics-cert@hq.dhs.gov | http://www.securityfocus.com/bid/67056 | Broken Link, Third Party Advisory, VDB Entry | |
ics-cert@hq.dhs.gov | https://www.exploit-db.com/exploits/42699/ | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://ics-cert.us-cert.gov/advisories/ICSA-14-107-02 | Patch, Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/67056 | Broken Link, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.exploit-db.com/exploits/42699/ | Exploit, Third Party Advisory, VDB Entry |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
indusoft | web_studio | 7.1 | |
indusoft | web_studio | 7.1 | |
indusoft | web_studio | 7.1 |
{ "cisaActionDue": "2022-05-06", "cisaExploitAdd": "2022-04-15", "cisaRequiredAction": "Apply updates per vendor instructions.", "cisaVulnerabilityName": "InduSoft Web Studio NTWebServer Directory Traversal Vulnerability", "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:indusoft:web_studio:7.1:-:*:*:*:*:*:*", "matchCriteriaId": "0E1F4D9E-CB8B-415C-B040-0460E529DD38", "vulnerable": true }, { "criteria": "cpe:2.3:a:indusoft:web_studio:7.1:sp1:*:*:*:*:*:*", "matchCriteriaId": "15896AF9-B4C0-42B5-AE78-AB05B629D9C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:indusoft:web_studio:7.1:sp2:*:*:*:*:*:*", "matchCriteriaId": "446AC1D0-4F70-42C1-9083-E859F23E1357", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in NTWebServer in InduSoft Web Studio 7.1 before SP2 Patch 4 allows remote attackers to read administrative passwords in APP files, and consequently execute arbitrary code, via unspecified web requests." }, { "lang": "es", "value": "Vulnerabilidad de salto de directorio en NTWebServer en InduSoft Web Studio 7.1 anterior a SP2 Patch 4 permite a a atacantes remotos leer contrase\u00f1as de autenticaci\u00f3n en archivos APP, y como consecuencia ejecutar c\u00f3digo arbitrario, a trav\u00e9s de solicitudes web no especificados." } ], "id": "CVE-2014-0780", "lastModified": "2025-02-12T20:56:51.197", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2014-04-25T05:12:07.787", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-107-02" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/67056" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/42699/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-107-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/67056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/42699/" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2015-09-25 14:59
Modified
2024-11-21 02:36
Severity ?
Summary
Schneider Electric InduSoft Web Studio before 8.0 allows remote attackers to execute arbitrary code or cause a denial of service (unhandled runtime exception and application crash) via a crafted Indusoft Project file.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
indusoft | web_studio | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:indusoft:web_studio:*:*:*:*:*:*:*:*", "matchCriteriaId": "03419479-0C54-4545-922E-D6DD369DAD76", "versionEndIncluding": "7.1.3.6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Schneider Electric InduSoft Web Studio before 8.0 allows remote attackers to execute arbitrary code or cause a denial of service (unhandled runtime exception and application crash) via a crafted Indusoft Project file." }, { "lang": "es", "value": "Vulnerabilidad en Schneider Electric InduSoft Web Studio en versiones anteriores a 8.0, permite a atacantes remotos ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (excepci\u00f3n de tiempo de ejecuci\u00f3n no manejada y ca\u00edda de la aplicaci\u00f3n) a trav\u00e9s de un archivo Indusoft Project." } ], "id": "CVE-2015-7375", "lastModified": "2024-11-21T02:36:40.970", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-09-25T14:59:01.837", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2015-251-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2015-251-01" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-04-18 20:29
Modified
2024-11-21 04:14
Severity ?
Summary
A remote attacker could send a carefully crafted packet in InduSoft Web Studio v8.1 and prior versions, and/or InTouch Machine Edition 2017 v8.1 and prior versions during a tag, alarm, or event related action such as read and write, which may allow remote code execution.
References
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | http://software.schneider-electric.com/pdf/security-bulletin/lfsec00000125/ | Third Party Advisory | |
ics-cert@hq.dhs.gov | http://www.securityfocus.com/bid/103949 | Third Party Advisory, VDB Entry | |
ics-cert@hq.dhs.gov | https://ics-cert.us-cert.gov/advisories/ICSA-18-107-01 | Third Party Advisory, US Government Resource | |
ics-cert@hq.dhs.gov | https://www.tenable.com/security/research/tra-2018-07 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://software.schneider-electric.com/pdf/security-bulletin/lfsec00000125/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/103949 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-18-107-01 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.tenable.com/security/research/tra-2018-07 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
indusoft | web_studio | * | |
industrial-software | intouch_machine_edition_2017 | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:indusoft:web_studio:*:*:*:*:*:*:*:*", "matchCriteriaId": "A6BF553A-0EC5-4652-B8F7-FB27013DE9E3", "versionEndIncluding": "8.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:industrial-software:intouch_machine_edition_2017:*:*:*:*:*:*:*:*", "matchCriteriaId": "2107AE24-C696-462B-8881-5F9E7FC90624", "versionEndIncluding": "8.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A remote attacker could send a carefully crafted packet in InduSoft Web Studio v8.1 and prior versions, and/or InTouch Machine Edition 2017 v8.1 and prior versions during a tag, alarm, or event related action such as read and write, which may allow remote code execution." }, { "lang": "es", "value": "Un atacante remoto podr\u00eda enviar un paquete cuidadosamente manipulado en InduSoft Web Studio, en versiones 8.1 y anteriores, y/o en InTouch Machine Edition 2017, en versiones 8.1 y anteriores, durante una acci\u00f3n relacionada con una etiqueta, alarma o evento como la lectura o escritura. Esto podr\u00eda permitir la ejecuci\u00f3n remota de c\u00f3digo." } ], "id": "CVE-2018-8840", "lastModified": "2024-11-21T04:14:25.670", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-04-18T20:29:00.920", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory" ], "url": "http://software.schneider-electric.com/pdf/security-bulletin/lfsec00000125/" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103949" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-107-01" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory" ], "url": "https://www.tenable.com/security/research/tra-2018-07" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://software.schneider-electric.com/pdf/security-bulletin/lfsec00000125/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103949" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-107-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.tenable.com/security/research/tra-2018-07" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-121" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-05-04 22:55
Modified
2024-11-21 01:27
Severity ?
Summary
Directory traversal vulnerability in NTWebServer in InduSoft Web Studio 6.1 and 7.x before 7.0+Patch 1 allows remote attackers to execute arbitrary code via an invalid request.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
indusoft | web_studio | 6.1 | |
indusoft | web_studio | 7.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:indusoft:web_studio:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "82BF1958-F098-4E55-B97C-F15253A63228", "vulnerable": true }, { "criteria": "cpe:2.3:a:indusoft:web_studio:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "9033E5E6-3FC5-448A-BA52-A03DDEA638A6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in NTWebServer in InduSoft Web Studio 6.1 and 7.x before 7.0+Patch 1 allows remote attackers to execute arbitrary code via an invalid request." }, { "lang": "es", "value": "Vulnerabilidad de salto de directorio en NTWebServer de InduSoft Web Studio 6.1 y 7.x anteriores a 7.0+Patch 1 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de una petici\u00f3n inv\u00e1lida." } ], "id": "CVE-2011-1900", "lastModified": "2024-11-21T01:27:16.640", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-05-04T22:55:03.687", "references": [ { "source": "cve@mitre.org", "url": "http://www.indusoft.com/hotfixes/hotfixes.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.indusoft.com/hotfixes/hotfixes.php" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-08-01 01:59
Modified
2024-11-21 02:24
Severity ?
Summary
Schneider Electric InduSoft Web Studio before 7.1.3.5 Patch 5 and Wonderware InTouch Machine Edition through 7.1 SP3 Patch 4 use cleartext for project-window password storage, which allows local users to obtain sensitive information by reading a file.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
indusoft | web_studio | * | |
wonderware | intouch | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:indusoft:web_studio:*:*:*:*:*:*:*:*", "matchCriteriaId": "E3ADA756-68D5-4137-9481-77B261135422", "versionEndIncluding": "7.1.3.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:wonderware:intouch:*:sp3:*:*:machine:*:*:*", "matchCriteriaId": "AB463977-242E-4844-B243-2816CB369848", "versionEndIncluding": "7.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Schneider Electric InduSoft Web Studio before 7.1.3.5 Patch 5 and Wonderware InTouch Machine Edition through 7.1 SP3 Patch 4 use cleartext for project-window password storage, which allows local users to obtain sensitive information by reading a file." }, { "lang": "es", "value": "Vulnerabilidad en Schneider Electric InduSoft Web Studio en versiones anteriores a 7.1.3.5 Patch 5 y Wonderware InTouch Machine Edition hasta la versi\u00f3n 7.1 SP3 Patch 4, utiliza almacenamiento de contrase\u00f1as en texto plano para project-window, lo que permite a usuarios locales obtener informaci\u00f3n sensible mediante la lectura de un archivo." } ], "id": "CVE-2015-1009", "lastModified": "2024-11-21T02:24:29.147", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 1.7, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.1, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-08-01T01:59:00.067", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Vendor Advisory" ], "url": "http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2015-100-01" }, { "source": "ics-cert@hq.dhs.gov", "url": "https://gcsresource.invensys.com/support/docs/_securitybulletins/Security_bulletin_LFSEC00000110.pdf" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-211-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2015-100-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://gcsresource.invensys.com/support/docs/_securitybulletins/Security_bulletin_LFSEC00000110.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-211-01" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-09-02 16:55
Modified
2024-11-21 01:23
Severity ?
Summary
Multiple buffer overflows in the InduSoft ISSymbol ActiveX control in ISSymbol.ocx 301.1104.601.0 in InduSoft Web Studio 7.0B2 hotfix 7.0.01.04 allow remote attackers to execute arbitrary code via a long parameter to the (1) Open, (2) Close, or (3) SetCurrentLanguage method.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
indusoft | web_studio | 7.0b2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:indusoft:web_studio:7.0b2:hotfix7.0.01.04:*:*:*:*:*:*", "matchCriteriaId": "6FB9C6B8-8C0B-4AD1-9F20-034F3A025C19", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in the InduSoft ISSymbol ActiveX control in ISSymbol.ocx 301.1104.601.0 in InduSoft Web Studio 7.0B2 hotfix 7.0.01.04 allow remote attackers to execute arbitrary code via a long parameter to the (1) Open, (2) Close, or (3) SetCurrentLanguage method." }, { "lang": "es", "value": "M\u00faltiples desbordamientos de buffer en el control ActiveX InduSoft ISSymbol en ISSymbol.ocx v301.1104.601.0 en InduSoft Web Studio v7.0B2 hotfix v7.0.01.04 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un par\u00e1metro largo en el m\u00e9todo (1) Open, (2) Close, o (3) SetCurrentLanguage." } ], "id": "CVE-2011-0342", "lastModified": "2024-11-21T01:23:46.477", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-09-02T16:55:01.460", "references": [ { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://ics-cert.us-cert.gov/advisories/ICSA-11-273-02" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/44875" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2011-61/" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.indusoft.com/hotfixes/hotfixes.php" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.securityfocus.com/bid/49403" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://ics-cert.us-cert.gov/advisories/ICSA-11-273-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/44875" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2011-61/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.indusoft.com/hotfixes/hotfixes.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/49403" } ], "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-12-05 11:55
Modified
2024-11-21 01:31
Severity ?
Summary
CEServer.exe in the CEServer component in the Remote Agent module in InduSoft Web Studio 6.1 and 7.0 does not require authentication, which allows remote attackers to execute arbitrary code via vectors related to creation of a file, loading a DLL, and process control.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
indusoft | web_studio | 6.1 | |
indusoft | web_studio | 7.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:indusoft:web_studio:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "82BF1958-F098-4E55-B97C-F15253A63228", "vulnerable": true }, { "criteria": "cpe:2.3:a:indusoft:web_studio:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "9033E5E6-3FC5-448A-BA52-A03DDEA638A6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "CEServer.exe in the CEServer component in the Remote Agent module in InduSoft Web Studio 6.1 and 7.0 does not require authentication, which allows remote attackers to execute arbitrary code via vectors related to creation of a file, loading a DLL, and process control." }, { "lang": "es", "value": "El componente de CEServer en el m\u00f3dulo de agente remoto en InduSoft Web Studio v6.1 y v7.0 no requiere autenticaci\u00f3n, lo que permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de vectores relacionados con la creaci\u00f3n de un archivo, la carga de un archivo DLL, y el control de procesos." } ], "id": "CVE-2011-4051", "lastModified": "2024-11-21T01:31:45.700", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-12-05T11:55:06.600", "references": [ { "source": "cret@cert.org", "tags": [ "Patch" ], "url": "http://www.indusoft.com/hotfixes/hotfixes.php" }, { "source": "cret@cert.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-11-319-01.pdf" }, { "source": "cret@cert.org", "tags": [ "Patch" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-11-330/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.indusoft.com/hotfixes/hotfixes.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-11-319-01.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-11-330/" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-09-25 14:59
Modified
2024-11-21 02:36
Severity ?
Summary
The Remote Agent component in Schneider Electric InduSoft Web Studio before 8.0 allows remote attackers to execute arbitrary code via unspecified vectors, aka ZDI-CAN-2649.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
indusoft | web_studio | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:indusoft:web_studio:*:*:*:*:*:*:*:*", "matchCriteriaId": "03419479-0C54-4545-922E-D6DD369DAD76", "versionEndIncluding": "7.1.3.6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Remote Agent component in Schneider Electric InduSoft Web Studio before 8.0 allows remote attackers to execute arbitrary code via unspecified vectors, aka ZDI-CAN-2649." }, { "lang": "es", "value": "Vulnerabilidad en el componente Remote Agent en Schneider Electric InduSoft Web Studio en versiones anteriores a 8.0, permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores no especificados, tambi\u00e9n conocida como ZDI-CAN-2649." } ], "id": "CVE-2015-7374", "lastModified": "2024-11-21T02:36:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-09-25T14:59:00.133", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2015-251-01" }, { "source": "cve@mitre.org", "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-451" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2015-251-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-451" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-12-05 11:55
Modified
2024-11-21 01:31
Severity ?
Summary
Stack-based buffer overflow in CEServer.exe in the CEServer component in the Remote Agent module in InduSoft Web Studio 6.1 and 7.0 allows remote attackers to execute arbitrary code via a crafted 0x15 (aka Remove File) operation for a file with a long name.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
indusoft | web_studio | 6.1 | |
indusoft | web_studio | 7.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:indusoft:web_studio:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "82BF1958-F098-4E55-B97C-F15253A63228", "vulnerable": true }, { "criteria": "cpe:2.3:a:indusoft:web_studio:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "9033E5E6-3FC5-448A-BA52-A03DDEA638A6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in CEServer.exe in the CEServer component in the Remote Agent module in InduSoft Web Studio 6.1 and 7.0 allows remote attackers to execute arbitrary code via a crafted 0x15 (aka Remove File) operation for a file with a long name." }, { "lang": "es", "value": "Un desbordamiento de b\u00fafer basado en la pila en CEServer.exe del componente CEServer en el m\u00f3dulo de agente remoto en InduSoft Web Studio v6.1 y v7.0 permite a atacantes remotos ejecutar c\u00f3digo de su eelcci\u00f3n a trav\u00e9s de una operaci\u00f3n 0x15 (o sea la eliminaci\u00f3n de un archivo) para un archivo con un nombre demasiado largo." } ], "id": "CVE-2011-4052", "lastModified": "2024-11-21T01:31:45.807", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-12-05T11:55:06.867", "references": [ { "source": "cret@cert.org", "tags": [ "Patch" ], "url": "http://www.indusoft.com/hotfixes/hotfixes.php" }, { "source": "cret@cert.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-11-319-01.pdf" }, { "source": "cret@cert.org", "tags": [ "Patch" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-11-329/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.indusoft.com/hotfixes/hotfixes.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-11-319-01.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-11-329/" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2011-0340
Vulnerability from cvelistv5
Published
2011-05-04 22:00
Modified
2024-08-06 21:51
Severity ?
EPSS score ?
Summary
Multiple buffer overflows in the ISSymbol ActiveX control in ISSymbol.ocx 61.6.0.0 and 301.1009.2904.0 in the ISSymbol virtual machine, as distributed in Advantech Studio 6.1 SP6 61.6.01.05, InduSoft Web Studio before 7.0+SP1, and InduSoft Thin Client 7.0, allow remote attackers to execute arbitrary code via a long (1) InternationalOrder, (2) InternationalSeparator, or (3) LogFileName property value; or (4) a long bstrFileName argument to the OpenScreen method.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/43116 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/47596 | vdb-entry, x_refsource_BID | |
http://secunia.com/secunia_research/2011-37/ | x_refsource_MISC | |
http://www.vupen.com/english/advisories/2011/1116 | vdb-entry, x_refsource_VUPEN | |
http://ics-cert.us-cert.gov/advisories/ICSA-12-249-03 | x_refsource_MISC | |
http://secunia.com/advisories/42928 | third-party-advisory, x_refsource_SECUNIA | |
http://www.us-cert.gov/control_systems/pdf/ICSA-12-137-02.pdf | x_refsource_MISC | |
http://www.vupen.com/english/advisories/2011/1115 | vdb-entry, x_refsource_VUPEN | |
http://www.indusoft.com/hotfixes/hotfixes.php | x_refsource_CONFIRM | |
http://secunia.com/secunia_research/2011-36/ | x_refsource_MISC | |
http://www.advantechdirect.com/eMarketingPrograms/AStudio_Patch/AStudio7.0_Patch_Final.htm | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:51:07.976Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "43116", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43116" }, { "name": "47596", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/47596" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2011-37/" }, { "name": "ADV-2011-1116", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/1116" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://ics-cert.us-cert.gov/advisories/ICSA-12-249-03" }, { "name": "42928", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42928" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-137-02.pdf" }, { "name": "ADV-2011-1115", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/1115" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.indusoft.com/hotfixes/hotfixes.php" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2011-36/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.advantechdirect.com/eMarketingPrograms/AStudio_Patch/AStudio7.0_Patch_Final.htm" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-04-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in the ISSymbol ActiveX control in ISSymbol.ocx 61.6.0.0 and 301.1009.2904.0 in the ISSymbol virtual machine, as distributed in Advantech Studio 6.1 SP6 61.6.01.05, InduSoft Web Studio before 7.0+SP1, and InduSoft Thin Client 7.0, allow remote attackers to execute arbitrary code via a long (1) InternationalOrder, (2) InternationalSeparator, or (3) LogFileName property value; or (4) a long bstrFileName argument to the OpenScreen method." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-05-22T09:00:00", "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "shortName": "flexera" }, "references": [ { "name": "43116", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43116" }, { "name": "47596", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/47596" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2011-37/" }, { "name": "ADV-2011-1116", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/1116" }, { "tags": [ "x_refsource_MISC" ], "url": "http://ics-cert.us-cert.gov/advisories/ICSA-12-249-03" }, { "name": "42928", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42928" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-137-02.pdf" }, { "name": "ADV-2011-1115", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/1115" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.indusoft.com/hotfixes/hotfixes.php" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2011-36/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.advantechdirect.com/eMarketingPrograms/AStudio_Patch/AStudio7.0_Patch_Final.htm" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "PSIRT-CNA@flexerasoftware.com", "ID": "CVE-2011-0340", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple buffer overflows in the ISSymbol ActiveX control in ISSymbol.ocx 61.6.0.0 and 301.1009.2904.0 in the ISSymbol virtual machine, as distributed in Advantech Studio 6.1 SP6 61.6.01.05, InduSoft Web Studio before 7.0+SP1, and InduSoft Thin Client 7.0, allow remote attackers to execute arbitrary code via a long (1) InternationalOrder, (2) InternationalSeparator, or (3) LogFileName property value; or (4) a long bstrFileName argument to the OpenScreen method." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "43116", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43116" }, { "name": "47596", "refsource": "BID", "url": "http://www.securityfocus.com/bid/47596" }, { "name": "http://secunia.com/secunia_research/2011-37/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2011-37/" }, { "name": "ADV-2011-1116", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/1116" }, { "name": "http://ics-cert.us-cert.gov/advisories/ICSA-12-249-03", "refsource": "MISC", "url": "http://ics-cert.us-cert.gov/advisories/ICSA-12-249-03" }, { "name": "42928", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42928" }, { "name": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-137-02.pdf", "refsource": "MISC", "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-137-02.pdf" }, { "name": "ADV-2011-1115", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/1115" }, { "name": "http://www.indusoft.com/hotfixes/hotfixes.php", "refsource": "CONFIRM", "url": "http://www.indusoft.com/hotfixes/hotfixes.php" }, { "name": "http://secunia.com/secunia_research/2011-36/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2011-36/" }, { "name": "http://www.advantechdirect.com/eMarketingPrograms/AStudio_Patch/AStudio7.0_Patch_Final.htm", "refsource": "CONFIRM", "url": "http://www.advantechdirect.com/eMarketingPrograms/AStudio_Patch/AStudio7.0_Patch_Final.htm" } ] } } } }, "cveMetadata": { "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "assignerShortName": "flexera", "cveId": "CVE-2011-0340", "datePublished": "2011-05-04T22:00:00", "dateReserved": "2011-01-06T00:00:00", "dateUpdated": "2024-08-06T21:51:07.976Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-7375
Vulnerability from cvelistv5
Published
2015-09-25 14:00
Modified
2024-08-06 07:51
Severity ?
EPSS score ?
Summary
Schneider Electric InduSoft Web Studio before 8.0 allows remote attackers to execute arbitrary code or cause a denial of service (unhandled runtime exception and application crash) via a crafted Indusoft Project file.
References
▼ | URL | Tags |
---|---|---|
http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2015-251-01 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T07:51:27.197Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2015-251-01" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-09-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Schneider Electric InduSoft Web Studio before 8.0 allows remote attackers to execute arbitrary code or cause a denial of service (unhandled runtime exception and application crash) via a crafted Indusoft Project file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-09-25T14:57:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2015-251-01" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-7375", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Schneider Electric InduSoft Web Studio before 8.0 allows remote attackers to execute arbitrary code or cause a denial of service (unhandled runtime exception and application crash) via a crafted Indusoft Project file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2015-251-01", "refsource": "CONFIRM", "url": "http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2015-251-01" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-7375", "datePublished": "2015-09-25T14:00:00", "dateReserved": "2015-09-25T00:00:00", "dateUpdated": "2024-08-06T07:51:27.197Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-1009
Vulnerability from cvelistv5
Published
2015-08-01 01:00
Modified
2024-08-06 04:26
Severity ?
EPSS score ?
Summary
Schneider Electric InduSoft Web Studio before 7.1.3.5 Patch 5 and Wonderware InTouch Machine Edition through 7.1 SP3 Patch 4 use cleartext for project-window password storage, which allows local users to obtain sensitive information by reading a file.
References
▼ | URL | Tags |
---|---|---|
https://ics-cert.us-cert.gov/advisories/ICSA-15-211-01 | x_refsource_MISC | |
https://gcsresource.invensys.com/support/docs/_securitybulletins/Security_bulletin_LFSEC00000110.pdf | x_refsource_MISC | |
http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2015-100-01 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T04:26:11.501Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-211-01" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gcsresource.invensys.com/support/docs/_securitybulletins/Security_bulletin_LFSEC00000110.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2015-100-01" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-07-30T00:00:00", "descriptions": [ { "lang": "en", "value": "Schneider Electric InduSoft Web Studio before 7.1.3.5 Patch 5 and Wonderware InTouch Machine Edition through 7.1 SP3 Patch 4 use cleartext for project-window password storage, which allows local users to obtain sensitive information by reading a file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-08-01T01:57:02", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-211-01" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gcsresource.invensys.com/support/docs/_securitybulletins/Security_bulletin_LFSEC00000110.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2015-100-01" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2015-1009", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Schneider Electric InduSoft Web Studio before 7.1.3.5 Patch 5 and Wonderware InTouch Machine Edition through 7.1 SP3 Patch 4 use cleartext for project-window password storage, which allows local users to obtain sensitive information by reading a file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-15-211-01", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-211-01" }, { "name": "https://gcsresource.invensys.com/support/docs/_securitybulletins/Security_bulletin_LFSEC00000110.pdf", "refsource": "MISC", "url": "https://gcsresource.invensys.com/support/docs/_securitybulletins/Security_bulletin_LFSEC00000110.pdf" }, { "name": "http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2015-100-01", "refsource": "CONFIRM", "url": "http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2015-100-01" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2015-1009", "datePublished": "2015-08-01T01:00:00", "dateReserved": "2015-01-10T00:00:00", "dateUpdated": "2024-08-06T04:26:11.501Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-0780
Vulnerability from cvelistv5
Published
2014-04-25 01:00
Modified
2025-02-07 13:57
Severity ?
EPSS score ?
Summary
Directory traversal vulnerability in NTWebServer in InduSoft Web Studio 7.1 before SP2 Patch 4 allows remote attackers to read administrative passwords in APP files, and consequently execute arbitrary code, via unspecified web requests.
References
▼ | URL | Tags |
---|---|---|
https://www.exploit-db.com/exploits/42699/ | exploit, x_refsource_EXPLOIT-DB | |
http://ics-cert.us-cert.gov/advisories/ICSA-14-107-02 | x_refsource_MISC | |
http://www.securityfocus.com/bid/67056 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T09:27:19.473Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "42699", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/42699/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-107-02" }, { "name": "67056", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/67056" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2014-0780", "options": [ { "Exploitation": "active" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-07T13:47:17.851913Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2022-04-15", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2014-0780" }, "type": "kev" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-07T13:57:33.554Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-04-24T00:00:00.000Z", "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in NTWebServer in InduSoft Web Studio 7.1 before SP2 Patch 4 allows remote attackers to read administrative passwords in APP files, and consequently execute arbitrary code, via unspecified web requests." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-15T09:57:01.000Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "name": "42699", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/42699/" }, { "tags": [ "x_refsource_MISC" ], "url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-107-02" }, { "name": "67056", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/67056" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2014-0780", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Directory traversal vulnerability in NTWebServer in InduSoft Web Studio 7.1 before SP2 Patch 4 allows remote attackers to read administrative passwords in APP files, and consequently execute arbitrary code, via unspecified web requests." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "42699", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/42699/" }, { "name": "http://ics-cert.us-cert.gov/advisories/ICSA-14-107-02", "refsource": "MISC", "url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-107-02" }, { "name": "67056", "refsource": "BID", "url": "http://www.securityfocus.com/bid/67056" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2014-0780", "datePublished": "2014-04-25T01:00:00.000Z", "dateReserved": "2014-01-02T00:00:00.000Z", "dateUpdated": "2025-02-07T13:57:33.554Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-0342
Vulnerability from cvelistv5
Published
2011-09-02 16:00
Modified
2024-08-06 21:51
Severity ?
EPSS score ?
Summary
Multiple buffer overflows in the InduSoft ISSymbol ActiveX control in ISSymbol.ocx 301.1104.601.0 in InduSoft Web Studio 7.0B2 hotfix 7.0.01.04 allow remote attackers to execute arbitrary code via a long parameter to the (1) Open, (2) Close, or (3) SetCurrentLanguage method.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/44875 | third-party-advisory, x_refsource_SECUNIA | |
http://secunia.com/secunia_research/2011-61/ | x_refsource_MISC | |
http://ics-cert.us-cert.gov/advisories/ICSA-11-273-02 | x_refsource_MISC | |
http://www.indusoft.com/hotfixes/hotfixes.php | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/49403 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:51:07.857Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "44875", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/44875" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2011-61/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://ics-cert.us-cert.gov/advisories/ICSA-11-273-02" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.indusoft.com/hotfixes/hotfixes.php" }, { "name": "49403", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/49403" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-09-01T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in the InduSoft ISSymbol ActiveX control in ISSymbol.ocx 301.1104.601.0 in InduSoft Web Studio 7.0B2 hotfix 7.0.01.04 allow remote attackers to execute arbitrary code via a long parameter to the (1) Open, (2) Close, or (3) SetCurrentLanguage method." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-05-21T09:00:00", "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "shortName": "flexera" }, "references": [ { "name": "44875", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/44875" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2011-61/" }, { "tags": [ "x_refsource_MISC" ], "url": "http://ics-cert.us-cert.gov/advisories/ICSA-11-273-02" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.indusoft.com/hotfixes/hotfixes.php" }, { "name": "49403", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/49403" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "PSIRT-CNA@flexerasoftware.com", "ID": "CVE-2011-0342", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple buffer overflows in the InduSoft ISSymbol ActiveX control in ISSymbol.ocx 301.1104.601.0 in InduSoft Web Studio 7.0B2 hotfix 7.0.01.04 allow remote attackers to execute arbitrary code via a long parameter to the (1) Open, (2) Close, or (3) SetCurrentLanguage method." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "44875", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/44875" }, { "name": "http://secunia.com/secunia_research/2011-61/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2011-61/" }, { "name": "http://ics-cert.us-cert.gov/advisories/ICSA-11-273-02", "refsource": "MISC", "url": "http://ics-cert.us-cert.gov/advisories/ICSA-11-273-02" }, { "name": "http://www.indusoft.com/hotfixes/hotfixes.php", "refsource": "CONFIRM", "url": "http://www.indusoft.com/hotfixes/hotfixes.php" }, { "name": "49403", "refsource": "BID", "url": "http://www.securityfocus.com/bid/49403" } ] } } } }, "cveMetadata": { "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "assignerShortName": "flexera", "cveId": "CVE-2011-0342", "datePublished": "2011-09-02T16:00:00", "dateReserved": "2011-01-06T00:00:00", "dateUpdated": "2024-08-06T21:51:07.857Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-1900
Vulnerability from cvelistv5
Published
2011-05-04 22:00
Modified
2024-09-17 01:02
Severity ?
EPSS score ?
Summary
Directory traversal vulnerability in NTWebServer in InduSoft Web Studio 6.1 and 7.x before 7.0+Patch 1 allows remote attackers to execute arbitrary code via an invalid request.
References
▼ | URL | Tags |
---|---|---|
http://www.indusoft.com/hotfixes/hotfixes.php | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:45:59.943Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.indusoft.com/hotfixes/hotfixes.php" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in NTWebServer in InduSoft Web Studio 6.1 and 7.x before 7.0+Patch 1 allows remote attackers to execute arbitrary code via an invalid request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-05-04T22:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.indusoft.com/hotfixes/hotfixes.php" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-1900", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Directory traversal vulnerability in NTWebServer in InduSoft Web Studio 6.1 and 7.x before 7.0+Patch 1 allows remote attackers to execute arbitrary code via an invalid request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.indusoft.com/hotfixes/hotfixes.php", "refsource": "CONFIRM", "url": "http://www.indusoft.com/hotfixes/hotfixes.php" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-1900", "datePublished": "2011-05-04T22:00:00Z", "dateReserved": "2011-05-04T00:00:00Z", "dateUpdated": "2024-09-17T01:02:03.169Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-1627
Vulnerability from cvelistv5
Published
2013-03-11 17:00
Modified
2024-09-17 03:38
Severity ?
EPSS score ?
Summary
Absolute path traversal vulnerability in NTWebServer.exe in Indusoft Studio 7.0 and earlier and Advantech Studio 7.0 and earlier allows remote attackers to read arbitrary files via a full pathname in an argument to the sub_401A90 CreateFileW function.
References
▼ | URL | Tags |
---|---|---|
http://ics-cert.us-cert.gov/pdf/ICSA-13-067-01.pdf | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:04:49.613Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://ics-cert.us-cert.gov/pdf/ICSA-13-067-01.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Absolute path traversal vulnerability in NTWebServer.exe in Indusoft Studio 7.0 and earlier and Advantech Studio 7.0 and earlier allows remote attackers to read arbitrary files via a full pathname in an argument to the sub_401A90 CreateFileW function." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-03-11T17:00:00Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://ics-cert.us-cert.gov/pdf/ICSA-13-067-01.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2013-1627", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Absolute path traversal vulnerability in NTWebServer.exe in Indusoft Studio 7.0 and earlier and Advantech Studio 7.0 and earlier allows remote attackers to read arbitrary files via a full pathname in an argument to the sub_401A90 CreateFileW function." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://ics-cert.us-cert.gov/pdf/ICSA-13-067-01.pdf", "refsource": "MISC", "url": "http://ics-cert.us-cert.gov/pdf/ICSA-13-067-01.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2013-1627", "datePublished": "2013-03-11T17:00:00Z", "dateReserved": "2013-02-06T00:00:00Z", "dateUpdated": "2024-09-17T03:38:48.093Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-7374
Vulnerability from cvelistv5
Published
2015-09-25 14:00
Modified
2024-08-06 07:51
Severity ?
EPSS score ?
Summary
The Remote Agent component in Schneider Electric InduSoft Web Studio before 8.0 allows remote attackers to execute arbitrary code via unspecified vectors, aka ZDI-CAN-2649.
References
▼ | URL | Tags |
---|---|---|
http://www.zerodayinitiative.com/advisories/ZDI-15-451 | x_refsource_MISC | |
http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2015-251-01 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T07:51:27.163Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-451" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2015-251-01" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-09-08T00:00:00", "descriptions": [ { "lang": "en", "value": "The Remote Agent component in Schneider Electric InduSoft Web Studio before 8.0 allows remote attackers to execute arbitrary code via unspecified vectors, aka ZDI-CAN-2649." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-06T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-451" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2015-251-01" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-7374", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Remote Agent component in Schneider Electric InduSoft Web Studio before 8.0 allows remote attackers to execute arbitrary code via unspecified vectors, aka ZDI-CAN-2649." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.zerodayinitiative.com/advisories/ZDI-15-451", "refsource": "MISC", "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-451" }, { "name": "http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2015-251-01", "refsource": "CONFIRM", "url": "http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2015-251-01" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-7374", "datePublished": "2015-09-25T14:00:00", "dateReserved": "2015-09-25T00:00:00", "dateUpdated": "2024-08-06T07:51:27.163Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-8840
Vulnerability from cvelistv5
Published
2018-04-18 20:00
Modified
2024-09-16 17:53
Severity ?
EPSS score ?
Summary
A remote attacker could send a carefully crafted packet in InduSoft Web Studio v8.1 and prior versions, and/or InTouch Machine Edition 2017 v8.1 and prior versions during a tag, alarm, or event related action such as read and write, which may allow remote code execution.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/103949 | vdb-entry, x_refsource_BID | |
http://software.schneider-electric.com/pdf/security-bulletin/lfsec00000125/ | x_refsource_MISC | |
https://www.tenable.com/security/research/tra-2018-07 | x_refsource_MISC | |
https://ics-cert.us-cert.gov/advisories/ICSA-18-107-01 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
ICS-CERT | Schneider Electric InduSoft Web Studio and InTouch Machine Edition |
Version: InduSoft Web Studio v8.1 and prior versions, and InTouch Machine Edition 2017 v8.1 and prior versions. |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T07:02:26.247Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "103949", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103949" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://software.schneider-electric.com/pdf/security-bulletin/lfsec00000125/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.tenable.com/security/research/tra-2018-07" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-107-01" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Schneider Electric InduSoft Web Studio and InTouch Machine Edition", "vendor": "ICS-CERT", "versions": [ { "status": "affected", "version": "InduSoft Web Studio v8.1 and prior versions, and InTouch Machine Edition 2017 v8.1 and prior versions." } ] } ], "datePublic": "2018-04-06T00:00:00", "descriptions": [ { "lang": "en", "value": "A remote attacker could send a carefully crafted packet in InduSoft Web Studio v8.1 and prior versions, and/or InTouch Machine Edition 2017 v8.1 and prior versions during a tag, alarm, or event related action such as read and write, which may allow remote code execution." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "STACK-BASED BUFFER OVERFLOW CWE-121", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-04-24T09:57:01", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "name": "103949", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103949" }, { "tags": [ "x_refsource_MISC" ], "url": "http://software.schneider-electric.com/pdf/security-bulletin/lfsec00000125/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.tenable.com/security/research/tra-2018-07" }, { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-107-01" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "DATE_PUBLIC": "2018-04-06T00:00:00", "ID": "CVE-2018-8840", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Schneider Electric InduSoft Web Studio and InTouch Machine Edition", "version": { "version_data": [ { "version_value": "InduSoft Web Studio v8.1 and prior versions, and InTouch Machine Edition 2017 v8.1 and prior versions." } ] } } ] }, "vendor_name": "ICS-CERT" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A remote attacker could send a carefully crafted packet in InduSoft Web Studio v8.1 and prior versions, and/or InTouch Machine Edition 2017 v8.1 and prior versions during a tag, alarm, or event related action such as read and write, which may allow remote code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "STACK-BASED BUFFER OVERFLOW CWE-121" } ] } ] }, "references": { "reference_data": [ { "name": "103949", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103949" }, { "name": "http://software.schneider-electric.com/pdf/security-bulletin/lfsec00000125/", "refsource": "MISC", "url": "http://software.schneider-electric.com/pdf/security-bulletin/lfsec00000125/" }, { "name": "https://www.tenable.com/security/research/tra-2018-07", "refsource": "MISC", "url": "https://www.tenable.com/security/research/tra-2018-07" }, { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-107-01", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-107-01" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2018-8840", "datePublished": "2018-04-18T20:00:00Z", "dateReserved": "2018-03-20T00:00:00", "dateUpdated": "2024-09-16T17:53:19.851Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-4052
Vulnerability from cvelistv5
Published
2011-12-05 11:00
Modified
2024-09-17 02:06
Severity ?
EPSS score ?
Summary
Stack-based buffer overflow in CEServer.exe in the CEServer component in the Remote Agent module in InduSoft Web Studio 6.1 and 7.0 allows remote attackers to execute arbitrary code via a crafted 0x15 (aka Remove File) operation for a file with a long name.
References
▼ | URL | Tags |
---|---|---|
http://www.us-cert.gov/control_systems/pdf/ICSA-11-319-01.pdf | x_refsource_MISC | |
http://www.zerodayinitiative.com/advisories/ZDI-11-329/ | x_refsource_MISC | |
http://www.indusoft.com/hotfixes/hotfixes.php | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:53:32.665Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-11-319-01.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-11-329/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.indusoft.com/hotfixes/hotfixes.php" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in CEServer.exe in the CEServer component in the Remote Agent module in InduSoft Web Studio 6.1 and 7.0 allows remote attackers to execute arbitrary code via a crafted 0x15 (aka Remove File) operation for a file with a long name." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-12-05T11:00:00Z", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-11-319-01.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-11-329/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.indusoft.com/hotfixes/hotfixes.php" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2011-4052", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in CEServer.exe in the CEServer component in the Remote Agent module in InduSoft Web Studio 6.1 and 7.0 allows remote attackers to execute arbitrary code via a crafted 0x15 (aka Remove File) operation for a file with a long name." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.us-cert.gov/control_systems/pdf/ICSA-11-319-01.pdf", "refsource": "MISC", "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-11-319-01.pdf" }, { "name": "http://www.zerodayinitiative.com/advisories/ZDI-11-329/", "refsource": "MISC", "url": "http://www.zerodayinitiative.com/advisories/ZDI-11-329/" }, { "name": "http://www.indusoft.com/hotfixes/hotfixes.php", "refsource": "CONFIRM", "url": "http://www.indusoft.com/hotfixes/hotfixes.php" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2011-4052", "datePublished": "2011-12-05T11:00:00Z", "dateReserved": "2011-10-13T00:00:00Z", "dateUpdated": "2024-09-17T02:06:25.418Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-0488
Vulnerability from cvelistv5
Published
2011-01-18 17:00
Modified
2024-08-06 21:51
Severity ?
EPSS score ?
Summary
Stack-based buffer overflow in NTWebServer.exe in the test web service in InduSoft NTWebServer, as distributed in Advantech Studio 6.1 and InduSoft Web Studio 7.0, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a long request to TCP port 80.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/42903 | third-party-advisory, x_refsource_SECUNIA | |
http://www.osvdb.org/70396 | vdb-entry, x_refsource_OSVDB | |
http://www.indusoft.com/blog/?p=337 | x_refsource_MISC | |
http://www.kb.cert.org/vuls/id/506864 | third-party-advisory, x_refsource_CERT-VN | |
http://www.vupen.com/english/advisories/2011/0093 | vdb-entry, x_refsource_VUPEN | |
http://downloadt.advantech.com/download/downloadsr.aspx?File_Id=1-I1D7QD | x_refsource_CONFIRM | |
http://www.us-cert.gov/control_systems/pdf/ICSA-10-337-01.pdf | x_refsource_MISC | |
http://www.vupen.com/english/advisories/2011/0092 | vdb-entry, x_refsource_VUPEN | |
http://www.advantechdirect.com/emarketingprograms/AStudio_Patch/AStudio_Patch.htm | x_refsource_CONFIRM | |
http://secunia.com/advisories/42883 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/45783 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/64678 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:51:09.075Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "42903", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42903" }, { "name": "70396", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/70396" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.indusoft.com/blog/?p=337" }, { "name": "VU#506864", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/506864" }, { "name": "ADV-2011-0093", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0093" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://downloadt.advantech.com/download/downloadsr.aspx?File_Id=1-I1D7QD" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-10-337-01.pdf" }, { "name": "ADV-2011-0092", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0092" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.advantechdirect.com/emarketingprograms/AStudio_Patch/AStudio_Patch.htm" }, { "name": "42883", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42883" }, { "name": "45783", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/45783" }, { "name": "indusoft-ntwebserver-bo(64678)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64678" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-01-04T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in NTWebServer.exe in the test web service in InduSoft NTWebServer, as distributed in Advantech Studio 6.1 and InduSoft Web Studio 7.0, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a long request to TCP port 80." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "42903", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42903" }, { "name": "70396", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/70396" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.indusoft.com/blog/?p=337" }, { "name": "VU#506864", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/506864" }, { "name": "ADV-2011-0093", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0093" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://downloadt.advantech.com/download/downloadsr.aspx?File_Id=1-I1D7QD" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-10-337-01.pdf" }, { "name": "ADV-2011-0092", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0092" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.advantechdirect.com/emarketingprograms/AStudio_Patch/AStudio_Patch.htm" }, { "name": "42883", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42883" }, { "name": "45783", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/45783" }, { "name": "indusoft-ntwebserver-bo(64678)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64678" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-0488", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in NTWebServer.exe in the test web service in InduSoft NTWebServer, as distributed in Advantech Studio 6.1 and InduSoft Web Studio 7.0, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a long request to TCP port 80." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "42903", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42903" }, { "name": "70396", "refsource": "OSVDB", "url": "http://www.osvdb.org/70396" }, { "name": "http://www.indusoft.com/blog/?p=337", "refsource": "MISC", "url": "http://www.indusoft.com/blog/?p=337" }, { "name": "VU#506864", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/506864" }, { "name": "ADV-2011-0093", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0093" }, { "name": "http://downloadt.advantech.com/download/downloadsr.aspx?File_Id=1-I1D7QD", "refsource": "CONFIRM", "url": "http://downloadt.advantech.com/download/downloadsr.aspx?File_Id=1-I1D7QD" }, { "name": "http://www.us-cert.gov/control_systems/pdf/ICSA-10-337-01.pdf", "refsource": "MISC", "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-10-337-01.pdf" }, { "name": "ADV-2011-0092", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0092" }, { "name": "http://www.advantechdirect.com/emarketingprograms/AStudio_Patch/AStudio_Patch.htm", "refsource": "CONFIRM", "url": "http://www.advantechdirect.com/emarketingprograms/AStudio_Patch/AStudio_Patch.htm" }, { "name": "42883", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42883" }, { "name": "45783", "refsource": "BID", "url": "http://www.securityfocus.com/bid/45783" }, { "name": "indusoft-ntwebserver-bo(64678)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64678" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-0488", "datePublished": "2011-01-18T17:00:00", "dateReserved": "2011-01-18T00:00:00", "dateUpdated": "2024-08-06T21:51:09.075Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-4051
Vulnerability from cvelistv5
Published
2011-12-05 11:00
Modified
2024-09-17 00:01
Severity ?
EPSS score ?
Summary
CEServer.exe in the CEServer component in the Remote Agent module in InduSoft Web Studio 6.1 and 7.0 does not require authentication, which allows remote attackers to execute arbitrary code via vectors related to creation of a file, loading a DLL, and process control.
References
▼ | URL | Tags |
---|---|---|
http://www.us-cert.gov/control_systems/pdf/ICSA-11-319-01.pdf | x_refsource_MISC | |
http://www.indusoft.com/hotfixes/hotfixes.php | x_refsource_CONFIRM | |
http://www.zerodayinitiative.com/advisories/ZDI-11-330/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:53:32.634Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-11-319-01.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.indusoft.com/hotfixes/hotfixes.php" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-11-330/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "CEServer.exe in the CEServer component in the Remote Agent module in InduSoft Web Studio 6.1 and 7.0 does not require authentication, which allows remote attackers to execute arbitrary code via vectors related to creation of a file, loading a DLL, and process control." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-12-05T11:00:00Z", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-11-319-01.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.indusoft.com/hotfixes/hotfixes.php" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-11-330/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2011-4051", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "CEServer.exe in the CEServer component in the Remote Agent module in InduSoft Web Studio 6.1 and 7.0 does not require authentication, which allows remote attackers to execute arbitrary code via vectors related to creation of a file, loading a DLL, and process control." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.us-cert.gov/control_systems/pdf/ICSA-11-319-01.pdf", "refsource": "MISC", "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-11-319-01.pdf" }, { "name": "http://www.indusoft.com/hotfixes/hotfixes.php", "refsource": "CONFIRM", "url": "http://www.indusoft.com/hotfixes/hotfixes.php" }, { "name": "http://www.zerodayinitiative.com/advisories/ZDI-11-330/", "refsource": "MISC", "url": "http://www.zerodayinitiative.com/advisories/ZDI-11-330/" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2011-4051", "datePublished": "2011-12-05T11:00:00Z", "dateReserved": "2011-10-13T00:00:00Z", "dateUpdated": "2024-09-17T00:01:05.313Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }