Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2020-11903 (GCVE-0-2020-11903)
Vulnerability from cvelistv5 – Published: 2020-06-17 10:37 – Updated: 2024-08-04 11:42- n/a
| URL | Tags |
|---|---|
| https://www.kb.cert.org/vuls/id/257161/ | x_refsource_MISC |
| https://www.treck.com | x_refsource_MISC |
| https://jsof-tech.com/vulnerability-disclosure-policy/ | x_refsource_MISC |
| https://www.kb.cert.org/vuls/id/257161 | third-party-advisoryx_refsource_CERT-VN |
| https://www.jsof-tech.com/ripple20/ | x_refsource_MISC |
| https://tools.cisco.com/security/center/content/C… | vendor-advisoryx_refsource_CISCO |
| http://www.arubanetworks.com/assets/alert/ARUBA-P… | x_refsource_CONFIRM |
| https://security.netapp.com/advisory/ntap-2020062… | x_refsource_CONFIRM |
| https://www.dell.com/support/article/de-de/sln321… | x_refsource_MISC |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T11:42:00.759Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.kb.cert.org/vuls/id/257161/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.treck.com"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://jsof-tech.com/vulnerability-disclosure-policy/"
},
{
"name": "VU#257161",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "https://www.kb.cert.org/vuls/id/257161"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.jsof-tech.com/ripple20/"
},
{
"name": "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20200625-0006/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The Treck TCP/IP stack before 6.0.1.28 has a DHCP Out-of-bounds Read."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-07-22T00:09:26.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.kb.cert.org/vuls/id/257161/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.treck.com"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://jsof-tech.com/vulnerability-disclosure-policy/"
},
{
"name": "VU#257161",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "https://www.kb.cert.org/vuls/id/257161"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.jsof-tech.com/ripple20/"
},
{
"name": "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://security.netapp.com/advisory/ntap-20200625-0006/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2020-11903",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Treck TCP/IP stack before 6.0.1.28 has a DHCP Out-of-bounds Read."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.kb.cert.org/vuls/id/257161/",
"refsource": "MISC",
"url": "https://www.kb.cert.org/vuls/id/257161/"
},
{
"name": "https://www.treck.com",
"refsource": "MISC",
"url": "https://www.treck.com"
},
{
"name": "https://jsof-tech.com/vulnerability-disclosure-policy/",
"refsource": "MISC",
"url": "https://jsof-tech.com/vulnerability-disclosure-policy/"
},
{
"name": "VU#257161",
"refsource": "CERT-VN",
"url": "https://www.kb.cert.org/vuls/id/257161"
},
{
"name": "https://www.jsof-tech.com/ripple20/",
"refsource": "MISC",
"url": "https://www.jsof-tech.com/ripple20/"
},
{
"name": "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC"
},
{
"name": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
"refsource": "CONFIRM",
"url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt"
},
{
"name": "https://security.netapp.com/advisory/ntap-20200625-0006/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20200625-0006/"
},
{
"name": "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
"refsource": "MISC",
"url": "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2020-11903",
"datePublished": "2020-06-17T10:37:56.000Z",
"dateReserved": "2020-04-19T00:00:00.000Z",
"dateUpdated": "2024-08-04T11:42:00.759Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2020-11903",
"date": "2026-05-22",
"epss": "0.00713",
"percentile": "0.72529"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:treck:tcp\\\\/ip:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"6.0.1.28\", \"matchCriteriaId\": \"E5A61BE2-20C5-41A0-A192-4099F4DD0A03\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"The Treck TCP/IP stack before 6.0.1.28 has a DHCP Out-of-bounds Read.\"}, {\"lang\": \"es\", \"value\": \"La pila Treck TCP/IP versiones anteriores a 6.0.1.28, presenta una Lectura Fuera de L\\u00edmites de DHCP\"}]",
"id": "CVE-2020-11903",
"lastModified": "2024-11-21T04:58:51.953",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\", \"baseScore\": 6.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"ADJACENT_NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:A/AC:L/Au:N/C:P/I:N/A:N\", \"baseScore\": 3.3, \"accessVector\": \"ADJACENT_NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"LOW\", \"exploitabilityScore\": 6.5, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2020-06-17T11:15:10.507",
"references": "[{\"url\": \"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://jsof-tech.com/vulnerability-disclosure-policy/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20200625-0006/\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://www.jsof-tech.com/ripple20/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\", \"Third Party Advisory\"]}, {\"url\": \"https://www.kb.cert.org/vuls/id/257161\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://www.kb.cert.org/vuls/id/257161/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mitigation\", \"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"https://www.treck.com\", \"source\": \"cve@mitre.org\", \"tags\": [\"Product\", \"Vendor Advisory\"]}, {\"url\": \"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://jsof-tech.com/vulnerability-disclosure-policy/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20200625-0006/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.jsof-tech.com/ripple20/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Third Party Advisory\"]}, {\"url\": \"https://www.kb.cert.org/vuls/id/257161\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.kb.cert.org/vuls/id/257161/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mitigation\", \"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"https://www.treck.com\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Product\", \"Vendor Advisory\"]}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-125\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2020-11903\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2020-06-17T11:15:10.507\",\"lastModified\":\"2024-11-21T04:58:51.953\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The Treck TCP/IP stack before 6.0.1.28 has a DHCP Out-of-bounds Read.\"},{\"lang\":\"es\",\"value\":\"La pila Treck TCP/IP versiones anteriores a 6.0.1.28, presenta una Lectura Fuera de L\u00edmites de DHCP\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:A/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":3.3,\"accessVector\":\"ADJACENT_NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":6.5,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:treck:tcp\\\\/ip:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.0.1.28\",\"matchCriteriaId\":\"E5A61BE2-20C5-41A0-A192-4099F4DD0A03\"}]}]}],\"references\":[{\"url\":\"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://jsof-tech.com/vulnerability-disclosure-policy/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20200625-0006/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.jsof-tech.com/ripple20/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://www.kb.cert.org/vuls/id/257161\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.kb.cert.org/vuls/id/257161/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mitigation\",\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://www.treck.com\",\"source\":\"cve@mitre.org\",\"tags\":[\"Product\",\"Vendor Advisory\"]},{\"url\":\"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://jsof-tech.com/vulnerability-disclosure-policy/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20200625-0006/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.jsof-tech.com/ripple20/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://www.kb.cert.org/vuls/id/257161\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.kb.cert.org/vuls/id/257161/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mitigation\",\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://www.treck.com\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Product\",\"Vendor Advisory\"]}]}}"
}
}
CERTFR-2020-AVI-375
Vulnerability from certfr_avis - Published: - Updated:
Le 16 juin 2020, des chercheurs ont annoncé la découverte de dix-neuf vulnérabilités dans l'implémentation de la pile TCP/IP de Treck.
Ce composant est utilisé dans de nombreux systèmes embarqués et objets connectés, dont certains équipements médicaux et équipements de contrôle industriel. Les vulnérabilités les plus critiques permettent une exécution de code arbitraire à distance.
Lorsque des vulnérabilités sont découvertes dans un composant d'aussi bas niveau, il est très difficile de compiler une liste exhaustive de produits vulnérables. De plus, la simple présence de ce composant dans un produit n'implique pas forcément que celui-ci est vulnérable, parce que la vulnérabilité a déjà été corrigée ou encore parce que ce composant a été modifié et que la vulnérabilité n'est pas forcément atteignable.
Le CERT Carneggie Mellon ainsi que les chercheurs ont proposé sur leurs sites respectifs une liste de produits vulnérables et certains éditeurs ont déjà communiqué sur le statut de leurs produits (cf. section Documentation).
Parmi les dix-neuf vulnérabilités, les trois les plus critiques sont identifiées comme :
- CVE-2020-11896 : des datagrammes UDP fragmentés sur plusieurs paquets IP peuvent permettre un exécution de code arbitraire à distance ou un déni de service à distance sur des équipements avec une fonction d'IP Tunneling activée ;
- CVE-2020-11897 : des paquets IPv6 mal formés permettent une exécution de code arbitraire à distance [1] ;
- CVE-2020-11901 : une réponse DNS mal formée permet une exécution de code arbitraire à distance.
Si ces vulnérabilités sont jugées critiques, leur impact est atténué par les conditions d’exploitabilité.
Il convient donc de vérifier dans un premier temps si les équipements en bordure de réseau sont dans une configuration vulnérable. Si c'est le cas, il faut alors appliquer les mises à jour si elles sont disponibles ou mettre en œuvre les mesures de contournement.
[mise à jour du 26 octobre 2020] Les avis de sécurité Schneider Electric SEVD-2020-174-01 et SEVD-2020-175-01 ont été mis à jour le 22 octobre 2020 suite à la découverte d'impacts supplémentaires sur les produits Schneider. Des correctifs sont en cours de développement, certains ont déjà été publiés et des mesures de contournement sont identifiées et listées dans les avis à jour.
[1] cette vulnérabilité a été corrigée dans la version 5.0.1.35, sans être accompagnée d'un avis de sécurité à l'époque de sa mise à disposition.
Solution
Se référer au bulletin de sécurité des éditeurs pour l'obtention des correctifs (cf. section Documentation).
None{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "versions de la pile TCP/IP de Treck ant\u00e9rieures \u00e0 6.0.1.66",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 des \u00e9diteurs pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-11913",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11913"
},
{
"name": "CVE-2020-11910",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11910"
},
{
"name": "CVE-2020-11899",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11899"
},
{
"name": "CVE-2020-11908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11908"
},
{
"name": "CVE-2020-11906",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11906"
},
{
"name": "CVE-2020-11914",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11914"
},
{
"name": "CVE-2020-11897",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11897"
},
{
"name": "CVE-2020-11911",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11911"
},
{
"name": "CVE-2020-11900",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11900"
},
{
"name": "CVE-2020-11903",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11903"
},
{
"name": "CVE-2020-11912",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11912"
},
{
"name": "CVE-2020-11901",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11901"
},
{
"name": "CVE-2020-11904",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11904"
},
{
"name": "CVE-2020-11907",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11907"
},
{
"name": "CVE-2020-11905",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11905"
},
{
"name": "CVE-2020-11898",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11898"
},
{
"name": "CVE-2020-11896",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11896"
},
{
"name": "CVE-2020-11909",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11909"
},
{
"name": "CVE-2020-11902",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11902"
}
],
"links": [
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11903",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11903"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11905",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11905"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2020-174-01 du 22 juin 2020, mis \u00e0 jour le 23 juin 2020 et mis \u00e0 jour le 22 octobre 2020",
"url": "https://www.se.com/ww/en/download/document/SEVD-2020-174-01/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2020-175-01 du 23 juin 2020 mis \u00e0 jour le 22 octobre 2020",
"url": "https://www.se.com/ww/en/download/document/SEVD-2020-175-01/"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11911",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11911"
},
{
"title": "Annonce de Moxa du 30 juin 2020",
"url": "https://www.moxa.com/en/support/support/security-advisory/moxas-response-regarding-the-ripple20-vulnerabilities"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11902",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11902"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Aruba ARUBA-PSA-2020-006 du 23 juin 2020",
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt"
},
{
"title": "Communication de Green Hills Software du 16 juin 2020",
"url": "https://support.ghs.com/psirt/PSA-2020-05/"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11897",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11897"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Treck du 16 juin 2020",
"url": "https://treck.com/vulnerability-response-information/"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11908"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11907",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11907"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11910",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11910"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks PAN-SA-2020-0007 du 08 juillet 2020",
"url": "https://security.paloaltonetworks.com/PAN-SA-2020-0007"
},
{
"title": "Communication de Braun du 12 juin 2020",
"url": "https://www.bbraunusa.com/content/dam/b-braun/us/website/customer_communications/Skyline%20Response_Outlook_6.9.2020_FINAL1.pdf"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11906",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11906"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11904",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11904"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 HP HPSBPI03666 du 12 juin 2020",
"url": "https://support.hp.com/in-en/document/c06640149"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-treck-ip-stack-JyBQ5GyC du 17 juin 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11914",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11914"
},
{
"title": "Billet de blogue Ripple20 du 16 juin 2020",
"url": "https://www.jsof-tech.com/ripple20/"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11898",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11898"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11912",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11912"
},
{
"title": "Avis de s\u00e9curit\u00e9 du CERT Carnegie Mellon du 16 juin 2020",
"url": "https://kb.cert.org/vuls/id/257161"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11900",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11900"
},
{
"title": "Avis de s\u00e9curit\u00e9 ICS-CERT ICSA-20-168-01 du 16 juin 2020",
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-168-01"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11909",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11909"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11901",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11901"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11913",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11913"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11896",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11896"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11899",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11899"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2020-168-01 du 22 juin 2020, mis \u00e0 jour le 23 juin 2020",
"url": "https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet\u0026p_File_Name=SESB-2020-168-01_Treck_Vulnerabilities_Security_Bulletin.pdf\u0026p_Doc_Ref=SESB-2020-168-01"
}
],
"reference": "CERTFR-2020-AVI-375",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-01-08T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Le 16 juin 2020, des chercheurs ont annonc\u00e9 la d\u00e9couverte de dix-neuf\nvuln\u00e9rabilit\u00e9s dans l\u0027impl\u00e9mentation de la pile TCP/IP de Treck.\n\nCe composant est utilis\u00e9 dans de nombreux syst\u00e8mes embarqu\u00e9s et objets\nconnect\u00e9s, dont certains \u00e9quipements m\u00e9dicaux et \u00e9quipements de contr\u00f4le\nindustriel. Les vuln\u00e9rabilit\u00e9s les plus critiques permettent une\nex\u00e9cution de code arbitraire \u00e0 distance.\n\nLorsque des vuln\u00e9rabilit\u00e9s sont d\u00e9couvertes dans un composant d\u0027aussi\nbas niveau, il est tr\u00e8s difficile de compiler une liste exhaustive de\nproduits vuln\u00e9rables. De plus, la simple pr\u00e9sence de ce composant dans\nun produit n\u0027implique pas forc\u00e9ment que celui-ci est vuln\u00e9rable, parce\nque la vuln\u00e9rabilit\u00e9 a d\u00e9j\u00e0 \u00e9t\u00e9 corrig\u00e9e ou encore parce que ce\ncomposant a \u00e9t\u00e9 modifi\u00e9 et que la vuln\u00e9rabilit\u00e9 n\u0027est pas forc\u00e9ment\natteignable.\n\nLe CERT Carneggie Mellon ainsi que les chercheurs ont propos\u00e9 sur leurs\nsites respectifs une liste de produits vuln\u00e9rables et certains \u00e9diteurs\nont d\u00e9j\u00e0 communiqu\u00e9 sur le statut de leurs produits (cf. section\nDocumentation).\n\nParmi les dix-neuf vuln\u00e9rabilit\u00e9s, les trois les plus critiques sont\nidentifi\u00e9es comme :\n\n- CVE-2020-11896 : des datagrammes UDP fragment\u00e9s sur plusieurs\n paquets IP peuvent permettre un ex\u00e9cution de code arbitraire \u00e0\n distance ou un d\u00e9ni de service \u00e0 distance sur des \u00e9quipements avec\n une fonction d\u0027IP Tunneling activ\u00e9e ;\n- CVE-2020-11897 : des paquets IPv6 mal form\u00e9s permettent une\n ex\u00e9cution de code arbitraire \u00e0 distance \\[1\\] ;\n- CVE-2020-11901 : une r\u00e9ponse DNS mal form\u00e9e permet une ex\u00e9cution de\n code arbitraire \u00e0 distance.\n\nSi ces vuln\u00e9rabilit\u00e9s sont jug\u00e9es critiques, leur impact est att\u00e9nu\u00e9 par\nles conditions d\u2019exploitabilit\u00e9.\n\nIl convient donc de v\u00e9rifier dans un premier temps si les \u00e9quipements en\nbordure de r\u00e9seau sont dans une configuration vuln\u00e9rable. Si c\u0027est le\ncas, il faut alors appliquer les mises \u00e0 jour si elles sont disponibles\nou mettre en \u0153uvre les mesures de contournement.\n\n\u003cstrong\u003e\\[mise \u00e0 jour du 26 octobre 2020\\]\u003c/strong\u003e Les avis de s\u00e9curit\u00e9 Schneider\nElectric SEVD-2020-174-01 et SEVD-2020-175-01 ont \u00e9t\u00e9 mis \u00e0 jour le 22\noctobre 2020 suite \u00e0 la d\u00e9couverte d\u0027impacts suppl\u00e9mentaires sur les\nproduits Schneider. Des correctifs sont en cours de d\u00e9veloppement,\ncertains ont d\u00e9j\u00e0 \u00e9t\u00e9 publi\u00e9s et des mesures de contournement sont\nidentifi\u00e9es et list\u00e9es dans les avis \u00e0 jour.\n\n\u00a0\n\n\\[1\\] cette vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 corrig\u00e9e dans la version 5.0.1.35, sans\n\u00eatre accompagn\u00e9e d\u0027un avis de s\u00e9curit\u00e9 \u00e0 l\u0027\u00e9poque de sa mise \u00e0\ndisposition.\n",
"title": "[M\u00e0J] Multiples vuln\u00e9rabilit\u00e9s dans la pile TCP/IP de Treck",
"vendor_advisories": []
}
CERTFR-2020-AVI-375
Vulnerability from certfr_avis - Published: - Updated:
Le 16 juin 2020, des chercheurs ont annoncé la découverte de dix-neuf vulnérabilités dans l'implémentation de la pile TCP/IP de Treck.
Ce composant est utilisé dans de nombreux systèmes embarqués et objets connectés, dont certains équipements médicaux et équipements de contrôle industriel. Les vulnérabilités les plus critiques permettent une exécution de code arbitraire à distance.
Lorsque des vulnérabilités sont découvertes dans un composant d'aussi bas niveau, il est très difficile de compiler une liste exhaustive de produits vulnérables. De plus, la simple présence de ce composant dans un produit n'implique pas forcément que celui-ci est vulnérable, parce que la vulnérabilité a déjà été corrigée ou encore parce que ce composant a été modifié et que la vulnérabilité n'est pas forcément atteignable.
Le CERT Carneggie Mellon ainsi que les chercheurs ont proposé sur leurs sites respectifs une liste de produits vulnérables et certains éditeurs ont déjà communiqué sur le statut de leurs produits (cf. section Documentation).
Parmi les dix-neuf vulnérabilités, les trois les plus critiques sont identifiées comme :
- CVE-2020-11896 : des datagrammes UDP fragmentés sur plusieurs paquets IP peuvent permettre un exécution de code arbitraire à distance ou un déni de service à distance sur des équipements avec une fonction d'IP Tunneling activée ;
- CVE-2020-11897 : des paquets IPv6 mal formés permettent une exécution de code arbitraire à distance [1] ;
- CVE-2020-11901 : une réponse DNS mal formée permet une exécution de code arbitraire à distance.
Si ces vulnérabilités sont jugées critiques, leur impact est atténué par les conditions d’exploitabilité.
Il convient donc de vérifier dans un premier temps si les équipements en bordure de réseau sont dans une configuration vulnérable. Si c'est le cas, il faut alors appliquer les mises à jour si elles sont disponibles ou mettre en œuvre les mesures de contournement.
[mise à jour du 26 octobre 2020] Les avis de sécurité Schneider Electric SEVD-2020-174-01 et SEVD-2020-175-01 ont été mis à jour le 22 octobre 2020 suite à la découverte d'impacts supplémentaires sur les produits Schneider. Des correctifs sont en cours de développement, certains ont déjà été publiés et des mesures de contournement sont identifiées et listées dans les avis à jour.
[1] cette vulnérabilité a été corrigée dans la version 5.0.1.35, sans être accompagnée d'un avis de sécurité à l'époque de sa mise à disposition.
Solution
Se référer au bulletin de sécurité des éditeurs pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "versions de la pile TCP/IP de Treck ant\u00e9rieures \u00e0 6.0.1.66",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 des \u00e9diteurs pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-11913",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11913"
},
{
"name": "CVE-2020-11910",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11910"
},
{
"name": "CVE-2020-11899",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11899"
},
{
"name": "CVE-2020-11908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11908"
},
{
"name": "CVE-2020-11906",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11906"
},
{
"name": "CVE-2020-11914",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11914"
},
{
"name": "CVE-2020-11897",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11897"
},
{
"name": "CVE-2020-11911",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11911"
},
{
"name": "CVE-2020-11900",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11900"
},
{
"name": "CVE-2020-11903",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11903"
},
{
"name": "CVE-2020-11912",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11912"
},
{
"name": "CVE-2020-11901",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11901"
},
{
"name": "CVE-2020-11904",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11904"
},
{
"name": "CVE-2020-11907",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11907"
},
{
"name": "CVE-2020-11905",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11905"
},
{
"name": "CVE-2020-11898",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11898"
},
{
"name": "CVE-2020-11896",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11896"
},
{
"name": "CVE-2020-11909",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11909"
},
{
"name": "CVE-2020-11902",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11902"
}
],
"links": [
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11903",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11903"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11905",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11905"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2020-174-01 du 22 juin 2020, mis \u00e0 jour le 23 juin 2020 et mis \u00e0 jour le 22 octobre 2020",
"url": "https://www.se.com/ww/en/download/document/SEVD-2020-174-01/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2020-175-01 du 23 juin 2020 mis \u00e0 jour le 22 octobre 2020",
"url": "https://www.se.com/ww/en/download/document/SEVD-2020-175-01/"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11911",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11911"
},
{
"title": "Annonce de Moxa du 30 juin 2020",
"url": "https://www.moxa.com/en/support/support/security-advisory/moxas-response-regarding-the-ripple20-vulnerabilities"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11902",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11902"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Aruba ARUBA-PSA-2020-006 du 23 juin 2020",
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt"
},
{
"title": "Communication de Green Hills Software du 16 juin 2020",
"url": "https://support.ghs.com/psirt/PSA-2020-05/"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11897",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11897"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Treck du 16 juin 2020",
"url": "https://treck.com/vulnerability-response-information/"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11908"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11907",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11907"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11910",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11910"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks PAN-SA-2020-0007 du 08 juillet 2020",
"url": "https://security.paloaltonetworks.com/PAN-SA-2020-0007"
},
{
"title": "Communication de Braun du 12 juin 2020",
"url": "https://www.bbraunusa.com/content/dam/b-braun/us/website/customer_communications/Skyline%20Response_Outlook_6.9.2020_FINAL1.pdf"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11906",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11906"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11904",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11904"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 HP HPSBPI03666 du 12 juin 2020",
"url": "https://support.hp.com/in-en/document/c06640149"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-treck-ip-stack-JyBQ5GyC du 17 juin 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11914",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11914"
},
{
"title": "Billet de blogue Ripple20 du 16 juin 2020",
"url": "https://www.jsof-tech.com/ripple20/"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11898",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11898"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11912",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11912"
},
{
"title": "Avis de s\u00e9curit\u00e9 du CERT Carnegie Mellon du 16 juin 2020",
"url": "https://kb.cert.org/vuls/id/257161"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11900",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11900"
},
{
"title": "Avis de s\u00e9curit\u00e9 ICS-CERT ICSA-20-168-01 du 16 juin 2020",
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-168-01"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11909",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11909"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11901",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11901"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11913",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11913"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11896",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11896"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11899",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11899"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2020-168-01 du 22 juin 2020, mis \u00e0 jour le 23 juin 2020",
"url": "https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet\u0026p_File_Name=SESB-2020-168-01_Treck_Vulnerabilities_Security_Bulletin.pdf\u0026p_Doc_Ref=SESB-2020-168-01"
}
],
"reference": "CERTFR-2020-AVI-375",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-01-08T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Le 16 juin 2020, des chercheurs ont annonc\u00e9 la d\u00e9couverte de dix-neuf\nvuln\u00e9rabilit\u00e9s dans l\u0027impl\u00e9mentation de la pile TCP/IP de Treck.\n\nCe composant est utilis\u00e9 dans de nombreux syst\u00e8mes embarqu\u00e9s et objets\nconnect\u00e9s, dont certains \u00e9quipements m\u00e9dicaux et \u00e9quipements de contr\u00f4le\nindustriel. Les vuln\u00e9rabilit\u00e9s les plus critiques permettent une\nex\u00e9cution de code arbitraire \u00e0 distance.\n\nLorsque des vuln\u00e9rabilit\u00e9s sont d\u00e9couvertes dans un composant d\u0027aussi\nbas niveau, il est tr\u00e8s difficile de compiler une liste exhaustive de\nproduits vuln\u00e9rables. De plus, la simple pr\u00e9sence de ce composant dans\nun produit n\u0027implique pas forc\u00e9ment que celui-ci est vuln\u00e9rable, parce\nque la vuln\u00e9rabilit\u00e9 a d\u00e9j\u00e0 \u00e9t\u00e9 corrig\u00e9e ou encore parce que ce\ncomposant a \u00e9t\u00e9 modifi\u00e9 et que la vuln\u00e9rabilit\u00e9 n\u0027est pas forc\u00e9ment\natteignable.\n\nLe CERT Carneggie Mellon ainsi que les chercheurs ont propos\u00e9 sur leurs\nsites respectifs une liste de produits vuln\u00e9rables et certains \u00e9diteurs\nont d\u00e9j\u00e0 communiqu\u00e9 sur le statut de leurs produits (cf. section\nDocumentation).\n\nParmi les dix-neuf vuln\u00e9rabilit\u00e9s, les trois les plus critiques sont\nidentifi\u00e9es comme :\n\n- CVE-2020-11896 : des datagrammes UDP fragment\u00e9s sur plusieurs\n paquets IP peuvent permettre un ex\u00e9cution de code arbitraire \u00e0\n distance ou un d\u00e9ni de service \u00e0 distance sur des \u00e9quipements avec\n une fonction d\u0027IP Tunneling activ\u00e9e ;\n- CVE-2020-11897 : des paquets IPv6 mal form\u00e9s permettent une\n ex\u00e9cution de code arbitraire \u00e0 distance \\[1\\] ;\n- CVE-2020-11901 : une r\u00e9ponse DNS mal form\u00e9e permet une ex\u00e9cution de\n code arbitraire \u00e0 distance.\n\nSi ces vuln\u00e9rabilit\u00e9s sont jug\u00e9es critiques, leur impact est att\u00e9nu\u00e9 par\nles conditions d\u2019exploitabilit\u00e9.\n\nIl convient donc de v\u00e9rifier dans un premier temps si les \u00e9quipements en\nbordure de r\u00e9seau sont dans une configuration vuln\u00e9rable. Si c\u0027est le\ncas, il faut alors appliquer les mises \u00e0 jour si elles sont disponibles\nou mettre en \u0153uvre les mesures de contournement.\n\n\u003cstrong\u003e\\[mise \u00e0 jour du 26 octobre 2020\\]\u003c/strong\u003e Les avis de s\u00e9curit\u00e9 Schneider\nElectric SEVD-2020-174-01 et SEVD-2020-175-01 ont \u00e9t\u00e9 mis \u00e0 jour le 22\noctobre 2020 suite \u00e0 la d\u00e9couverte d\u0027impacts suppl\u00e9mentaires sur les\nproduits Schneider. Des correctifs sont en cours de d\u00e9veloppement,\ncertains ont d\u00e9j\u00e0 \u00e9t\u00e9 publi\u00e9s et des mesures de contournement sont\nidentifi\u00e9es et list\u00e9es dans les avis \u00e0 jour.\n\n\u00a0\n\n\\[1\\] cette vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 corrig\u00e9e dans la version 5.0.1.35, sans\n\u00eatre accompagn\u00e9e d\u0027un avis de s\u00e9curit\u00e9 \u00e0 l\u0027\u00e9poque de sa mise \u00e0\ndisposition.\n",
"title": "[M\u00e0J] Multiples vuln\u00e9rabilit\u00e9s dans la pile TCP/IP de Treck",
"vendor_advisories": []
}
BDU:2021-02134
Vulnerability from fstec - Published: 17.06.2020{
"CVSS 2.0": "AV:A/AC:L/Au:N/C:P/I:N/A:N",
"CVSS 3.0": "AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Cisco Systems Inc., Treck Inc.",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "\u0434\u043e 21.5.27 (ASR 5000), \u0434\u043e 21.20.2 (ASR 5500), \u0434\u043e 21.20.2 (Cisco Virtual Packet Core), \u0434\u043e 6.0.1.28 (Treck TCP/IP)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f Treck TCP/IP:\nhttps://www.treck.com/\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Cisco Systems Inc.:\nhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "17.06.2020",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "21.04.2021",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "21.04.2021",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2021-02134",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2020-11903",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "ASR 5000, ASR 5500, Cisco Virtual Packet Core, Treck TCP/IP",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": null,
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u0441\u0442\u0435\u043a\u0430 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u043e\u0432 Treck TCP/IP, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0421\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442 \u0432 \u043e\u0442\u043a\u0440\u044b\u0442\u043e\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u0435",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0427\u0442\u0435\u043d\u0438\u0435 \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u0430\u043c\u0438 \u0431\u0443\u0444\u0435\u0440\u0430 (CWE-125)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u0441\u0442\u0435\u043a\u0430 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u043e\u0432 Treck TCP/IP, \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0447\u0442\u0435\u043d\u0438\u0435\u043c \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u0430\u043c\u0438 \u0431\u0443\u0444\u0435\u0440\u0430. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet\u0026p_File_Name=SESB-2020-168-01_Treck_Vulnerabilities_Security_Bulletin.pdf\u0026p_Doc_Ref=SESB-2020-168-01\nhttps://www.jsof-tech.com/ripple20/\nhttps://jsof-tech.com/vulnerability-disclosure-policy/\nhttps://www.kb.cert.org/vuls/id/257161/\nhttps://www.treck.com",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041f\u041e \u0441\u0435\u0442\u0435\u0432\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430, \u0421\u0435\u0442\u0435\u0432\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e, \u0421\u0435\u0442\u0435\u0432\u043e\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-125",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041d\u0438\u0437\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 3,3)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,5)"
}
CISCO-SA-TRECK-IP-STACK-JYBQ5GYC
Vulnerability from csaf_cisco - Published: 2020-06-17 20:00 - Updated: 2020-08-21 16:40| URL | Category |
|---|---|
| https://sec.cloudapps.cisco.com/security/center/c… | self |
| https://sec.cloudapps.cisco.com/security/center/r… | external |
| https://sec.cloudapps.cisco.com/security/center/c… | external |
| https://bst.cloudapps.cisco.com/bugsearch/bug/BUGID | external |
| https://bst.cloudapps.cisco.com/bugsearch/bug/CSC… | external |
| https://bst.cloudapps.cisco.com/bugsearch/bug/CSC… | external |
| https://bst.cloudapps.cisco.com/bugsearch/bug/CSC… | external |
| https://github.com/CERTCC/PoC-Exploits/blob/maste… | external |
| https://sec.cloudapps.cisco.com/security/center/r… | external |
| https://www.cisco.com/go/psirt | external |
| https://sec.cloudapps.cisco.com/security/center/r… | external |
{
"document": {
"acknowledgments": [
{
"summary": "These vulnerabilities were discovered and reported to CERT/CC by JSOF."
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"notes": [
{
"category": "summary",
"text": "A set of previously unknown vulnerabilities on the Treck IP stack implementation were disclosed on June 16, 2020. The vulnerabilities are collectively known as Ripple20. Exploitation of these vulnerabilities could result in remote code execution, denial of service (DoS), or information disclosure, depending on the specific vulnerability.\r\n\r\nThis advisory will be updated as additional information becomes available.\r\n\r\nThis advisory is available at the following link:\r\nhttps://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC [\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC\"]",
"title": "Summary"
},
{
"category": "general",
"text": "Cisco investigated its product line to determine which products may be affected by these vulnerabilities.\r\n\r\nThe Vulnerable Products [\"#vp\"] section of this advisory includes Cisco bug IDs for each affected product. The bugs are accessible through the Cisco Bug Search Tool [\"https://bst.cloudapps.cisco.com/bugsearch/bug/BUGID\"] and contain additional platform-specific information, including workarounds (if available) and fixed software releases.\r\n\r\nAny product or service not listed in the Vulnerable Products [\"#vp\"] section of this advisory is to be considered not vulnerable.",
"title": "Affected Products"
},
{
"category": "general",
"text": "The following table lists Cisco products that are affected by the vulnerabilities that are described in this advisory. If a future release date is indicated for software, the date provided represents an estimate based on all information known to Cisco as of the Last Updated date at the top of the advisory. Availability dates are subject to change based on a number of factors, including satisfactory testing results and delivery of other priority features and fixes. If no version or date is listed for an affected component (indicated by a blank field and/or an advisory designation of Interim), Cisco is continuing to evaluate the fix and will update the advisory as additional information becomes available. After the advisory is marked Final, customers should refer to the associated Cisco bug(s) for further details. Unless otherwise documented, all software releases prior to the first fixed release are to be considered affected by these vulnerabilities.\r\n Product Cisco Bug ID Fixed Release Availability Routing and Switching - Enterprise and Service Provider Cisco ASR 5000 CSCvu68945 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvu68945\"] 21.5.27 (30 Jul 2020) Cisco ASR 5500 CSCvu68945 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvu68945\"] 21.5.27 (30 Jul 2020)\r\n21.8.x (14 Sep 2020)\r\n21.9.x (8 Sep 2020)\r\n21.10.x (2 Sep 2020)\r\n21.11.15 (29 Jul 2020)\r\n21.12.x (4 Sep 2020)\r\n21.13.x (31 Aug 2020)\r\n21.14.22 (30 Jul 2020)\r\n21.15.45 (22 Jul 2020)\r\n21.16.x (25 Aug 2020)\r\n21.17.10 (20 Aug 2020)\r\n21.18.8 (24 Aug 2020)\r\n21.19.5 (19 Aug 2020)\r\n21.20.2 (24 Jul 2020) Cisco Virtual Packet Core CSCvu68945 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvu68945\"] 21.5.27 (30 Jul 2020)\r\n21.8.x (14 Sep 2020)\r\n21.9.x (8 Sep 2020)\r\n21.10.x (2 Sep 2020)\r\n21.11.15 (29 Jul 2020)\r\n21.12.x (4 Sep 2020)\r\n21.13.x (31 Aug 2020)\r\n21.14.22 (30 Jul 2020)\r\n21.15.45 (22 Jul 2020)\r\n21.16.x (25 Aug 2020)\r\n21.17.10 (20 Aug 2020)\r\n21.18.8 (24 Aug 2020)\r\n21.19.5 (19 Aug 2020)\r\n21.20.2 (24 Jul 2020)\r\nNote: Exposure to the vulnerabilities may be configuration dependent. See the Cisco bug(s) for the most complete product-specific information.\r\n Cisco StarOS Software\r\nIn the following table, the left column lists the Cisco StarOS Software features that are vulnerable. The right column indicates the basic configuration for the feature from the show running-config CLI command. If a device is configured for one of these features, it is vulnerable.\r\n Cisco StarOS Software Feature Vulnerable Configuration URL-based Re-addressing\r\nflow action url-readdress server [...]\r\n SIP ALG NAT Inspection\r\nfirewall nat-alg sip [...]\r\n H323 ALG NAT Inspection\r\nfirewall nat-alg h323 [...]\r\n Inline TCP Optimization (CUSP)\r\ntcp-acceleration [...]\r\n\r\nIf a Cisco StarOS Software deployment uses a vulnerable configuration, as described above, it may be affected by the following vulnerabilities:\r\n\r\nCVE-2020-11896: Malformed IPv4 Tunneled Packets Processing Remote Code Execution Vulnerability\r\nCVE-2020-11898: Malformed IPv4 Packets Processing Out-of-Bounds Read Vulnerability\r\nCVE-2020-11899: Improper Input Validation in IPv6 Out-of-Bounds Read Vulnerability\r\nCVE-2020-11900: IPv4 Tunneling Component Double-Free Vulnerability\r\nCVE-2020-11907: Improper Packet Length Checks Integer Underflow Vulnerability\r\nCVE-2020-11909: Improper Input Validation in IPv4 Component\r\nCVE-2020-11912: Improper Input Validation in TCP Component\r\nCVE-2020-11913: Improper Input Validation in IPv6 Component\r\n\r\nCisco has confirmed that Cisco StarOS Software is not affected by the following vulnerabilities:\r\n\r\nCVE-2020-11897: Malformed IPv6 Packets Processing Out-of-Bounds Read and Write Vulnerability\r\nCVE-2020-11901: DNS Response Processing Remote Code Execution Vulnerability\r\nCVE-2020-11902: Out-of-Bounds Read When Processing IPv6 over IPv4 Packets\r\nCVE-2020-11903: Out-of-Bounds Read Processing DHCP Response\r\nCVE-2020-11904: Integer Overflow in Memory Allocation\r\nCVE-2020-11905: DHCPv6 Out-of-Bounds Read Vulnerability\r\nCVE-2020-11906: Ethernet Link Layer Component Integer Underflow Vulnerability\r\nCVE-2020-11908: Improper Null Termination in DHCP Component\r\nCVE-2020-11910: Improper Input Validation in ICMPv4 Component\r\nCVE-2020-11911: Improper Access Control in ICMPv4 Component\r\nCVE-2020-11914: Improper Input Validation in ARP Component",
"title": "Vulnerable Products"
},
{
"category": "general",
"text": "Only products and services listed in the Vulnerable Products [\"#vulnerable\"] section of this advisory are known to be affected by these vulnerabilities.",
"title": "Products Confirmed Not Vulnerable"
},
{
"category": "general",
"text": "There are no workarounds that address these vulnerabilities.\r\n\r\nA set of network based mitigations has been documented by the CERT Coordination Center and is available at the following address:\r\n\r\nhttps://github.com/CERTCC/PoC-Exploits/blob/master/vu-257161/recommendations.md [\"https://github.com/CERTCC/PoC-Exploits/blob/master/vu-257161/recommendations.md\"]",
"title": "Workarounds"
},
{
"category": "general",
"text": "For information about fixed software releases, consult the Cisco bugs identified in the Vulnerable Products [\"#vp\"] section of this advisory.\r\n\r\nWhen considering software upgrades [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"], customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page [\"https://www.cisco.com/go/psirt\"], to determine exposure and a complete upgrade solution.\r\n\r\nIn all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.",
"title": "Fixed Software"
},
{
"category": "general",
"text": "To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html\"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.",
"title": "Vulnerability Policy"
},
{
"category": "general",
"text": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any malicious use of the vulnerabilities that are described in this advisory.",
"title": "Exploitation and Public Announcements"
},
{
"category": "general",
"text": "These vulnerabilities were discovered and reported to CERT/CC by JSOF.",
"title": "Source"
},
{
"category": "legal_disclaimer",
"text": "THIS DOCUMENT IS PROVIDED ON AN \"AS IS\" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME. CISCO EXPECTS TO UPDATE THIS DOCUMENT AS NEW INFORMATION BECOMES AVAILABLE.\r\n\r\nA standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.",
"title": "Legal Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "Emergency Support:\r\n+1 877 228 7302 (toll-free within North America)\r\n+1 408 525 6532 (International direct-dial)\r\nNon-emergency Support:\r\nEmail: psirt@cisco.com\r\nSupport requests that are received via e-mail are typically acknowledged within 48 hours.",
"issuing_authority": "Cisco product security incident response is the responsibility of the Cisco Product Security Incident Response Team (PSIRT). The Cisco PSIRT is a dedicated, global team that manages the receipt, investigation, and public reporting of security vulnerability information that is related to Cisco products and networks. The on-call Cisco PSIRT works 24x7 with Cisco customers, independent security researchers, consultants, industry organizations, and other vendors to identify possible security issues with Cisco products and networks.\r\nMore information can be found in Cisco Security Vulnerability Policy available at https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html",
"name": "Cisco",
"namespace": "https://wwww.cisco.com"
},
"references": [
{
"category": "self",
"summary": "Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC"
},
{
"category": "external",
"summary": "Cisco Security Vulnerability Policy",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html"
},
{
"category": "external",
"summary": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC"
},
{
"category": "external",
"summary": "Cisco Bug Search Tool",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/BUGID"
},
{
"category": "external",
"summary": "CSCvu68945",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvu68945"
},
{
"category": "external",
"summary": "CSCvu68945",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvu68945"
},
{
"category": "external",
"summary": "CSCvu68945",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvu68945"
},
{
"category": "external",
"summary": "https://github.com/CERTCC/PoC-Exploits/blob/master/vu-257161/recommendations.md",
"url": "https://github.com/CERTCC/PoC-Exploits/blob/master/vu-257161/recommendations.md"
},
{
"category": "external",
"summary": "considering software upgrades",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes"
},
{
"category": "external",
"summary": "Cisco Security Advisories page",
"url": "https://www.cisco.com/go/psirt"
},
{
"category": "external",
"summary": "Security Vulnerability Policy",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html"
}
],
"title": "Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
"tracking": {
"current_release_date": "2020-08-21T16:40:13+00:00",
"generator": {
"date": "2022-10-22T03:05:23+00:00",
"engine": {
"name": "TVCE"
}
},
"id": "cisco-sa-treck-ip-stack-JyBQ5GyC",
"initial_release_date": "2020-06-17T20:00:00+00:00",
"revision_history": [
{
"date": "2020-06-17T20:08:26+00:00",
"number": "1.0.0",
"summary": "Initial public release."
},
{
"date": "2020-06-22T21:59:35+00:00",
"number": "1.1.0",
"summary": "Updated the lists of products under investigation and vulnerable products."
},
{
"date": "2020-07-07T19:09:00+00:00",
"number": "1.2.0",
"summary": "Updated the list of vulnerable products: changed the product naming to refer to the affected platform rather than to the function (for example, GGSN, IPSG) for StarOS-based products. No products remain under investigation."
},
{
"date": "2020-07-10T17:10:26+00:00",
"number": "1.3.0",
"summary": "Added the fixed release availability information for vulnerable products. Added links to Snort rules."
},
{
"date": "2020-07-17T15:59:05+00:00",
"number": "1.4.0",
"summary": "Updated the vulnerable products with fix availability information. Added a reference to mitigations documented by CERT/CC."
},
{
"date": "2020-07-22T18:35:23+00:00",
"number": "1.5.0",
"summary": "Updated fixed release availability information. Clarified that exposure to the vulnerabilities may be configuration dependent."
},
{
"date": "2020-07-24T17:04:38+00:00",
"number": "1.6.0",
"summary": "Updated fixed release availability information. Documented vulnerable StarOS configurations. Specified which vulnerabilities affect StarOS."
},
{
"date": "2020-07-29T16:09:58+00:00",
"number": "1.7.0",
"summary": "Updated fixed release availability information."
},
{
"date": "2020-08-21T16:40:13+00:00",
"number": "1.8.0",
"summary": "Updated fixed release availability information. Added links to additional Snort rules."
}
],
"status": "interim",
"version": "1.8.0"
}
},
"vulnerabilities": [
{
"cve": "CVE-2020-11896",
"notes": [
{
"category": "general",
"text": "No additional information for this vulneraiblity is currently avaialbe.",
"title": "No Notes"
}
],
"release_date": "2020-06-17T20:00:00+00:00",
"remediations": [
{
"category": "none_available",
"details": "No remediation is available at this time."
}
],
"title": "Malformed IPv4 Tunnelled Packets Processing Remote Code Execution Vulnerability"
},
{
"cve": "CVE-2020-11897",
"notes": [
{
"category": "general",
"text": "No additional information for this vulneraiblity is currently avaialbe.",
"title": "No Notes"
}
],
"release_date": "2020-06-17T20:00:00+00:00",
"remediations": [
{
"category": "none_available",
"details": "No remediation is available at this time."
}
],
"title": "Malformed IPv6 Packets Processing Out Of Bounds Read Write Vulnerability"
},
{
"cve": "CVE-2020-11901",
"notes": [
{
"category": "general",
"text": "No additional information for this vulneraiblity is currently avaialbe.",
"title": "No Notes"
}
],
"release_date": "2020-06-17T20:00:00+00:00",
"remediations": [
{
"category": "none_available",
"details": "No remediation is available at this time."
}
],
"title": "DNS Response Processing Remote Code Execution Vulnerability"
},
{
"cve": "CVE-2020-11900",
"notes": [
{
"category": "general",
"text": "No additional information for this vulneraiblity is currently avaialbe.",
"title": "No Notes"
}
],
"release_date": "2020-06-17T20:00:00+00:00",
"remediations": [
{
"category": "none_available",
"details": "No remediation is available at this time."
}
],
"title": "Double free in IPv4 tunnelling compnent"
},
{
"cve": "CVE-2020-11898",
"notes": [
{
"category": "general",
"text": "No additional information for this vulneraiblity is currently avaialbe.",
"title": "No Notes"
}
],
"release_date": "2020-06-16T17:21:00+00:00",
"remediations": [
{
"category": "none_available",
"details": "No remediation is available at this time."
}
],
"title": "vuln-CVE-2020-11898"
},
{
"cve": "CVE-2020-11904",
"notes": [
{
"category": "general",
"text": "No additional information for this vulneraiblity is currently avaialbe.",
"title": "No Notes"
}
],
"release_date": "2020-06-17T16:00:00+00:00",
"remediations": [
{
"category": "none_available",
"details": "No remediation is available at this time."
}
],
"title": "vuln-CVE-2020-11904"
},
{
"cve": "CVE-2020-11903",
"notes": [
{
"category": "general",
"text": "No additional information for this vulneraiblity is currently avaialbe.",
"title": "No Notes"
}
],
"release_date": "2020-06-16T17:22:00+00:00",
"remediations": [
{
"category": "none_available",
"details": "No remediation is available at this time."
}
],
"title": "vuln-CVE-2020-11903"
},
{
"cve": "CVE-2020-11899",
"notes": [
{
"category": "general",
"text": "No additional information for this vulneraiblity is currently avaialbe.",
"title": "No Notes"
}
],
"release_date": "2020-06-17T20:00:00+00:00",
"remediations": [
{
"category": "none_available",
"details": "No remediation is available at this time."
}
],
"title": "Improper Input Validation in IPv6 handling Our Of Bounds Read Vulnerability"
},
{
"cve": "CVE-2020-11910",
"notes": [
{
"category": "general",
"text": "No additional information for this vulneraiblity is currently avaialbe.",
"title": "No Notes"
}
],
"release_date": "2020-06-17T20:00:00+00:00",
"remediations": [
{
"category": "none_available",
"details": "No remediation is available at this time."
}
],
"title": "Improper input validation in ICMPv4 component"
},
{
"cve": "CVE-2020-11902",
"notes": [
{
"category": "general",
"text": "No additional information for this vulneraiblity is currently avaialbe.",
"title": "No Notes"
}
],
"release_date": "2020-06-17T20:00:00+00:00",
"remediations": [
{
"category": "none_available",
"details": "No remediation is available at this time."
}
],
"title": "Out of Bounds Read when processing IPv6OverIPv4 packets"
},
{
"cve": "CVE-2020-11914",
"notes": [
{
"category": "general",
"text": "No additional information for this vulneraiblity is currently avaialbe.",
"title": "No Notes"
}
],
"release_date": "2020-06-17T20:00:00+00:00",
"remediations": [
{
"category": "none_available",
"details": "No remediation is available at this time."
}
],
"title": "Improper Input Validation in ARP component"
},
{
"cve": "CVE-2020-11906",
"notes": [
{
"category": "general",
"text": "No additional information for this vulneraiblity is currently avaialbe.",
"title": "No Notes"
}
],
"release_date": "2020-06-17T20:00:00+00:00",
"remediations": [
{
"category": "none_available",
"details": "No remediation is available at this time."
}
],
"title": "Integer Underflow in Ethernet Link Layer Component"
},
{
"cve": "CVE-2020-11911",
"notes": [
{
"category": "general",
"text": "No additional information for this vulneraiblity is currently avaialbe.",
"title": "No Notes"
}
],
"release_date": "2020-06-17T20:00:00+00:00",
"remediations": [
{
"category": "none_available",
"details": "No remediation is available at this time."
}
],
"title": "Improper Access Control in ICMPv4 component"
},
{
"cve": "CVE-2020-11907",
"notes": [
{
"category": "general",
"text": "No additional information for this vulneraiblity is currently avaialbe.",
"title": "No Notes"
}
],
"release_date": "2020-06-17T20:00:00+00:00",
"remediations": [
{
"category": "none_available",
"details": "No remediation is available at this time."
}
],
"title": "Integer Underflow in TCP processing"
},
{
"cve": "CVE-2020-11912",
"notes": [
{
"category": "general",
"text": "No additional information for this vulneraiblity is currently avaialbe.",
"title": "No Notes"
}
],
"release_date": "2020-06-17T20:00:00+00:00",
"remediations": [
{
"category": "none_available",
"details": "No remediation is available at this time."
}
],
"title": "Improper Input Validation in TCP component"
},
{
"cve": "CVE-2020-11908",
"notes": [
{
"category": "general",
"text": "No additional information for this vulneraiblity is currently avaialbe.",
"title": "No Notes"
}
],
"release_date": "2020-06-17T20:00:00+00:00",
"remediations": [
{
"category": "none_available",
"details": "No remediation is available at this time."
}
],
"title": "Improper Null Termination in DHCP component"
},
{
"cve": "CVE-2020-11913",
"notes": [
{
"category": "general",
"text": "No additional information for this vulneraiblity is currently avaialbe.",
"title": "No Notes"
}
],
"release_date": "2020-06-17T20:00:00+00:00",
"remediations": [
{
"category": "none_available",
"details": "No remediation is available at this time."
}
],
"title": "Improper Input Validation in IPv6 component"
},
{
"cve": "CVE-2020-11909",
"notes": [
{
"category": "general",
"text": "No additional information for this vulneraiblity is currently avaialbe.",
"title": "No Notes"
}
],
"release_date": "2020-06-17T20:00:00+00:00",
"remediations": [
{
"category": "none_available",
"details": "No remediation is available at this time."
}
],
"title": "Improper input validation in IPv4 component"
},
{
"cve": "CVE-2020-11905",
"notes": [
{
"category": "general",
"text": "No additional information for this vulneraiblity is currently avaialbe.",
"title": "No Notes"
}
],
"release_date": "2020-06-17T20:00:00+00:00",
"remediations": [
{
"category": "none_available",
"details": "No remediation is available at this time."
}
],
"title": "Out Of Bounds read in DHCPv6 component"
}
]
}
CNVD-2020-34249
Vulnerability from cnvd - Published: 2020-06-18厂商已发布了漏洞修复程序,请及时关注更新: https://treck.com/vulnerability-response-information/
| Name | Treck TCP/IP stack <6.0.1.28 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2020-11903"
}
},
"description": "Treck TCP/IP\u662f\u7f8e\u56fdTreck\u516c\u53f8\u7684\u4e00\u5957\u4e13\u7528\u4e8e\u5d4c\u5165\u5f0f\u7cfb\u7edf\u7684TCP\uff08\u4f20\u8f93\u63a7\u5236\u534f\u8bae\uff09/IP\uff08\u7f51\u9645\u4e92\u8fde\u534f\u8bae\uff09\u5957\u4ef6\u3002Treck DHCP stack\u662f\u7f8e\u56fdTreck\u516c\u53f8\u7684\u4e00\u6b3e\u7528\u4e8e\u5d4c\u5165\u5f0f\u7cfb\u7edf\u7684DHCP\uff08\u52a8\u6001\u4e3b\u673a\u8bbe\u7f6e\u534f\u8bae\uff09\u5b9e\u73b0\u3002\n\nTreck TCP/IP DHCP\u7ec4\u4ef6\u5b58\u5728\u8d8a\u754c\u8bfb\u53d6\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u83b7\u53d6\u654f\u611f\u4fe1\u606f\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://treck.com/vulnerability-response-information/",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2020-34249",
"openTime": "2020-06-18",
"patchDescription": "Treck TCP/IP\u662f\u7f8e\u56fdTreck\u516c\u53f8\u7684\u4e00\u5957\u4e13\u7528\u4e8e\u5d4c\u5165\u5f0f\u7cfb\u7edf\u7684TCP\uff08\u4f20\u8f93\u63a7\u5236\u534f\u8bae\uff09/IP\uff08\u7f51\u9645\u4e92\u8fde\u534f\u8bae\uff09\u5957\u4ef6\u3002Treck DHCP stack\u662f\u7f8e\u56fdTreck\u516c\u53f8\u7684\u4e00\u6b3e\u7528\u4e8e\u5d4c\u5165\u5f0f\u7cfb\u7edf\u7684DHCP\uff08\u52a8\u6001\u4e3b\u673a\u8bbe\u7f6e\u534f\u8bae\uff09\u5b9e\u73b0\u3002\r\n\r\nTreck TCP/IP DHCP\u7ec4\u4ef6\u5b58\u5728\u8d8a\u754c\u8bfb\u53d6\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u83b7\u53d6\u654f\u611f\u4fe1\u606f\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Treck TCP/IP DHCP\u7ec4\u4ef6\u8d8a\u754c\u8bfb\u53d6\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "Treck TCP/IP stack \u003c6.0.1.28"
},
"referenceLink": "https://www.us-cert.gov/ics/advisories/icsa-20-168-01",
"serverity": "\u4e2d",
"submitTime": "2020-06-17",
"title": "Treck TCP/IP DHCP\u7ec4\u4ef6\u8d8a\u754c\u8bfb\u53d6\u6f0f\u6d1e"
}
FKIE_CVE-2020-11903
Vulnerability from fkie_nvd - Published: 2020-06-17 11:15 - Updated: 2024-11-21 04:58| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt | ||
| cve@mitre.org | https://jsof-tech.com/vulnerability-disclosure-policy/ | Third Party Advisory | |
| cve@mitre.org | https://security.netapp.com/advisory/ntap-20200625-0006/ | ||
| cve@mitre.org | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC | Third Party Advisory | |
| cve@mitre.org | https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities | ||
| cve@mitre.org | https://www.jsof-tech.com/ripple20/ | Exploit, Third Party Advisory | |
| cve@mitre.org | https://www.kb.cert.org/vuls/id/257161 | ||
| cve@mitre.org | https://www.kb.cert.org/vuls/id/257161/ | Mitigation, Third Party Advisory, US Government Resource | |
| cve@mitre.org | https://www.treck.com | Product, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://jsof-tech.com/vulnerability-disclosure-policy/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20200625-0006/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://www.jsof-tech.com/ripple20/ | Exploit, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.kb.cert.org/vuls/id/257161 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://www.kb.cert.org/vuls/id/257161/ | Mitigation, Third Party Advisory, US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.treck.com | Product, Vendor Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:treck:tcp\\/ip:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E5A61BE2-20C5-41A0-A192-4099F4DD0A03",
"versionEndExcluding": "6.0.1.28",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Treck TCP/IP stack before 6.0.1.28 has a DHCP Out-of-bounds Read."
},
{
"lang": "es",
"value": "La pila Treck TCP/IP versiones anteriores a 6.0.1.28, presenta una Lectura Fuera de L\u00edmites de DHCP"
}
],
"id": "CVE-2020-11903",
"lastModified": "2024-11-21T04:58:51.953",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.5,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2020-06-17T11:15:10.507",
"references": [
{
"source": "cve@mitre.org",
"url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://jsof-tech.com/vulnerability-disclosure-policy/"
},
{
"source": "cve@mitre.org",
"url": "https://security.netapp.com/advisory/ntap-20200625-0006/"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC"
},
{
"source": "cve@mitre.org",
"url": "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://www.jsof-tech.com/ripple20/"
},
{
"source": "cve@mitre.org",
"url": "https://www.kb.cert.org/vuls/id/257161"
},
{
"source": "cve@mitre.org",
"tags": [
"Mitigation",
"Third Party Advisory",
"US Government Resource"
],
"url": "https://www.kb.cert.org/vuls/id/257161/"
},
{
"source": "cve@mitre.org",
"tags": [
"Product",
"Vendor Advisory"
],
"url": "https://www.treck.com"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://jsof-tech.com/vulnerability-disclosure-policy/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://security.netapp.com/advisory/ntap-20200625-0006/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://www.jsof-tech.com/ripple20/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.kb.cert.org/vuls/id/257161"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Third Party Advisory",
"US Government Resource"
],
"url": "https://www.kb.cert.org/vuls/id/257161/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product",
"Vendor Advisory"
],
"url": "https://www.treck.com"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-125"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-MV5V-FV4R-RW4V
Vulnerability from github – Published: 2022-05-24 17:20 – Updated: 2022-05-24 17:20The Treck TCP/IP stack before 6.0.1.28 has a DHCP Out-of-bounds Read.
{
"affected": [],
"aliases": [
"CVE-2020-11903"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2020-06-17T11:15:00Z",
"severity": "LOW"
},
"details": "The Treck TCP/IP stack before 6.0.1.28 has a DHCP Out-of-bounds Read.",
"id": "GHSA-mv5v-fv4r-rw4v",
"modified": "2022-05-24T17:20:43Z",
"published": "2022-05-24T17:20:43Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11903"
},
{
"type": "WEB",
"url": "https://jsof-tech.com/vulnerability-disclosure-policy"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20200625-0006"
},
{
"type": "WEB",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC"
},
{
"type": "WEB",
"url": "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities"
},
{
"type": "WEB",
"url": "https://www.jsof-tech.com/ripple20"
},
{
"type": "WEB",
"url": "https://www.kb.cert.org/vuls/id/257161"
},
{
"type": "WEB",
"url": "https://www.treck.com"
},
{
"type": "WEB",
"url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt"
}
],
"schema_version": "1.4.0",
"severity": []
}
GSD-2020-11903
Vulnerability from gsd - Updated: 2023-12-13 01:22{
"GSD": {
"alias": "CVE-2020-11903",
"description": "The Treck TCP/IP stack before 6.0.1.28 has a DHCP Out-of-bounds Read.",
"id": "GSD-2020-11903",
"references": [
"https://www.suse.com/security/cve/CVE-2020-11903.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2020-11903"
],
"details": "The Treck TCP/IP stack before 6.0.1.28 has a DHCP Out-of-bounds Read.",
"id": "GSD-2020-11903",
"modified": "2023-12-13T01:22:06.073414Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2020-11903",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Treck TCP/IP stack before 6.0.1.28 has a DHCP Out-of-bounds Read."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.kb.cert.org/vuls/id/257161/",
"refsource": "MISC",
"url": "https://www.kb.cert.org/vuls/id/257161/"
},
{
"name": "https://www.treck.com",
"refsource": "MISC",
"url": "https://www.treck.com"
},
{
"name": "https://jsof-tech.com/vulnerability-disclosure-policy/",
"refsource": "MISC",
"url": "https://jsof-tech.com/vulnerability-disclosure-policy/"
},
{
"name": "VU#257161",
"refsource": "CERT-VN",
"url": "https://www.kb.cert.org/vuls/id/257161"
},
{
"name": "https://www.jsof-tech.com/ripple20/",
"refsource": "MISC",
"url": "https://www.jsof-tech.com/ripple20/"
},
{
"name": "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC"
},
{
"name": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
"refsource": "CONFIRM",
"url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt"
},
{
"name": "https://security.netapp.com/advisory/ntap-20200625-0006/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20200625-0006/"
},
{
"name": "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
"refsource": "MISC",
"url": "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:treck:tcp\\/ip:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "6.0.1.28",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2020-11903"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "The Treck TCP/IP stack before 6.0.1.28 has a DHCP Out-of-bounds Read."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.treck.com",
"refsource": "MISC",
"tags": [
"Product",
"Vendor Advisory"
],
"url": "https://www.treck.com"
},
{
"name": "https://jsof-tech.com/vulnerability-disclosure-policy/",
"refsource": "MISC",
"tags": [
"Third Party Advisory"
],
"url": "https://jsof-tech.com/vulnerability-disclosure-policy/"
},
{
"name": "https://www.jsof-tech.com/ripple20/",
"refsource": "MISC",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://www.jsof-tech.com/ripple20/"
},
{
"name": "https://www.kb.cert.org/vuls/id/257161/",
"refsource": "MISC",
"tags": [
"Mitigation",
"Third Party Advisory",
"US Government Resource"
],
"url": "https://www.kb.cert.org/vuls/id/257161/"
},
{
"name": "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
"refsource": "CISCO",
"tags": [
"Third Party Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC"
},
{
"name": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt"
},
{
"name": "https://security.netapp.com/advisory/ntap-20200625-0006/",
"refsource": "CONFIRM",
"tags": [],
"url": "https://security.netapp.com/advisory/ntap-20200625-0006/"
},
{
"name": "VU#257161",
"refsource": "CERT-VN",
"tags": [],
"url": "https://www.kb.cert.org/vuls/id/257161"
},
{
"name": "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
"refsource": "MISC",
"tags": [],
"url": "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.5,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
},
"lastModifiedDate": "2020-07-22T01:15Z",
"publishedDate": "2020-06-17T11:15Z"
}
}
}
ICSA-20-168-01
Vulnerability from csaf_cisa - Published: 2020-06-16 06:00 - Updated: 2024-09-19 06:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Treck Inc. Treck Inc TCP/IP: IPv4
Treck Inc. / Treck Inc TCP/IP
|
IPv4 |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: IPv6
Treck Inc. / Treck Inc TCP/IP
|
IPv6 |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: UDP
Treck Inc. / Treck Inc TCP/IP
|
UDP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: DNS
Treck Inc. / Treck Inc TCP/IP
|
DNS |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: DHCP
Treck Inc. / Treck Inc TCP/IP
|
DHCP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: TCP
Treck Inc. / Treck Inc TCP/IP
|
TCP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: ICMPv4
Treck Inc. / Treck Inc TCP/IP
|
ICMPv4 |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: ARP
Treck Inc. / Treck Inc TCP/IP
|
ARP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Treck Inc. Treck Inc TCP/IP: IPv4
Treck Inc. / Treck Inc TCP/IP
|
IPv4 |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: IPv6
Treck Inc. / Treck Inc TCP/IP
|
IPv6 |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: UDP
Treck Inc. / Treck Inc TCP/IP
|
UDP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: DNS
Treck Inc. / Treck Inc TCP/IP
|
DNS |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: DHCP
Treck Inc. / Treck Inc TCP/IP
|
DHCP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: TCP
Treck Inc. / Treck Inc TCP/IP
|
TCP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: ICMPv4
Treck Inc. / Treck Inc TCP/IP
|
ICMPv4 |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: ARP
Treck Inc. / Treck Inc TCP/IP
|
ARP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Treck Inc. Treck Inc TCP/IP: IPv4
Treck Inc. / Treck Inc TCP/IP
|
IPv4 |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: IPv6
Treck Inc. / Treck Inc TCP/IP
|
IPv6 |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: UDP
Treck Inc. / Treck Inc TCP/IP
|
UDP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: DNS
Treck Inc. / Treck Inc TCP/IP
|
DNS |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: DHCP
Treck Inc. / Treck Inc TCP/IP
|
DHCP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: TCP
Treck Inc. / Treck Inc TCP/IP
|
TCP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: ICMPv4
Treck Inc. / Treck Inc TCP/IP
|
ICMPv4 |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: ARP
Treck Inc. / Treck Inc TCP/IP
|
ARP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Treck Inc. Treck Inc TCP/IP: IPv4
Treck Inc. / Treck Inc TCP/IP
|
IPv4 |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: IPv6
Treck Inc. / Treck Inc TCP/IP
|
IPv6 |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: UDP
Treck Inc. / Treck Inc TCP/IP
|
UDP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: DNS
Treck Inc. / Treck Inc TCP/IP
|
DNS |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: DHCP
Treck Inc. / Treck Inc TCP/IP
|
DHCP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: TCP
Treck Inc. / Treck Inc TCP/IP
|
TCP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: ICMPv4
Treck Inc. / Treck Inc TCP/IP
|
ICMPv4 |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: ARP
Treck Inc. / Treck Inc TCP/IP
|
ARP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Treck Inc. Treck Inc TCP/IP: IPv4
Treck Inc. / Treck Inc TCP/IP
|
IPv4 |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: IPv6
Treck Inc. / Treck Inc TCP/IP
|
IPv6 |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: UDP
Treck Inc. / Treck Inc TCP/IP
|
UDP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: DNS
Treck Inc. / Treck Inc TCP/IP
|
DNS |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: DHCP
Treck Inc. / Treck Inc TCP/IP
|
DHCP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: TCP
Treck Inc. / Treck Inc TCP/IP
|
TCP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: ICMPv4
Treck Inc. / Treck Inc TCP/IP
|
ICMPv4 |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: ARP
Treck Inc. / Treck Inc TCP/IP
|
ARP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Treck Inc. Treck Inc TCP/IP: IPv4
Treck Inc. / Treck Inc TCP/IP
|
IPv4 |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: IPv6
Treck Inc. / Treck Inc TCP/IP
|
IPv6 |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: UDP
Treck Inc. / Treck Inc TCP/IP
|
UDP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: DNS
Treck Inc. / Treck Inc TCP/IP
|
DNS |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: DHCP
Treck Inc. / Treck Inc TCP/IP
|
DHCP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: TCP
Treck Inc. / Treck Inc TCP/IP
|
TCP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: ICMPv4
Treck Inc. / Treck Inc TCP/IP
|
ICMPv4 |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: ARP
Treck Inc. / Treck Inc TCP/IP
|
ARP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Treck Inc. Treck Inc TCP/IP: IPv4
Treck Inc. / Treck Inc TCP/IP
|
IPv4 |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: IPv6
Treck Inc. / Treck Inc TCP/IP
|
IPv6 |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: UDP
Treck Inc. / Treck Inc TCP/IP
|
UDP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: DNS
Treck Inc. / Treck Inc TCP/IP
|
DNS |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: DHCP
Treck Inc. / Treck Inc TCP/IP
|
DHCP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: TCP
Treck Inc. / Treck Inc TCP/IP
|
TCP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: ICMPv4
Treck Inc. / Treck Inc TCP/IP
|
ICMPv4 |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: ARP
Treck Inc. / Treck Inc TCP/IP
|
ARP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Treck Inc. Treck Inc TCP/IP: IPv4
Treck Inc. / Treck Inc TCP/IP
|
IPv4 |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: IPv6
Treck Inc. / Treck Inc TCP/IP
|
IPv6 |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: UDP
Treck Inc. / Treck Inc TCP/IP
|
UDP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: DNS
Treck Inc. / Treck Inc TCP/IP
|
DNS |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: DHCP
Treck Inc. / Treck Inc TCP/IP
|
DHCP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: TCP
Treck Inc. / Treck Inc TCP/IP
|
TCP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: ICMPv4
Treck Inc. / Treck Inc TCP/IP
|
ICMPv4 |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: ARP
Treck Inc. / Treck Inc TCP/IP
|
ARP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Treck Inc. Treck Inc TCP/IP: IPv4
Treck Inc. / Treck Inc TCP/IP
|
IPv4 |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: IPv6
Treck Inc. / Treck Inc TCP/IP
|
IPv6 |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: UDP
Treck Inc. / Treck Inc TCP/IP
|
UDP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: DNS
Treck Inc. / Treck Inc TCP/IP
|
DNS |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: DHCP
Treck Inc. / Treck Inc TCP/IP
|
DHCP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: TCP
Treck Inc. / Treck Inc TCP/IP
|
TCP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: ICMPv4
Treck Inc. / Treck Inc TCP/IP
|
ICMPv4 |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: ARP
Treck Inc. / Treck Inc TCP/IP
|
ARP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Treck Inc. Treck Inc TCP/IP: IPv4
Treck Inc. / Treck Inc TCP/IP
|
IPv4 |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: IPv6
Treck Inc. / Treck Inc TCP/IP
|
IPv6 |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: UDP
Treck Inc. / Treck Inc TCP/IP
|
UDP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: DNS
Treck Inc. / Treck Inc TCP/IP
|
DNS |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: DHCP
Treck Inc. / Treck Inc TCP/IP
|
DHCP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: TCP
Treck Inc. / Treck Inc TCP/IP
|
TCP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: ICMPv4
Treck Inc. / Treck Inc TCP/IP
|
ICMPv4 |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: ARP
Treck Inc. / Treck Inc TCP/IP
|
ARP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Treck Inc. Treck Inc TCP/IP: IPv4
Treck Inc. / Treck Inc TCP/IP
|
IPv4 |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: IPv6
Treck Inc. / Treck Inc TCP/IP
|
IPv6 |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: UDP
Treck Inc. / Treck Inc TCP/IP
|
UDP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: DNS
Treck Inc. / Treck Inc TCP/IP
|
DNS |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: DHCP
Treck Inc. / Treck Inc TCP/IP
|
DHCP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: TCP
Treck Inc. / Treck Inc TCP/IP
|
TCP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: ICMPv4
Treck Inc. / Treck Inc TCP/IP
|
ICMPv4 |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: ARP
Treck Inc. / Treck Inc TCP/IP
|
ARP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Treck Inc. Treck Inc TCP/IP: IPv4
Treck Inc. / Treck Inc TCP/IP
|
IPv4 |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: IPv6
Treck Inc. / Treck Inc TCP/IP
|
IPv6 |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: UDP
Treck Inc. / Treck Inc TCP/IP
|
UDP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: DNS
Treck Inc. / Treck Inc TCP/IP
|
DNS |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: DHCP
Treck Inc. / Treck Inc TCP/IP
|
DHCP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: TCP
Treck Inc. / Treck Inc TCP/IP
|
TCP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: ICMPv4
Treck Inc. / Treck Inc TCP/IP
|
ICMPv4 |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: ARP
Treck Inc. / Treck Inc TCP/IP
|
ARP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Treck Inc. Treck Inc TCP/IP: IPv4
Treck Inc. / Treck Inc TCP/IP
|
IPv4 |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: IPv6
Treck Inc. / Treck Inc TCP/IP
|
IPv6 |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: UDP
Treck Inc. / Treck Inc TCP/IP
|
UDP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: DNS
Treck Inc. / Treck Inc TCP/IP
|
DNS |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: DHCP
Treck Inc. / Treck Inc TCP/IP
|
DHCP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: TCP
Treck Inc. / Treck Inc TCP/IP
|
TCP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: ICMPv4
Treck Inc. / Treck Inc TCP/IP
|
ICMPv4 |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: ARP
Treck Inc. / Treck Inc TCP/IP
|
ARP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Treck Inc. Treck Inc TCP/IP: IPv4
Treck Inc. / Treck Inc TCP/IP
|
IPv4 |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: IPv6
Treck Inc. / Treck Inc TCP/IP
|
IPv6 |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: UDP
Treck Inc. / Treck Inc TCP/IP
|
UDP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: DNS
Treck Inc. / Treck Inc TCP/IP
|
DNS |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: DHCP
Treck Inc. / Treck Inc TCP/IP
|
DHCP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: TCP
Treck Inc. / Treck Inc TCP/IP
|
TCP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: ICMPv4
Treck Inc. / Treck Inc TCP/IP
|
ICMPv4 |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: ARP
Treck Inc. / Treck Inc TCP/IP
|
ARP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Treck Inc. Treck Inc TCP/IP: IPv4
Treck Inc. / Treck Inc TCP/IP
|
IPv4 |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: IPv6
Treck Inc. / Treck Inc TCP/IP
|
IPv6 |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: UDP
Treck Inc. / Treck Inc TCP/IP
|
UDP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: DNS
Treck Inc. / Treck Inc TCP/IP
|
DNS |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: DHCP
Treck Inc. / Treck Inc TCP/IP
|
DHCP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: TCP
Treck Inc. / Treck Inc TCP/IP
|
TCP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: ICMPv4
Treck Inc. / Treck Inc TCP/IP
|
ICMPv4 |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: ARP
Treck Inc. / Treck Inc TCP/IP
|
ARP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Treck Inc. Treck Inc TCP/IP: IPv4
Treck Inc. / Treck Inc TCP/IP
|
IPv4 |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: IPv6
Treck Inc. / Treck Inc TCP/IP
|
IPv6 |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: UDP
Treck Inc. / Treck Inc TCP/IP
|
UDP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: DNS
Treck Inc. / Treck Inc TCP/IP
|
DNS |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: DHCP
Treck Inc. / Treck Inc TCP/IP
|
DHCP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: TCP
Treck Inc. / Treck Inc TCP/IP
|
TCP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: ICMPv4
Treck Inc. / Treck Inc TCP/IP
|
ICMPv4 |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: ARP
Treck Inc. / Treck Inc TCP/IP
|
ARP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Treck Inc. Treck Inc TCP/IP: IPv4
Treck Inc. / Treck Inc TCP/IP
|
IPv4 |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: IPv6
Treck Inc. / Treck Inc TCP/IP
|
IPv6 |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: UDP
Treck Inc. / Treck Inc TCP/IP
|
UDP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: DNS
Treck Inc. / Treck Inc TCP/IP
|
DNS |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: DHCP
Treck Inc. / Treck Inc TCP/IP
|
DHCP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: TCP
Treck Inc. / Treck Inc TCP/IP
|
TCP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: ICMPv4
Treck Inc. / Treck Inc TCP/IP
|
ICMPv4 |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: ARP
Treck Inc. / Treck Inc TCP/IP
|
ARP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Treck Inc. Treck Inc TCP/IP: IPv4
Treck Inc. / Treck Inc TCP/IP
|
IPv4 |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: IPv6
Treck Inc. / Treck Inc TCP/IP
|
IPv6 |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: UDP
Treck Inc. / Treck Inc TCP/IP
|
UDP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: DNS
Treck Inc. / Treck Inc TCP/IP
|
DNS |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: DHCP
Treck Inc. / Treck Inc TCP/IP
|
DHCP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: TCP
Treck Inc. / Treck Inc TCP/IP
|
TCP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: ICMPv4
Treck Inc. / Treck Inc TCP/IP
|
ICMPv4 |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: ARP
Treck Inc. / Treck Inc TCP/IP
|
ARP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Treck Inc. Treck Inc TCP/IP: IPv4
Treck Inc. / Treck Inc TCP/IP
|
IPv4 |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: IPv6
Treck Inc. / Treck Inc TCP/IP
|
IPv6 |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: UDP
Treck Inc. / Treck Inc TCP/IP
|
UDP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: DNS
Treck Inc. / Treck Inc TCP/IP
|
DNS |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: DHCP
Treck Inc. / Treck Inc TCP/IP
|
DHCP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: TCP
Treck Inc. / Treck Inc TCP/IP
|
TCP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: ICMPv4
Treck Inc. / Treck Inc TCP/IP
|
ICMPv4 |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
|
|
Treck Inc. Treck Inc TCP/IP: ARP
Treck Inc. / Treck Inc TCP/IP
|
ARP |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
|
| URL | Category |
|---|---|
| https://raw.githubusercontent.com/cisagov/CSAF/de… | self |
| https://www.cisa.gov/news-events/ics-advisories/i… | self |
| https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-… | external |
| https://www.cisa.gov/resources-tools/resources/ic… | external |
| https://www.cisa.gov/sites/default/files/publicat… | external |
| https://www.cisa.gov/topics/industrial-control-systems | external |
| https://us-cert.cisa.gov/sites/default/files/reco… | external |
| https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B | external |
| https://www.cisa.gov/uscert/sites/default/files/p… | external |
| https://www.cisa.gov/uscert/ncas/tips/ST04-014 | external |
| https://www.cve.org/CVERecord?id=CVE-2020-11896 | external |
| https://www.first.org/cvss/calculator/3.1#CVSS:3.… | external |
| https://www.cve.org/CVERecord?id=CVE-2020-11897 | external |
| https://www.cve.org/CVERecord?id=CVE-2020-11898 | external |
| https://www.first.org/cvss/calculator/3.1#CVSS:3.… | external |
| https://www.cve.org/CVERecord?id=CVE-2020-11899 | external |
| https://www.first.org/cvss/calculator/3.1#CVSS:3.… | external |
| https://www.cve.org/CVERecord?id=CVE-2020-11900 | external |
| https://www.first.org/cvss/calculator/3.1#CVSS:3.… | external |
| https://www.cve.org/CVERecord?id=CVE-2020-11901 | external |
| https://www.first.org/cvss/calculator/3.1#CVSS:3.… | external |
| https://www.cve.org/CVERecord?id=CVE-2020-11902 | external |
| https://www.first.org/cvss/calculator/3.1#CVSS:3.… | external |
| https://www.cve.org/CVERecord?id=CVE-2020-11903 | external |
| https://www.first.org/cvss/calculator/3.1#CVSS:3.… | external |
| https://www.cve.org/CVERecord?id=CVE-2020-11904 | external |
| https://www.first.org/cvss/calculator/3.1#CVSS:3.… | external |
| https://www.cve.org/CVERecord?id=CVE-2020-11905 | external |
| https://www.cve.org/CVERecord?id=CVE-2020-11906 | external |
| https://www.first.org/cvss/calculator/3.1#CVSS:3.… | external |
| https://www.cve.org/CVERecord?id=CVE-2020-11907 | external |
| https://www.cve.org/CVERecord?id=CVE-2020-11908 | external |
| https://www.first.org/cvss/calculator/3.1#CVSS:3.… | external |
| https://www.cve.org/CVERecord?id=CVE-2020-11909 | external |
| https://www.first.org/cvss/calculator/3.1#CVSS:3.… | external |
| https://www.cve.org/CVERecord?id=CVE-2020-11910 | external |
| https://www.cve.org/CVERecord?id=CVE-2020-11911 | external |
| https://www.first.org/cvss/calculator/3.1#CVSS:3.… | external |
| https://www.cve.org/CVERecord?id=CVE-2020-11912 | external |
| https://www.cve.org/CVERecord?id=CVE-2020-11913 | external |
| https://www.cve.org/CVERecord?id=CVE-2020-11914 | external |
| https://www.first.org/cvss/calculator/3.1#CVSS:3.… | external |
{
"document": {
"acknowledgments": [
{
"names": [
"Shlomi Oberman",
"Moshe Kol"
],
"organization": "JSOF",
"summary": "reporting these vulnerabilities to CERT/CC"
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "summary",
"text": "Successful exploitation of these vulnerabilities may allow remote code execution or exposure of sensitive information.",
"title": "Risk evaluation"
},
{
"category": "other",
"text": "Energy, Critical Manufacturing, Information Technology, Healthcare and Public Health, Transportation Systems",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "United States",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities, such as:",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolating them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as virtual private networks (VPNs). Recognize VPNs may have vulnerabilities, should be updated to the most recent version available, and are only as secure as the connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "No known public exploitation specifically targeting these vulnerabilities has been reported to CISA at this time. This vulnerability has a high attack complexity.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "ICS Advisory ICSA-20-168-01 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2020/icsa-20-168-01.json"
},
{
"category": "self",
"summary": "ICSA Advisory ICSA-20-168-01 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-20-168-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/sites/default/files/publications/emailscams0905.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ncas/tips/ST04-014"
}
],
"title": "Treck TCP/IP (Update I)",
"tracking": {
"current_release_date": "2024-09-19T06:00:00.000000Z",
"generator": {
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-20-168-01",
"initial_release_date": "2020-06-16T06:00:00.000000Z",
"revision_history": [
{
"date": "2020-06-16T06:00:00.000000Z",
"legacy_version": "Initial",
"number": "1",
"summary": "Initial Publication"
},
{
"date": "2020-06-18T06:00:00.000000Z",
"legacy_version": "Update A",
"number": "2",
"summary": "Update A - ICSA-20-168-01 Treck TCP-IP Stack (Update A)"
},
{
"date": "2020-06-30T06:00:00.000000Z",
"legacy_version": "Update B",
"number": "3",
"summary": "Update B - ICSA-20-168-01 Treck TCP/IP Stack (Update B)"
},
{
"date": "2020-07-07T06:00:00.000000Z",
"legacy_version": "Update C",
"number": "4",
"summary": "Update C - ICSA-20-168-01 Treck TCP-IP Stack (Update C)"
},
{
"date": "2020-07-14T06:00:00.000000Z",
"legacy_version": "Update D",
"number": "5",
"summary": "Update D - ICSA-20-168-01 Treck TCP/IP Stack (Update D)"
},
{
"date": "2020-07-21T06:00:00.000000Z",
"legacy_version": "Update E",
"number": "6",
"summary": "Update E - ICSA-20-168-01 Treck TCP/IP Stack (Update E)"
},
{
"date": "2020-08-04T06:00:00.000000Z",
"legacy_version": "Update F",
"number": "7",
"summary": "Update F - ICSA-20-168-01 Treck TCP-IP Stack (Update F)"
},
{
"date": "2020-08-20T06:00:00.000000Z",
"legacy_version": "Update G",
"number": "8",
"summary": "Update G - ICSA-20-168-01 Treck TCP/IP Stack (Update G)"
},
{
"date": "2022-03-17T06:00:00.000000Z",
"legacy_version": "Update H",
"number": "9",
"summary": "Update H - ICSA-20-168-01 Treck TCP/IP Stack (Update H)"
},
{
"date": "2024-09-19T06:00:00.000000Z",
"legacy_version": "Update I",
"number": "10",
"summary": "Update I - Included IDEC Corporation."
}
],
"status": "final",
"version": "10"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "IPv4",
"product": {
"name": "Treck Inc. Treck Inc TCP/IP: IPv4",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "Treck Inc TCP/IP"
},
{
"branches": [
{
"category": "product_version",
"name": "IPv6",
"product": {
"name": "Treck Inc. Treck Inc TCP/IP: IPv6",
"product_id": "CSAFPID-0002"
}
}
],
"category": "product_name",
"name": "Treck Inc TCP/IP"
},
{
"branches": [
{
"category": "product_version",
"name": "UDP",
"product": {
"name": "Treck Inc. Treck Inc TCP/IP: UDP",
"product_id": "CSAFPID-0003"
}
}
],
"category": "product_name",
"name": "Treck Inc TCP/IP"
},
{
"branches": [
{
"category": "product_version",
"name": "DNS",
"product": {
"name": "Treck Inc. Treck Inc TCP/IP: DNS",
"product_id": "CSAFPID-0004"
}
}
],
"category": "product_name",
"name": "Treck Inc TCP/IP"
},
{
"branches": [
{
"category": "product_version",
"name": "DHCP",
"product": {
"name": "Treck Inc. Treck Inc TCP/IP: DHCP",
"product_id": "CSAFPID-0005"
}
}
],
"category": "product_name",
"name": "Treck Inc TCP/IP"
},
{
"branches": [
{
"category": "product_version",
"name": "TCP",
"product": {
"name": "Treck Inc. Treck Inc TCP/IP: TCP",
"product_id": "CSAFPID-0006"
}
}
],
"category": "product_name",
"name": "Treck Inc TCP/IP"
},
{
"branches": [
{
"category": "product_version",
"name": "ICMPv4",
"product": {
"name": "Treck Inc. Treck Inc TCP/IP: ICMPv4",
"product_id": "CSAFPID-0007"
}
}
],
"category": "product_name",
"name": "Treck Inc TCP/IP"
},
{
"branches": [
{
"category": "product_version",
"name": "ARP",
"product": {
"name": "Treck Inc. Treck Inc TCP/IP: ARP",
"product_id": "CSAFPID-0008"
}
}
],
"category": "product_name",
"name": "Treck Inc TCP/IP"
}
],
"category": "vendor",
"name": "Treck Inc."
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-11896",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "summary",
"text": "Improper handling of length parameter inconsistency in IPv4/UDP component when handling a packet sent by an unauthorized network attacker. This vulnerability may result in remote code execution.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11896"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Treck recommends users apply the latest version of the affected products:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Treck TCP/IP: Update to 6.0.1.67 or later versions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "To obtain patches, email Treck at security@treck.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "mailto:security@treck.com"
},
{
"category": "mitigation",
"details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Treck advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1508.html"
},
{
"category": "mitigation",
"details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "ABB",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=1MRS494936A\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
},
{
"category": "mitigation",
"details": "B.Braun",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bbraunusa.com/en/products-and-therapies/customer-communications.html"
},
{
"category": "mitigation",
"details": "Baxter",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.baxter.com/product-security#additionalresources"
},
{
"category": "mitigation",
"details": "BD",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bd.com/en-us/support/product-security-and-privacy/product-security-bulletins/third-party-product-security-bulletin-for-treck-tcp-ip-stack-vulnerabilities"
},
{
"category": "mitigation",
"details": "CareStream",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.carestream.com/en/us/services-and-support/cybersecurity-and-privacy"
},
{
"category": "mitigation",
"details": "Caterpillar",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.cat.com/en_US/support/technology/connected-solutions-principles/security/caterpillar-cybersecurity-advisory.html"
},
{
"category": "mitigation",
"details": "DIGI International",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.digi.com/support/knowledge-base/digi-international-security-notice-treck-tcp-ip-st"
},
{
"category": "mitigation",
"details": "Eaton",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/eaton-security-bulletin-treck-tcp-ip-stack-vulnerabilities-ripple20.pdf"
},
{
"category": "mitigation",
"details": "Green Hills Software",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://support.ghs.com/psirt/PSA-2020-05/"
},
{
"category": "mitigation",
"details": "IDEC Corporation",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://us.idec.com/media/24-RD-0300-EN.pdf"
},
{
"category": "mitigation",
"details": "Johnson Controls",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.johnsoncontrols.com/cyber-solutions/security-advisories"
},
{
"category": "mitigation",
"details": "Miele",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2020-024"
},
{
"category": "mitigation",
"details": "Opto 22",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.opto22.com/support/resources-tools/knowledgebase/kb88981"
},
{
"category": "mitigation",
"details": "Pepperl+Fuchs",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en/advisories/VDE-2021-028/"
},
{
"category": "mitigation",
"details": "Rockwell",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1126896"
},
{
"category": "mitigation",
"details": "Schneider Electric",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.se.com/ww/en/download/document/SESB-2020-168-01"
},
{
"category": "mitigation",
"details": "Smiths Medical",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.smiths-medical.com/company-information/news-and-events/news/2020/july/02/smiths-medical-cybersecurity-bulletin"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
}
]
},
{
"cve": "CVE-2020-11897",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "summary",
"text": "Improper handling of length parameter inconsistency in IPv6 component when handling a packet sent by an unauthorized network attacker. This vulnerability may result in possible out-of-bounds write.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11897"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Treck recommends users apply the latest version of the affected products:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Treck TCP/IP: Update to 6.0.1.67 or later versions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "To obtain patches, email Treck at security@treck.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "mailto:security@treck.com"
},
{
"category": "mitigation",
"details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Treck advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1508.html"
},
{
"category": "mitigation",
"details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "ABB",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=1MRS494936A\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
},
{
"category": "mitigation",
"details": "B.Braun",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bbraunusa.com/en/products-and-therapies/customer-communications.html"
},
{
"category": "mitigation",
"details": "Baxter",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.baxter.com/product-security#additionalresources"
},
{
"category": "mitigation",
"details": "BD",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bd.com/en-us/support/product-security-and-privacy/product-security-bulletins/third-party-product-security-bulletin-for-treck-tcp-ip-stack-vulnerabilities"
},
{
"category": "mitigation",
"details": "CareStream",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.carestream.com/en/us/services-and-support/cybersecurity-and-privacy"
},
{
"category": "mitigation",
"details": "Caterpillar",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.cat.com/en_US/support/technology/connected-solutions-principles/security/caterpillar-cybersecurity-advisory.html"
},
{
"category": "mitigation",
"details": "DIGI International",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.digi.com/support/knowledge-base/digi-international-security-notice-treck-tcp-ip-st"
},
{
"category": "mitigation",
"details": "Eaton",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/eaton-security-bulletin-treck-tcp-ip-stack-vulnerabilities-ripple20.pdf"
},
{
"category": "mitigation",
"details": "Green Hills Software",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://support.ghs.com/psirt/PSA-2020-05/"
},
{
"category": "mitigation",
"details": "IDEC Corporation",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://us.idec.com/media/24-RD-0300-EN.pdf"
},
{
"category": "mitigation",
"details": "Johnson Controls",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.johnsoncontrols.com/cyber-solutions/security-advisories"
},
{
"category": "mitigation",
"details": "Miele",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2020-024"
},
{
"category": "mitigation",
"details": "Opto 22",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.opto22.com/support/resources-tools/knowledgebase/kb88981"
},
{
"category": "mitigation",
"details": "Pepperl+Fuchs",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en/advisories/VDE-2021-028/"
},
{
"category": "mitigation",
"details": "Rockwell",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1126896"
},
{
"category": "mitigation",
"details": "Schneider Electric",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.se.com/ww/en/download/document/SESB-2020-168-01"
},
{
"category": "mitigation",
"details": "Smiths Medical",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.smiths-medical.com/company-information/news-and-events/news/2020/july/02/smiths-medical-cybersecurity-bulletin"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
}
]
},
{
"cve": "CVE-2020-11898",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "summary",
"text": "Improper handling of length parameter inconsistency in IPv4/ICMPv4 component when handling a packet sent by an unauthorized network attacker. This vulnerability may result in out-of-bounds read.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11898"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Treck recommends users apply the latest version of the affected products:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Treck TCP/IP: Update to 6.0.1.67 or later versions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "To obtain patches, email Treck at security@treck.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "mailto:security@treck.com"
},
{
"category": "mitigation",
"details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Treck advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1508.html"
},
{
"category": "mitigation",
"details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "ABB",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=1MRS494936A\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
},
{
"category": "mitigation",
"details": "B.Braun",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bbraunusa.com/en/products-and-therapies/customer-communications.html"
},
{
"category": "mitigation",
"details": "Baxter",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.baxter.com/product-security#additionalresources"
},
{
"category": "mitigation",
"details": "BD",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bd.com/en-us/support/product-security-and-privacy/product-security-bulletins/third-party-product-security-bulletin-for-treck-tcp-ip-stack-vulnerabilities"
},
{
"category": "mitigation",
"details": "CareStream",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.carestream.com/en/us/services-and-support/cybersecurity-and-privacy"
},
{
"category": "mitigation",
"details": "Caterpillar",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.cat.com/en_US/support/technology/connected-solutions-principles/security/caterpillar-cybersecurity-advisory.html"
},
{
"category": "mitigation",
"details": "DIGI International",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.digi.com/support/knowledge-base/digi-international-security-notice-treck-tcp-ip-st"
},
{
"category": "mitigation",
"details": "Eaton",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/eaton-security-bulletin-treck-tcp-ip-stack-vulnerabilities-ripple20.pdf"
},
{
"category": "mitigation",
"details": "Green Hills Software",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://support.ghs.com/psirt/PSA-2020-05/"
},
{
"category": "mitigation",
"details": "IDEC Corporation",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://us.idec.com/media/24-RD-0300-EN.pdf"
},
{
"category": "mitigation",
"details": "Johnson Controls",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.johnsoncontrols.com/cyber-solutions/security-advisories"
},
{
"category": "mitigation",
"details": "Miele",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2020-024"
},
{
"category": "mitigation",
"details": "Opto 22",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.opto22.com/support/resources-tools/knowledgebase/kb88981"
},
{
"category": "mitigation",
"details": "Pepperl+Fuchs",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en/advisories/VDE-2021-028/"
},
{
"category": "mitigation",
"details": "Rockwell",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1126896"
},
{
"category": "mitigation",
"details": "Schneider Electric",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.se.com/ww/en/download/document/SESB-2020-168-01"
},
{
"category": "mitigation",
"details": "Smiths Medical",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.smiths-medical.com/company-information/news-and-events/news/2020/july/02/smiths-medical-cybersecurity-bulletin"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
}
]
},
{
"cve": "CVE-2020-11899",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Improper input validation in IPv6 component when handling a packet sent by an unauthorized network attacker. This vulnerability may allow out-of-bounds read and a possible denial of service.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11899"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Treck recommends users apply the latest version of the affected products:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Treck TCP/IP: Update to 6.0.1.67 or later versions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "To obtain patches, email Treck at security@treck.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "mailto:security@treck.com"
},
{
"category": "mitigation",
"details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Treck advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1508.html"
},
{
"category": "mitigation",
"details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "ABB",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=1MRS494936A\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
},
{
"category": "mitigation",
"details": "B.Braun",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bbraunusa.com/en/products-and-therapies/customer-communications.html"
},
{
"category": "mitigation",
"details": "Baxter",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.baxter.com/product-security#additionalresources"
},
{
"category": "mitigation",
"details": "BD",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bd.com/en-us/support/product-security-and-privacy/product-security-bulletins/third-party-product-security-bulletin-for-treck-tcp-ip-stack-vulnerabilities"
},
{
"category": "mitigation",
"details": "CareStream",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.carestream.com/en/us/services-and-support/cybersecurity-and-privacy"
},
{
"category": "mitigation",
"details": "Caterpillar",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.cat.com/en_US/support/technology/connected-solutions-principles/security/caterpillar-cybersecurity-advisory.html"
},
{
"category": "mitigation",
"details": "DIGI International",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.digi.com/support/knowledge-base/digi-international-security-notice-treck-tcp-ip-st"
},
{
"category": "mitigation",
"details": "Eaton",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/eaton-security-bulletin-treck-tcp-ip-stack-vulnerabilities-ripple20.pdf"
},
{
"category": "mitigation",
"details": "Green Hills Software",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://support.ghs.com/psirt/PSA-2020-05/"
},
{
"category": "mitigation",
"details": "IDEC Corporation",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://us.idec.com/media/24-RD-0300-EN.pdf"
},
{
"category": "mitigation",
"details": "Johnson Controls",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.johnsoncontrols.com/cyber-solutions/security-advisories"
},
{
"category": "mitigation",
"details": "Miele",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2020-024"
},
{
"category": "mitigation",
"details": "Opto 22",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.opto22.com/support/resources-tools/knowledgebase/kb88981"
},
{
"category": "mitigation",
"details": "Pepperl+Fuchs",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en/advisories/VDE-2021-028/"
},
{
"category": "mitigation",
"details": "Rockwell",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1126896"
},
{
"category": "mitigation",
"details": "Schneider Electric",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.se.com/ww/en/download/document/SESB-2020-168-01"
},
{
"category": "mitigation",
"details": "Smiths Medical",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.smiths-medical.com/company-information/news-and-events/news/2020/july/02/smiths-medical-cybersecurity-bulletin"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
}
]
},
{
"cve": "CVE-2020-11900",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "summary",
"text": "Possible double free in IPv4 tunneling component when handling a packet sent by a network attacker. This vulnerability may result in use after free.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11900"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Treck recommends users apply the latest version of the affected products:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Treck TCP/IP: Update to 6.0.1.67 or later versions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "To obtain patches, email Treck at security@treck.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "mailto:security@treck.com"
},
{
"category": "mitigation",
"details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Treck advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1508.html"
},
{
"category": "mitigation",
"details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "ABB",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=1MRS494936A\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
},
{
"category": "mitigation",
"details": "B.Braun",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bbraunusa.com/en/products-and-therapies/customer-communications.html"
},
{
"category": "mitigation",
"details": "Baxter",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.baxter.com/product-security#additionalresources"
},
{
"category": "mitigation",
"details": "BD",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bd.com/en-us/support/product-security-and-privacy/product-security-bulletins/third-party-product-security-bulletin-for-treck-tcp-ip-stack-vulnerabilities"
},
{
"category": "mitigation",
"details": "CareStream",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.carestream.com/en/us/services-and-support/cybersecurity-and-privacy"
},
{
"category": "mitigation",
"details": "Caterpillar",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.cat.com/en_US/support/technology/connected-solutions-principles/security/caterpillar-cybersecurity-advisory.html"
},
{
"category": "mitigation",
"details": "DIGI International",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.digi.com/support/knowledge-base/digi-international-security-notice-treck-tcp-ip-st"
},
{
"category": "mitigation",
"details": "Eaton",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/eaton-security-bulletin-treck-tcp-ip-stack-vulnerabilities-ripple20.pdf"
},
{
"category": "mitigation",
"details": "Green Hills Software",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://support.ghs.com/psirt/PSA-2020-05/"
},
{
"category": "mitigation",
"details": "IDEC Corporation",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://us.idec.com/media/24-RD-0300-EN.pdf"
},
{
"category": "mitigation",
"details": "Johnson Controls",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.johnsoncontrols.com/cyber-solutions/security-advisories"
},
{
"category": "mitigation",
"details": "Miele",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2020-024"
},
{
"category": "mitigation",
"details": "Opto 22",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.opto22.com/support/resources-tools/knowledgebase/kb88981"
},
{
"category": "mitigation",
"details": "Pepperl+Fuchs",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en/advisories/VDE-2021-028/"
},
{
"category": "mitigation",
"details": "Rockwell",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1126896"
},
{
"category": "mitigation",
"details": "Schneider Electric",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.se.com/ww/en/download/document/SESB-2020-168-01"
},
{
"category": "mitigation",
"details": "Smiths Medical",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.smiths-medical.com/company-information/news-and-events/news/2020/july/02/smiths-medical-cybersecurity-bulletin"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
}
]
},
{
"cve": "CVE-2020-11901",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Improper input validation in DNS resolver component when handling a packet sent by an unauthorized network attacker. This vulnerability may result in remote code execution.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11901"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Treck recommends users apply the latest version of the affected products:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Treck TCP/IP: Update to 6.0.1.67 or later versions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "To obtain patches, email Treck at security@treck.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "mailto:security@treck.com"
},
{
"category": "mitigation",
"details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Treck advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1508.html"
},
{
"category": "mitigation",
"details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "ABB",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=1MRS494936A\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
},
{
"category": "mitigation",
"details": "B.Braun",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bbraunusa.com/en/products-and-therapies/customer-communications.html"
},
{
"category": "mitigation",
"details": "Baxter",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.baxter.com/product-security#additionalresources"
},
{
"category": "mitigation",
"details": "BD",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bd.com/en-us/support/product-security-and-privacy/product-security-bulletins/third-party-product-security-bulletin-for-treck-tcp-ip-stack-vulnerabilities"
},
{
"category": "mitigation",
"details": "CareStream",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.carestream.com/en/us/services-and-support/cybersecurity-and-privacy"
},
{
"category": "mitigation",
"details": "Caterpillar",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.cat.com/en_US/support/technology/connected-solutions-principles/security/caterpillar-cybersecurity-advisory.html"
},
{
"category": "mitigation",
"details": "DIGI International",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.digi.com/support/knowledge-base/digi-international-security-notice-treck-tcp-ip-st"
},
{
"category": "mitigation",
"details": "Eaton",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/eaton-security-bulletin-treck-tcp-ip-stack-vulnerabilities-ripple20.pdf"
},
{
"category": "mitigation",
"details": "Green Hills Software",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://support.ghs.com/psirt/PSA-2020-05/"
},
{
"category": "mitigation",
"details": "IDEC Corporation",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://us.idec.com/media/24-RD-0300-EN.pdf"
},
{
"category": "mitigation",
"details": "Johnson Controls",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.johnsoncontrols.com/cyber-solutions/security-advisories"
},
{
"category": "mitigation",
"details": "Miele",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2020-024"
},
{
"category": "mitigation",
"details": "Opto 22",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.opto22.com/support/resources-tools/knowledgebase/kb88981"
},
{
"category": "mitigation",
"details": "Pepperl+Fuchs",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en/advisories/VDE-2021-028/"
},
{
"category": "mitigation",
"details": "Rockwell",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1126896"
},
{
"category": "mitigation",
"details": "Schneider Electric",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.se.com/ww/en/download/document/SESB-2020-168-01"
},
{
"category": "mitigation",
"details": "Smiths Medical",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.smiths-medical.com/company-information/news-and-events/news/2020/july/02/smiths-medical-cybersecurity-bulletin"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
}
]
},
{
"cve": "CVE-2020-11902",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Improper input validation in IPv6 over IPv4 tunneling component when handling a packet sent by an unauthorized network attacker. This vulnerability may allow out-of-bounds read.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11902"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Treck recommends users apply the latest version of the affected products:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Treck TCP/IP: Update to 6.0.1.67 or later versions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "To obtain patches, email Treck at security@treck.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "mailto:security@treck.com"
},
{
"category": "mitigation",
"details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Treck advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1508.html"
},
{
"category": "mitigation",
"details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "ABB",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=1MRS494936A\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
},
{
"category": "mitigation",
"details": "B.Braun",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bbraunusa.com/en/products-and-therapies/customer-communications.html"
},
{
"category": "mitigation",
"details": "Baxter",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.baxter.com/product-security#additionalresources"
},
{
"category": "mitigation",
"details": "BD",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bd.com/en-us/support/product-security-and-privacy/product-security-bulletins/third-party-product-security-bulletin-for-treck-tcp-ip-stack-vulnerabilities"
},
{
"category": "mitigation",
"details": "CareStream",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.carestream.com/en/us/services-and-support/cybersecurity-and-privacy"
},
{
"category": "mitigation",
"details": "Caterpillar",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.cat.com/en_US/support/technology/connected-solutions-principles/security/caterpillar-cybersecurity-advisory.html"
},
{
"category": "mitigation",
"details": "DIGI International",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.digi.com/support/knowledge-base/digi-international-security-notice-treck-tcp-ip-st"
},
{
"category": "mitigation",
"details": "Eaton",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/eaton-security-bulletin-treck-tcp-ip-stack-vulnerabilities-ripple20.pdf"
},
{
"category": "mitigation",
"details": "Green Hills Software",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://support.ghs.com/psirt/PSA-2020-05/"
},
{
"category": "mitigation",
"details": "IDEC Corporation",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://us.idec.com/media/24-RD-0300-EN.pdf"
},
{
"category": "mitigation",
"details": "Johnson Controls",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.johnsoncontrols.com/cyber-solutions/security-advisories"
},
{
"category": "mitigation",
"details": "Miele",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2020-024"
},
{
"category": "mitigation",
"details": "Opto 22",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.opto22.com/support/resources-tools/knowledgebase/kb88981"
},
{
"category": "mitigation",
"details": "Pepperl+Fuchs",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en/advisories/VDE-2021-028/"
},
{
"category": "mitigation",
"details": "Rockwell",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1126896"
},
{
"category": "mitigation",
"details": "Schneider Electric",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.se.com/ww/en/download/document/SESB-2020-168-01"
},
{
"category": "mitigation",
"details": "Smiths Medical",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.smiths-medical.com/company-information/news-and-events/news/2020/july/02/smiths-medical-cybersecurity-bulletin"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
}
]
},
{
"cve": "CVE-2020-11903",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "Possible out-of-bounds read in DHCP component when handling a packet sent by an unauthorized network attacker. This vulnerability may allow exposure of sensitive information.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11903"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Treck recommends users apply the latest version of the affected products:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Treck TCP/IP: Update to 6.0.1.67 or later versions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "To obtain patches, email Treck at security@treck.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "mailto:security@treck.com"
},
{
"category": "mitigation",
"details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Treck advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1508.html"
},
{
"category": "mitigation",
"details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "ABB",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=1MRS494936A\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
},
{
"category": "mitigation",
"details": "B.Braun",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bbraunusa.com/en/products-and-therapies/customer-communications.html"
},
{
"category": "mitigation",
"details": "Baxter",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.baxter.com/product-security#additionalresources"
},
{
"category": "mitigation",
"details": "BD",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bd.com/en-us/support/product-security-and-privacy/product-security-bulletins/third-party-product-security-bulletin-for-treck-tcp-ip-stack-vulnerabilities"
},
{
"category": "mitigation",
"details": "CareStream",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.carestream.com/en/us/services-and-support/cybersecurity-and-privacy"
},
{
"category": "mitigation",
"details": "Caterpillar",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.cat.com/en_US/support/technology/connected-solutions-principles/security/caterpillar-cybersecurity-advisory.html"
},
{
"category": "mitigation",
"details": "DIGI International",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.digi.com/support/knowledge-base/digi-international-security-notice-treck-tcp-ip-st"
},
{
"category": "mitigation",
"details": "Eaton",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/eaton-security-bulletin-treck-tcp-ip-stack-vulnerabilities-ripple20.pdf"
},
{
"category": "mitigation",
"details": "Green Hills Software",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://support.ghs.com/psirt/PSA-2020-05/"
},
{
"category": "mitigation",
"details": "IDEC Corporation",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://us.idec.com/media/24-RD-0300-EN.pdf"
},
{
"category": "mitigation",
"details": "Johnson Controls",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.johnsoncontrols.com/cyber-solutions/security-advisories"
},
{
"category": "mitigation",
"details": "Miele",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2020-024"
},
{
"category": "mitigation",
"details": "Opto 22",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.opto22.com/support/resources-tools/knowledgebase/kb88981"
},
{
"category": "mitigation",
"details": "Pepperl+Fuchs",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en/advisories/VDE-2021-028/"
},
{
"category": "mitigation",
"details": "Rockwell",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1126896"
},
{
"category": "mitigation",
"details": "Schneider Electric",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.se.com/ww/en/download/document/SESB-2020-168-01"
},
{
"category": "mitigation",
"details": "Smiths Medical",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.smiths-medical.com/company-information/news-and-events/news/2020/july/02/smiths-medical-cybersecurity-bulletin"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
}
]
},
{
"cve": "CVE-2020-11904",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "Possible integer overflow or wraparound in memory allocation component when handling a packet sent by an unauthorized network attacker may result in out-of-bounds write.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11904"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Treck recommends users apply the latest version of the affected products:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Treck TCP/IP: Update to 6.0.1.67 or later versions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "To obtain patches, email Treck at security@treck.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "mailto:security@treck.com"
},
{
"category": "mitigation",
"details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Treck advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1508.html"
},
{
"category": "mitigation",
"details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "ABB",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=1MRS494936A\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
},
{
"category": "mitigation",
"details": "B.Braun",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bbraunusa.com/en/products-and-therapies/customer-communications.html"
},
{
"category": "mitigation",
"details": "Baxter",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.baxter.com/product-security#additionalresources"
},
{
"category": "mitigation",
"details": "BD",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bd.com/en-us/support/product-security-and-privacy/product-security-bulletins/third-party-product-security-bulletin-for-treck-tcp-ip-stack-vulnerabilities"
},
{
"category": "mitigation",
"details": "CareStream",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.carestream.com/en/us/services-and-support/cybersecurity-and-privacy"
},
{
"category": "mitigation",
"details": "Caterpillar",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.cat.com/en_US/support/technology/connected-solutions-principles/security/caterpillar-cybersecurity-advisory.html"
},
{
"category": "mitigation",
"details": "DIGI International",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.digi.com/support/knowledge-base/digi-international-security-notice-treck-tcp-ip-st"
},
{
"category": "mitigation",
"details": "Eaton",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/eaton-security-bulletin-treck-tcp-ip-stack-vulnerabilities-ripple20.pdf"
},
{
"category": "mitigation",
"details": "Green Hills Software",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://support.ghs.com/psirt/PSA-2020-05/"
},
{
"category": "mitigation",
"details": "IDEC Corporation",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://us.idec.com/media/24-RD-0300-EN.pdf"
},
{
"category": "mitigation",
"details": "Johnson Controls",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.johnsoncontrols.com/cyber-solutions/security-advisories"
},
{
"category": "mitigation",
"details": "Miele",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2020-024"
},
{
"category": "mitigation",
"details": "Opto 22",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.opto22.com/support/resources-tools/knowledgebase/kb88981"
},
{
"category": "mitigation",
"details": "Pepperl+Fuchs",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en/advisories/VDE-2021-028/"
},
{
"category": "mitigation",
"details": "Rockwell",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1126896"
},
{
"category": "mitigation",
"details": "Schneider Electric",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.se.com/ww/en/download/document/SESB-2020-168-01"
},
{
"category": "mitigation",
"details": "Smiths Medical",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.smiths-medical.com/company-information/news-and-events/news/2020/july/02/smiths-medical-cybersecurity-bulletin"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
}
]
},
{
"cve": "CVE-2020-11905",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "Possible out-of-bounds read in DHCPv6 component when handling a packet sent by an unauthorized network attacker. This vulnerability may allow exposure of sensitive information.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11905"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Treck recommends users apply the latest version of the affected products:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Treck TCP/IP: Update to 6.0.1.67 or later versions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "To obtain patches, email Treck at security@treck.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "mailto:security@treck.com"
},
{
"category": "mitigation",
"details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Treck advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1508.html"
},
{
"category": "mitigation",
"details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "ABB",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=1MRS494936A\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
},
{
"category": "mitigation",
"details": "B.Braun",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bbraunusa.com/en/products-and-therapies/customer-communications.html"
},
{
"category": "mitigation",
"details": "Baxter",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.baxter.com/product-security#additionalresources"
},
{
"category": "mitigation",
"details": "BD",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bd.com/en-us/support/product-security-and-privacy/product-security-bulletins/third-party-product-security-bulletin-for-treck-tcp-ip-stack-vulnerabilities"
},
{
"category": "mitigation",
"details": "CareStream",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.carestream.com/en/us/services-and-support/cybersecurity-and-privacy"
},
{
"category": "mitigation",
"details": "Caterpillar",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.cat.com/en_US/support/technology/connected-solutions-principles/security/caterpillar-cybersecurity-advisory.html"
},
{
"category": "mitigation",
"details": "DIGI International",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.digi.com/support/knowledge-base/digi-international-security-notice-treck-tcp-ip-st"
},
{
"category": "mitigation",
"details": "Eaton",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/eaton-security-bulletin-treck-tcp-ip-stack-vulnerabilities-ripple20.pdf"
},
{
"category": "mitigation",
"details": "Green Hills Software",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://support.ghs.com/psirt/PSA-2020-05/"
},
{
"category": "mitigation",
"details": "IDEC Corporation",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://us.idec.com/media/24-RD-0300-EN.pdf"
},
{
"category": "mitigation",
"details": "Johnson Controls",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.johnsoncontrols.com/cyber-solutions/security-advisories"
},
{
"category": "mitigation",
"details": "Miele",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2020-024"
},
{
"category": "mitigation",
"details": "Opto 22",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.opto22.com/support/resources-tools/knowledgebase/kb88981"
},
{
"category": "mitigation",
"details": "Pepperl+Fuchs",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en/advisories/VDE-2021-028/"
},
{
"category": "mitigation",
"details": "Rockwell",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1126896"
},
{
"category": "mitigation",
"details": "Schneider Electric",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.se.com/ww/en/download/document/SESB-2020-168-01"
},
{
"category": "mitigation",
"details": "Smiths Medical",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.smiths-medical.com/company-information/news-and-events/news/2020/july/02/smiths-medical-cybersecurity-bulletin"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
}
]
},
{
"cve": "CVE-2020-11906",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Improper input validation CWE-20 in ethernet link layer component from a packet sent by an unauthorized user. ",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11906"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Treck recommends users apply the latest version of the affected products:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Treck TCP/IP: Update to 6.0.1.67 or later versions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "To obtain patches, email Treck at security@treck.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "mailto:security@treck.com"
},
{
"category": "mitigation",
"details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Treck advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1508.html"
},
{
"category": "mitigation",
"details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "ABB",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=1MRS494936A\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
},
{
"category": "mitigation",
"details": "B.Braun",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bbraunusa.com/en/products-and-therapies/customer-communications.html"
},
{
"category": "mitigation",
"details": "Baxter",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.baxter.com/product-security#additionalresources"
},
{
"category": "mitigation",
"details": "BD",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bd.com/en-us/support/product-security-and-privacy/product-security-bulletins/third-party-product-security-bulletin-for-treck-tcp-ip-stack-vulnerabilities"
},
{
"category": "mitigation",
"details": "CareStream",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.carestream.com/en/us/services-and-support/cybersecurity-and-privacy"
},
{
"category": "mitigation",
"details": "Caterpillar",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.cat.com/en_US/support/technology/connected-solutions-principles/security/caterpillar-cybersecurity-advisory.html"
},
{
"category": "mitigation",
"details": "DIGI International",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.digi.com/support/knowledge-base/digi-international-security-notice-treck-tcp-ip-st"
},
{
"category": "mitigation",
"details": "Eaton",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/eaton-security-bulletin-treck-tcp-ip-stack-vulnerabilities-ripple20.pdf"
},
{
"category": "mitigation",
"details": "Green Hills Software",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://support.ghs.com/psirt/PSA-2020-05/"
},
{
"category": "mitigation",
"details": "IDEC Corporation",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://us.idec.com/media/24-RD-0300-EN.pdf"
},
{
"category": "mitigation",
"details": "Johnson Controls",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.johnsoncontrols.com/cyber-solutions/security-advisories"
},
{
"category": "mitigation",
"details": "Miele",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2020-024"
},
{
"category": "mitigation",
"details": "Opto 22",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.opto22.com/support/resources-tools/knowledgebase/kb88981"
},
{
"category": "mitigation",
"details": "Pepperl+Fuchs",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en/advisories/VDE-2021-028/"
},
{
"category": "mitigation",
"details": "Rockwell",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1126896"
},
{
"category": "mitigation",
"details": "Schneider Electric",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.se.com/ww/en/download/document/SESB-2020-168-01"
},
{
"category": "mitigation",
"details": "Smiths Medical",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.smiths-medical.com/company-information/news-and-events/news/2020/july/02/smiths-medical-cybersecurity-bulletin"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
}
]
},
{
"cve": "CVE-2020-11907",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "summary",
"text": "Improper handling of length parameter inconsistency in TCP component, from a packet sent by an unauthorized network attacker.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11907"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Treck recommends users apply the latest version of the affected products:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Treck TCP/IP: Update to 6.0.1.67 or later versions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "To obtain patches, email Treck at security@treck.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "mailto:security@treck.com"
},
{
"category": "mitigation",
"details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Treck advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1508.html"
},
{
"category": "mitigation",
"details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "ABB",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=1MRS494936A\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
},
{
"category": "mitigation",
"details": "B.Braun",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bbraunusa.com/en/products-and-therapies/customer-communications.html"
},
{
"category": "mitigation",
"details": "Baxter",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.baxter.com/product-security#additionalresources"
},
{
"category": "mitigation",
"details": "BD",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bd.com/en-us/support/product-security-and-privacy/product-security-bulletins/third-party-product-security-bulletin-for-treck-tcp-ip-stack-vulnerabilities"
},
{
"category": "mitigation",
"details": "CareStream",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.carestream.com/en/us/services-and-support/cybersecurity-and-privacy"
},
{
"category": "mitigation",
"details": "Caterpillar",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.cat.com/en_US/support/technology/connected-solutions-principles/security/caterpillar-cybersecurity-advisory.html"
},
{
"category": "mitigation",
"details": "DIGI International",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.digi.com/support/knowledge-base/digi-international-security-notice-treck-tcp-ip-st"
},
{
"category": "mitigation",
"details": "Eaton",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/eaton-security-bulletin-treck-tcp-ip-stack-vulnerabilities-ripple20.pdf"
},
{
"category": "mitigation",
"details": "Green Hills Software",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://support.ghs.com/psirt/PSA-2020-05/"
},
{
"category": "mitigation",
"details": "IDEC Corporation",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://us.idec.com/media/24-RD-0300-EN.pdf"
},
{
"category": "mitigation",
"details": "Johnson Controls",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.johnsoncontrols.com/cyber-solutions/security-advisories"
},
{
"category": "mitigation",
"details": "Miele",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2020-024"
},
{
"category": "mitigation",
"details": "Opto 22",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.opto22.com/support/resources-tools/knowledgebase/kb88981"
},
{
"category": "mitigation",
"details": "Pepperl+Fuchs",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en/advisories/VDE-2021-028/"
},
{
"category": "mitigation",
"details": "Rockwell",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1126896"
},
{
"category": "mitigation",
"details": "Schneider Electric",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.se.com/ww/en/download/document/SESB-2020-168-01"
},
{
"category": "mitigation",
"details": "Smiths Medical",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.smiths-medical.com/company-information/news-and-events/news/2020/july/02/smiths-medical-cybersecurity-bulletin"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
}
]
},
{
"cve": "CVE-2020-11908",
"cwe": {
"id": "CWE-170",
"name": "Improper Null Termination"
},
"notes": [
{
"category": "summary",
"text": "Improper null termination in DHCP component when handling a packet sent by an unauthorized network attacker. This vulnerability may allow exposure of sensitive information.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11908"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Treck recommends users apply the latest version of the affected products:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Treck TCP/IP: Update to 6.0.1.67 or later versions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "To obtain patches, email Treck at security@treck.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "mailto:security@treck.com"
},
{
"category": "mitigation",
"details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Treck advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1508.html"
},
{
"category": "mitigation",
"details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "ABB",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=1MRS494936A\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
},
{
"category": "mitigation",
"details": "B.Braun",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bbraunusa.com/en/products-and-therapies/customer-communications.html"
},
{
"category": "mitigation",
"details": "Baxter",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.baxter.com/product-security#additionalresources"
},
{
"category": "mitigation",
"details": "BD",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bd.com/en-us/support/product-security-and-privacy/product-security-bulletins/third-party-product-security-bulletin-for-treck-tcp-ip-stack-vulnerabilities"
},
{
"category": "mitigation",
"details": "CareStream",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.carestream.com/en/us/services-and-support/cybersecurity-and-privacy"
},
{
"category": "mitigation",
"details": "Caterpillar",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.cat.com/en_US/support/technology/connected-solutions-principles/security/caterpillar-cybersecurity-advisory.html"
},
{
"category": "mitigation",
"details": "DIGI International",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.digi.com/support/knowledge-base/digi-international-security-notice-treck-tcp-ip-st"
},
{
"category": "mitigation",
"details": "Eaton",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/eaton-security-bulletin-treck-tcp-ip-stack-vulnerabilities-ripple20.pdf"
},
{
"category": "mitigation",
"details": "Green Hills Software",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://support.ghs.com/psirt/PSA-2020-05/"
},
{
"category": "mitigation",
"details": "IDEC Corporation",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://us.idec.com/media/24-RD-0300-EN.pdf"
},
{
"category": "mitigation",
"details": "Johnson Controls",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.johnsoncontrols.com/cyber-solutions/security-advisories"
},
{
"category": "mitigation",
"details": "Miele",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2020-024"
},
{
"category": "mitigation",
"details": "Opto 22",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.opto22.com/support/resources-tools/knowledgebase/kb88981"
},
{
"category": "mitigation",
"details": "Pepperl+Fuchs",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en/advisories/VDE-2021-028/"
},
{
"category": "mitigation",
"details": "Rockwell",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1126896"
},
{
"category": "mitigation",
"details": "Schneider Electric",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.se.com/ww/en/download/document/SESB-2020-168-01"
},
{
"category": "mitigation",
"details": "Smiths Medical",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.smiths-medical.com/company-information/news-and-events/news/2020/july/02/smiths-medical-cybersecurity-bulletin"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
}
]
},
{
"cve": "CVE-2020-11909",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Improper input validation in IPv4 component when handling a packet sent by an unauthorized network attacker.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11909"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Treck recommends users apply the latest version of the affected products:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Treck TCP/IP: Update to 6.0.1.67 or later versions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "To obtain patches, email Treck at security@treck.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "mailto:security@treck.com"
},
{
"category": "mitigation",
"details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Treck advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1508.html"
},
{
"category": "mitigation",
"details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "ABB",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=1MRS494936A\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
},
{
"category": "mitigation",
"details": "B.Braun",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bbraunusa.com/en/products-and-therapies/customer-communications.html"
},
{
"category": "mitigation",
"details": "Baxter",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.baxter.com/product-security#additionalresources"
},
{
"category": "mitigation",
"details": "BD",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bd.com/en-us/support/product-security-and-privacy/product-security-bulletins/third-party-product-security-bulletin-for-treck-tcp-ip-stack-vulnerabilities"
},
{
"category": "mitigation",
"details": "CareStream",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.carestream.com/en/us/services-and-support/cybersecurity-and-privacy"
},
{
"category": "mitigation",
"details": "Caterpillar",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.cat.com/en_US/support/technology/connected-solutions-principles/security/caterpillar-cybersecurity-advisory.html"
},
{
"category": "mitigation",
"details": "DIGI International",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.digi.com/support/knowledge-base/digi-international-security-notice-treck-tcp-ip-st"
},
{
"category": "mitigation",
"details": "Eaton",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/eaton-security-bulletin-treck-tcp-ip-stack-vulnerabilities-ripple20.pdf"
},
{
"category": "mitigation",
"details": "Green Hills Software",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://support.ghs.com/psirt/PSA-2020-05/"
},
{
"category": "mitigation",
"details": "IDEC Corporation",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://us.idec.com/media/24-RD-0300-EN.pdf"
},
{
"category": "mitigation",
"details": "Johnson Controls",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.johnsoncontrols.com/cyber-solutions/security-advisories"
},
{
"category": "mitigation",
"details": "Miele",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2020-024"
},
{
"category": "mitigation",
"details": "Opto 22",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.opto22.com/support/resources-tools/knowledgebase/kb88981"
},
{
"category": "mitigation",
"details": "Pepperl+Fuchs",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en/advisories/VDE-2021-028/"
},
{
"category": "mitigation",
"details": "Rockwell",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1126896"
},
{
"category": "mitigation",
"details": "Schneider Electric",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.se.com/ww/en/download/document/SESB-2020-168-01"
},
{
"category": "mitigation",
"details": "Smiths Medical",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.smiths-medical.com/company-information/news-and-events/news/2020/july/02/smiths-medical-cybersecurity-bulletin"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
}
]
},
{
"cve": "CVE-2020-11910",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Improper input validation in ICMPv4 component when handling a packet sent by an unauthorized network attacker. This vulnerability may allow out-of-bounds read.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11910"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Treck recommends users apply the latest version of the affected products:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Treck TCP/IP: Update to 6.0.1.67 or later versions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "To obtain patches, email Treck at security@treck.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "mailto:security@treck.com"
},
{
"category": "mitigation",
"details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Treck advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1508.html"
},
{
"category": "mitigation",
"details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "ABB",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=1MRS494936A\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
},
{
"category": "mitigation",
"details": "B.Braun",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bbraunusa.com/en/products-and-therapies/customer-communications.html"
},
{
"category": "mitigation",
"details": "Baxter",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.baxter.com/product-security#additionalresources"
},
{
"category": "mitigation",
"details": "BD",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bd.com/en-us/support/product-security-and-privacy/product-security-bulletins/third-party-product-security-bulletin-for-treck-tcp-ip-stack-vulnerabilities"
},
{
"category": "mitigation",
"details": "CareStream",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.carestream.com/en/us/services-and-support/cybersecurity-and-privacy"
},
{
"category": "mitigation",
"details": "Caterpillar",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.cat.com/en_US/support/technology/connected-solutions-principles/security/caterpillar-cybersecurity-advisory.html"
},
{
"category": "mitigation",
"details": "DIGI International",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.digi.com/support/knowledge-base/digi-international-security-notice-treck-tcp-ip-st"
},
{
"category": "mitigation",
"details": "Eaton",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/eaton-security-bulletin-treck-tcp-ip-stack-vulnerabilities-ripple20.pdf"
},
{
"category": "mitigation",
"details": "Green Hills Software",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://support.ghs.com/psirt/PSA-2020-05/"
},
{
"category": "mitigation",
"details": "IDEC Corporation",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://us.idec.com/media/24-RD-0300-EN.pdf"
},
{
"category": "mitigation",
"details": "Johnson Controls",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.johnsoncontrols.com/cyber-solutions/security-advisories"
},
{
"category": "mitigation",
"details": "Miele",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2020-024"
},
{
"category": "mitigation",
"details": "Opto 22",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.opto22.com/support/resources-tools/knowledgebase/kb88981"
},
{
"category": "mitigation",
"details": "Pepperl+Fuchs",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en/advisories/VDE-2021-028/"
},
{
"category": "mitigation",
"details": "Rockwell",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1126896"
},
{
"category": "mitigation",
"details": "Schneider Electric",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.se.com/ww/en/download/document/SESB-2020-168-01"
},
{
"category": "mitigation",
"details": "Smiths Medical",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.smiths-medical.com/company-information/news-and-events/news/2020/july/02/smiths-medical-cybersecurity-bulletin"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
}
]
},
{
"cve": "CVE-2020-11911",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "summary",
"text": "The affected product is vulnerable to improper access control, which may allow an attacker to change one specific configuration value.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11911"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Treck recommends users apply the latest version of the affected products:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Treck TCP/IP: Update to 6.0.1.67 or later versions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "To obtain patches, email Treck at security@treck.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "mailto:security@treck.com"
},
{
"category": "mitigation",
"details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Treck advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1508.html"
},
{
"category": "mitigation",
"details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "ABB",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=1MRS494936A\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
},
{
"category": "mitigation",
"details": "B.Braun",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bbraunusa.com/en/products-and-therapies/customer-communications.html"
},
{
"category": "mitigation",
"details": "Baxter",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.baxter.com/product-security#additionalresources"
},
{
"category": "mitigation",
"details": "BD",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bd.com/en-us/support/product-security-and-privacy/product-security-bulletins/third-party-product-security-bulletin-for-treck-tcp-ip-stack-vulnerabilities"
},
{
"category": "mitigation",
"details": "CareStream",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.carestream.com/en/us/services-and-support/cybersecurity-and-privacy"
},
{
"category": "mitigation",
"details": "Caterpillar",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.cat.com/en_US/support/technology/connected-solutions-principles/security/caterpillar-cybersecurity-advisory.html"
},
{
"category": "mitigation",
"details": "DIGI International",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.digi.com/support/knowledge-base/digi-international-security-notice-treck-tcp-ip-st"
},
{
"category": "mitigation",
"details": "Eaton",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/eaton-security-bulletin-treck-tcp-ip-stack-vulnerabilities-ripple20.pdf"
},
{
"category": "mitigation",
"details": "Green Hills Software",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://support.ghs.com/psirt/PSA-2020-05/"
},
{
"category": "mitigation",
"details": "IDEC Corporation",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://us.idec.com/media/24-RD-0300-EN.pdf"
},
{
"category": "mitigation",
"details": "Johnson Controls",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.johnsoncontrols.com/cyber-solutions/security-advisories"
},
{
"category": "mitigation",
"details": "Miele",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2020-024"
},
{
"category": "mitigation",
"details": "Opto 22",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.opto22.com/support/resources-tools/knowledgebase/kb88981"
},
{
"category": "mitigation",
"details": "Pepperl+Fuchs",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en/advisories/VDE-2021-028/"
},
{
"category": "mitigation",
"details": "Rockwell",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1126896"
},
{
"category": "mitigation",
"details": "Schneider Electric",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.se.com/ww/en/download/document/SESB-2020-168-01"
},
{
"category": "mitigation",
"details": "Smiths Medical",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.smiths-medical.com/company-information/news-and-events/news/2020/july/02/smiths-medical-cybersecurity-bulletin"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
}
]
},
{
"cve": "CVE-2020-11912",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Improper input validation in TCP component when handling a packet sent by an unauthorized network attacker. This vulnerability may allow out-of-bounds read.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11912"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Treck recommends users apply the latest version of the affected products:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Treck TCP/IP: Update to 6.0.1.67 or later versions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "To obtain patches, email Treck at security@treck.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "mailto:security@treck.com"
},
{
"category": "mitigation",
"details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Treck advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1508.html"
},
{
"category": "mitigation",
"details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "ABB",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=1MRS494936A\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
},
{
"category": "mitigation",
"details": "B.Braun",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bbraunusa.com/en/products-and-therapies/customer-communications.html"
},
{
"category": "mitigation",
"details": "Baxter",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.baxter.com/product-security#additionalresources"
},
{
"category": "mitigation",
"details": "BD",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bd.com/en-us/support/product-security-and-privacy/product-security-bulletins/third-party-product-security-bulletin-for-treck-tcp-ip-stack-vulnerabilities"
},
{
"category": "mitigation",
"details": "CareStream",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.carestream.com/en/us/services-and-support/cybersecurity-and-privacy"
},
{
"category": "mitigation",
"details": "Caterpillar",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.cat.com/en_US/support/technology/connected-solutions-principles/security/caterpillar-cybersecurity-advisory.html"
},
{
"category": "mitigation",
"details": "DIGI International",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.digi.com/support/knowledge-base/digi-international-security-notice-treck-tcp-ip-st"
},
{
"category": "mitigation",
"details": "Eaton",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/eaton-security-bulletin-treck-tcp-ip-stack-vulnerabilities-ripple20.pdf"
},
{
"category": "mitigation",
"details": "Green Hills Software",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://support.ghs.com/psirt/PSA-2020-05/"
},
{
"category": "mitigation",
"details": "IDEC Corporation",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://us.idec.com/media/24-RD-0300-EN.pdf"
},
{
"category": "mitigation",
"details": "Johnson Controls",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.johnsoncontrols.com/cyber-solutions/security-advisories"
},
{
"category": "mitigation",
"details": "Miele",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2020-024"
},
{
"category": "mitigation",
"details": "Opto 22",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.opto22.com/support/resources-tools/knowledgebase/kb88981"
},
{
"category": "mitigation",
"details": "Pepperl+Fuchs",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en/advisories/VDE-2021-028/"
},
{
"category": "mitigation",
"details": "Rockwell",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1126896"
},
{
"category": "mitigation",
"details": "Schneider Electric",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.se.com/ww/en/download/document/SESB-2020-168-01"
},
{
"category": "mitigation",
"details": "Smiths Medical",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.smiths-medical.com/company-information/news-and-events/news/2020/july/02/smiths-medical-cybersecurity-bulletin"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
}
]
},
{
"cve": "CVE-2020-11913",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Improper input validation in IPv6 component when handling a packet sent by an unauthorized network attacker. This vulnerability may allow out-of-bounds read.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11913"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Treck recommends users apply the latest version of the affected products:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Treck TCP/IP: Update to 6.0.1.67 or later versions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "To obtain patches, email Treck at security@treck.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "mailto:security@treck.com"
},
{
"category": "mitigation",
"details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Treck advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1508.html"
},
{
"category": "mitigation",
"details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "ABB",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=1MRS494936A\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
},
{
"category": "mitigation",
"details": "B.Braun",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bbraunusa.com/en/products-and-therapies/customer-communications.html"
},
{
"category": "mitigation",
"details": "Baxter",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.baxter.com/product-security#additionalresources"
},
{
"category": "mitigation",
"details": "BD",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bd.com/en-us/support/product-security-and-privacy/product-security-bulletins/third-party-product-security-bulletin-for-treck-tcp-ip-stack-vulnerabilities"
},
{
"category": "mitigation",
"details": "CareStream",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.carestream.com/en/us/services-and-support/cybersecurity-and-privacy"
},
{
"category": "mitigation",
"details": "Caterpillar",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.cat.com/en_US/support/technology/connected-solutions-principles/security/caterpillar-cybersecurity-advisory.html"
},
{
"category": "mitigation",
"details": "DIGI International",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.digi.com/support/knowledge-base/digi-international-security-notice-treck-tcp-ip-st"
},
{
"category": "mitigation",
"details": "Eaton",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/eaton-security-bulletin-treck-tcp-ip-stack-vulnerabilities-ripple20.pdf"
},
{
"category": "mitigation",
"details": "Green Hills Software",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://support.ghs.com/psirt/PSA-2020-05/"
},
{
"category": "mitigation",
"details": "IDEC Corporation",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://us.idec.com/media/24-RD-0300-EN.pdf"
},
{
"category": "mitigation",
"details": "Johnson Controls",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.johnsoncontrols.com/cyber-solutions/security-advisories"
},
{
"category": "mitigation",
"details": "Miele",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2020-024"
},
{
"category": "mitigation",
"details": "Opto 22",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.opto22.com/support/resources-tools/knowledgebase/kb88981"
},
{
"category": "mitigation",
"details": "Pepperl+Fuchs",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en/advisories/VDE-2021-028/"
},
{
"category": "mitigation",
"details": "Rockwell",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1126896"
},
{
"category": "mitigation",
"details": "Schneider Electric",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.se.com/ww/en/download/document/SESB-2020-168-01"
},
{
"category": "mitigation",
"details": "Smiths Medical",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.smiths-medical.com/company-information/news-and-events/news/2020/july/02/smiths-medical-cybersecurity-bulletin"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
}
]
},
{
"cve": "CVE-2020-11914",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Improper input validation in ARP component when handling a packet sent by an unauthorized network attacker. This vulnerability may allow out-of-bounds read.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11914"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Treck recommends users apply the latest version of the affected products:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Treck TCP/IP: Update to 6.0.1.67 or later versions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "To obtain patches, email Treck at security@treck.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "mailto:security@treck.com"
},
{
"category": "mitigation",
"details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Treck advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1508.html"
},
{
"category": "mitigation",
"details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "ABB",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=1MRS494936A\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
},
{
"category": "mitigation",
"details": "B.Braun",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bbraunusa.com/en/products-and-therapies/customer-communications.html"
},
{
"category": "mitigation",
"details": "Baxter",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.baxter.com/product-security#additionalresources"
},
{
"category": "mitigation",
"details": "BD",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bd.com/en-us/support/product-security-and-privacy/product-security-bulletins/third-party-product-security-bulletin-for-treck-tcp-ip-stack-vulnerabilities"
},
{
"category": "mitigation",
"details": "CareStream",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.carestream.com/en/us/services-and-support/cybersecurity-and-privacy"
},
{
"category": "mitigation",
"details": "Caterpillar",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.cat.com/en_US/support/technology/connected-solutions-principles/security/caterpillar-cybersecurity-advisory.html"
},
{
"category": "mitigation",
"details": "DIGI International",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.digi.com/support/knowledge-base/digi-international-security-notice-treck-tcp-ip-st"
},
{
"category": "mitigation",
"details": "Eaton",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/eaton-security-bulletin-treck-tcp-ip-stack-vulnerabilities-ripple20.pdf"
},
{
"category": "mitigation",
"details": "Green Hills Software",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://support.ghs.com/psirt/PSA-2020-05/"
},
{
"category": "mitigation",
"details": "IDEC Corporation",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://us.idec.com/media/24-RD-0300-EN.pdf"
},
{
"category": "mitigation",
"details": "Johnson Controls",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.johnsoncontrols.com/cyber-solutions/security-advisories"
},
{
"category": "mitigation",
"details": "Miele",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2020-024"
},
{
"category": "mitigation",
"details": "Opto 22",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.opto22.com/support/resources-tools/knowledgebase/kb88981"
},
{
"category": "mitigation",
"details": "Pepperl+Fuchs",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en/advisories/VDE-2021-028/"
},
{
"category": "mitigation",
"details": "Rockwell",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1126896"
},
{
"category": "mitigation",
"details": "Schneider Electric",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.se.com/ww/en/download/document/SESB-2020-168-01"
},
{
"category": "mitigation",
"details": "Smiths Medical",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.smiths-medical.com/company-information/news-and-events/news/2020/july/02/smiths-medical-cybersecurity-bulletin"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
}
]
}
]
}
SEVD-2020-174-01
Vulnerability from csaf_se - Published: 2020-06-22 00:00 - Updated: 2021-06-30 00:00Network Management Card Family - Network Management Card 1 (NMC1), Network Management Card 2 (NMC2), Network Management Card 3 (NMC3)
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9630/AP9630CH/AP9630J NMC2 AOS V6.9.4 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9630/AP9630CH/AP9630J
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9631/AP9631CH/AP9631J NMC2 AOS V6.9.4 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9631/AP9631CH/AP9631J
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9635/AP9635CH NMC2 AOS V6.9.4 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9635/AP9635CH
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9617 (discontinued in Nov 2011) Smart-UPS NMC1 v3.9.2 and earlier
Schneider Electric / Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9617 (discontinued in Nov 2011)
|
<=Smart-UPS NMC1 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9619 (discontinued in Sep 2012) Smart-UPS NMC1 v3.9.2 and earlier
Schneider Electric / Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9619 (discontinued in Sep 2012)
|
<=Smart-UPS NMC1 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9618 (discontinued in Jan 2017) Smart-UPS NMC1 v3.9.2 and earlier
Schneider Electric / Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9618 (discontinued in Jan 2017)
|
<=Smart-UPS NMC1 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptable Power Supply (UPS) using NMC1 - SUMX Smart-UPS models embedded with NMC1 Smart-UPS NMC1 v3.9.2 and earlier
Schneider Electric / Uninterruptable Power Supply (UPS) using NMC1 - SUMX Smart-UPS models embedded with NMC1
|
<=Smart-UPS NMC1 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9640/AP9640J NMC3 AOS V1.3.0.6 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9640/AP9640J
|
<=NMC3 AOS 1.3.0.6 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9641/AP9641J NMC3 AOS V1.3.0.6 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9641/AP9641J
|
<=NMC3 AOS 1.3.0.6 |
Vendor Fix
fix
|
|
|
Schneider Electric Battery Management Embedded NMC2 - Battery Manager - AP9922 NMC2 AOS V6.9.4 and earlier
Schneider Electric / Battery Management Embedded NMC2 - Battery Manager - AP9922
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: InfraStruXure 150kVA PDU with 84 poles (X84P) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: InfraStruXure 150kVA PDU with 84 poles (X84P)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: InfraStruXure 40 and 60 kVA PDU (XPDU) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: InfraStruXure 40 and 60 kVA PDU (XPDU)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: Modular 150 and 175 kVA PDU NAM (XRDP) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: Modular 150 and 175 kVA PDU NAM (XRDP)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: 400 and 500 kVA PMM (PMM) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: 400 and 500 kVA PMM (PMM)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: Modular PDU/RPP (XRDP2G) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: Modular PDU/RPP (XRDP2G)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC Rack Power Distribution Units (rPDU) Embedded NMC2: 2G Metered/Switched Rack PDUs with embedded NMC2 NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC Rack Power Distribution Units (rPDU) Embedded NMC2: 2G Metered/Switched Rack PDUs with embedded NMC2
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC Rack Power Distribution Units (rPDU) Embedded NMC2: AP84XX, AP86XX, AP88XX, AP89XX NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC Rack Power Distribution Units (rPDU) Embedded NMC2: AP84XX, AP86XX, AP88XX, AP89XX
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC Rack Power Distribution Units (rPDU) Embedded NMC1: Metered/Switched Rack PDUs with embedded NMC1 - AP78XX, AP79XX NMC1 AOS V3.9.2 and earlier
Schneider Electric / APC Rack Power Distribution Units (rPDU) Embedded NMC1: Metered/Switched Rack PDUs with embedded NMC1 - AP78XX, AP79XX
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric Rack Automatic Transfer Switches (ATS) Embedded NMC2: - Rack Automatic Transfer Switches - AP44XX NMC2 AOS V6.8.8 and earlier
Schneider Electric / Rack Automatic Transfer Switches (ATS) Embedded NMC2: - Rack Automatic Transfer Switches - AP44XX
|
<=NMC2 AOS 6.8.8 |
Vendor Fix
fix
|
|
|
Schneider Electric Rack Automatic Transfer Switches (ATS) Embedded NMC1: - Rack Automatic Transfer Switches - AP77XX NMC1 AOS v3.9.2 and earlier
Schneider Electric / Rack Automatic Transfer Switches (ATS) Embedded NMC1: - Rack Automatic Transfer Switches - AP77XX
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric Environmental Monitoring Environmental Monitoring Unit with embedded NMC2 - NetBotz NBRK0250 NMC2 AOS V6.8.8 and earlier
Schneider Electric / Environmental Monitoring Environmental Monitoring Unit with embedded NMC2 - NetBotz NBRK0250
|
<=NMC2 AOS 6.8.8 |
Vendor Fix
fix
|
|
|
Schneider Electric Cooling Products Embedded NMC2 & Touchscreen Displays: InRow NMC2 AOS V6.9.4 and earlier
Schneider Electric / Cooling Products Embedded NMC2 & Touchscreen Displays: InRow
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Cooling Products Embedded NMC2 & Touchscreen Displays: Uniflair Cooling Devices NMC2 AOS V6.9.4 and earlier
Schneider Electric / Cooling Products Embedded NMC2 & Touchscreen Displays: Uniflair Cooling Devices
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Cooling Products Embedded NMC1 - Rack Air Removal Unit SX (RARU) NMC1 AOS V3.9.2 and earlier
Schneider Electric / Cooling Products Embedded NMC1 - Rack Air Removal Unit SX (RARU)
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9617 (discontinued in Nov 2011) NMC1 AOS V3.9.2 and earlier
Schneider Electric / NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9617 (discontinued in Nov 2011)
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9619 (discontinued in Sep 2012) NMC1 AOS V3.9.2 and earlier
Schneider Electric / NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9619 (discontinued in Sep 2012)
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9618 (discontinued in Jan 2017) NMC1 AOS V3.9.2 and earlier
Schneider Electric / NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9618 (discontinued in Jan 2017)
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - Audio/Video Network Management Enabled products S20BLK, G50NETB2, G50NETB-20A2 NMC1 AOS V3.9.2 and earlier
Schneider Electric / NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - Audio/Video Network Management Enabled products S20BLK, G50NETB2, G50NETB-20A2
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric Battery Management - Battery Management System - AP9920B1 NMC1 AOS V3.9.2 and earlier
Schneider Electric / Battery Management - Battery Management System - AP9920B1
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric Battery Management - Battery Management System - AP9921X NMC1 AOS V3.9.2 and earlier
Schneider Electric / Battery Management - Battery Management System - AP9921X
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric Environmental Monitoring AP9319 AP9320 AP9340 AP9360 AP9361 NetBotz NBRK0200 NMC1 AOS V3.9.2 and earlier
Schneider Electric / Environmental Monitoring AP9319 AP9320 AP9340 AP9360 AP9361 NetBotz NBRK0200
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric Cooling Products - NetworkAir NMC1 AOS V3.9.2 and earlier
Schneider Electric / Cooling Products - NetworkAir
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric Cooling Products - InRow NMC1 AOS V3.9.2 and earlier
Schneider Electric / Cooling Products - InRow
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Schneider Electric NMC2 AOS V6.9.6 or later
Schneider Electric / NMC2 AOS
|
>=6.9.6 | ||
|
Schneider Electric NMC2 AOS V3.9.4 or later
Schneider Electric / NMC2 AOS
|
>=3.9.4 | ||
|
Schneider Electric NMC3 AOS V1.4 or later
Schneider Electric / NMC3 AOS
|
>=1.4 | ||
|
Schneider Electric NMC1 AOS V3.9.4 or later
Schneider Electric / NMC1 AOS
|
>=3.9.4 |
Network Management Card Family - Network Management Card 2 (NMC2), Network Management Card 3 (NMC3)
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9630/AP9630CH/AP9630J NMC2 AOS V6.9.4 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9630/AP9630CH/AP9630J
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9631/AP9631CH/AP9631J NMC2 AOS V6.9.4 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9631/AP9631CH/AP9631J
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9635/AP9635CH NMC2 AOS V6.9.4 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9635/AP9635CH
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9640/AP9640J NMC3 AOS V1.3.0.6 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9640/AP9640J
|
<=NMC3 AOS 1.3.0.6 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9641/AP9641J NMC3 AOS V1.3.0.6 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9641/AP9641J
|
<=NMC3 AOS 1.3.0.6 |
Vendor Fix
fix
|
|
|
Schneider Electric Battery Management Embedded NMC2 - Battery Manager - AP9922 NMC2 AOS V6.9.4 and earlier
Schneider Electric / Battery Management Embedded NMC2 - Battery Manager - AP9922
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: InfraStruXure 150kVA PDU with 84 poles (X84P) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: InfraStruXure 150kVA PDU with 84 poles (X84P)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: InfraStruXure 40 and 60 kVA PDU (XPDU) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: InfraStruXure 40 and 60 kVA PDU (XPDU)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: Modular 150 and 175 kVA PDU NAM (XRDP) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: Modular 150 and 175 kVA PDU NAM (XRDP)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: 400 and 500 kVA PMM (PMM) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: 400 and 500 kVA PMM (PMM)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: Modular PDU/RPP (XRDP2G) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: Modular PDU/RPP (XRDP2G)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC Rack Power Distribution Units (rPDU) Embedded NMC2: 2G Metered/Switched Rack PDUs with embedded NMC2 NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC Rack Power Distribution Units (rPDU) Embedded NMC2: 2G Metered/Switched Rack PDUs with embedded NMC2
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC Rack Power Distribution Units (rPDU) Embedded NMC2: AP84XX, AP86XX, AP88XX, AP89XX NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC Rack Power Distribution Units (rPDU) Embedded NMC2: AP84XX, AP86XX, AP88XX, AP89XX
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Rack Automatic Transfer Switches (ATS) Embedded NMC2: - Rack Automatic Transfer Switches - AP44XX NMC2 AOS V6.8.8 and earlier
Schneider Electric / Rack Automatic Transfer Switches (ATS) Embedded NMC2: - Rack Automatic Transfer Switches - AP44XX
|
<=NMC2 AOS 6.8.8 |
Vendor Fix
fix
|
|
|
Schneider Electric Environmental Monitoring Environmental Monitoring Unit with embedded NMC2 - NetBotz NBRK0250 NMC2 AOS V6.8.8 and earlier
Schneider Electric / Environmental Monitoring Environmental Monitoring Unit with embedded NMC2 - NetBotz NBRK0250
|
<=NMC2 AOS 6.8.8 |
Vendor Fix
fix
|
|
|
Schneider Electric Cooling Products Embedded NMC2 & Touchscreen Displays: InRow NMC2 AOS V6.9.4 and earlier
Schneider Electric / Cooling Products Embedded NMC2 & Touchscreen Displays: InRow
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Cooling Products Embedded NMC2 & Touchscreen Displays: Uniflair Cooling Devices NMC2 AOS V6.9.4 and earlier
Schneider Electric / Cooling Products Embedded NMC2 & Touchscreen Displays: Uniflair Cooling Devices
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Schneider Electric NMC2 AOS V6.9.2/6.9.4
Schneider Electric / NMC2 AOS
|
6.9.2|6.9.4 | ||
|
Schneider Electric NMC2 AOS V6.9.6 or later
Schneider Electric / NMC2 AOS
|
>=6.9.6 | ||
|
Schneider Electric NMC2 AOS V3.9.4 or later
Schneider Electric / NMC2 AOS
|
>=3.9.4 | ||
|
Schneider Electric NMC3 AOS V1.3.3.1
Schneider Electric / NMC3 AOS
|
1.3.3.1 | ||
|
Schneider Electric NMC3 AOS V1.4 or later
Schneider Electric / NMC3 AOS
|
>=1.4 |
Network Management Card Family - Network Management Card 1 (NMC1)
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Schneider Electric Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9617 (discontinued in Nov 2011) Smart-UPS NMC1 v3.9.2 and earlier
Schneider Electric / Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9617 (discontinued in Nov 2011)
|
<=Smart-UPS NMC1 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9619 (discontinued in Sep 2012) Smart-UPS NMC1 v3.9.2 and earlier
Schneider Electric / Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9619 (discontinued in Sep 2012)
|
<=Smart-UPS NMC1 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9618 (discontinued in Jan 2017) Smart-UPS NMC1 v3.9.2 and earlier
Schneider Electric / Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9618 (discontinued in Jan 2017)
|
<=Smart-UPS NMC1 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptable Power Supply (UPS) using NMC1 - SUMX Smart-UPS models embedded with NMC1 Smart-UPS NMC1 v3.9.2 and earlier
Schneider Electric / Uninterruptable Power Supply (UPS) using NMC1 - SUMX Smart-UPS models embedded with NMC1
|
<=Smart-UPS NMC1 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric APC Rack Power Distribution Units (rPDU) Embedded NMC1: Metered/Switched Rack PDUs with embedded NMC1 - AP78XX, AP79XX NMC1 AOS V3.9.2 and earlier
Schneider Electric / APC Rack Power Distribution Units (rPDU) Embedded NMC1: Metered/Switched Rack PDUs with embedded NMC1 - AP78XX, AP79XX
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric Rack Automatic Transfer Switches (ATS) Embedded NMC1: - Rack Automatic Transfer Switches - AP77XX NMC1 AOS v3.9.2 and earlier
Schneider Electric / Rack Automatic Transfer Switches (ATS) Embedded NMC1: - Rack Automatic Transfer Switches - AP77XX
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric Cooling Products Embedded NMC1 - Rack Air Removal Unit SX (RARU) NMC1 AOS V3.9.2 and earlier
Schneider Electric / Cooling Products Embedded NMC1 - Rack Air Removal Unit SX (RARU)
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9617 (discontinued in Nov 2011) NMC1 AOS V3.9.2 and earlier
Schneider Electric / NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9617 (discontinued in Nov 2011)
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9619 (discontinued in Sep 2012) NMC1 AOS V3.9.2 and earlier
Schneider Electric / NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9619 (discontinued in Sep 2012)
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9618 (discontinued in Jan 2017) NMC1 AOS V3.9.2 and earlier
Schneider Electric / NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9618 (discontinued in Jan 2017)
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - Audio/Video Network Management Enabled products S20BLK, G50NETB2, G50NETB-20A2 NMC1 AOS V3.9.2 and earlier
Schneider Electric / NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - Audio/Video Network Management Enabled products S20BLK, G50NETB2, G50NETB-20A2
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric Battery Management - Battery Management System - AP9920B1 NMC1 AOS V3.9.2 and earlier
Schneider Electric / Battery Management - Battery Management System - AP9920B1
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric Battery Management - Battery Management System - AP9921X NMC1 AOS V3.9.2 and earlier
Schneider Electric / Battery Management - Battery Management System - AP9921X
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric Environmental Monitoring AP9319 AP9320 AP9340 AP9360 AP9361 NetBotz NBRK0200 NMC1 AOS V3.9.2 and earlier
Schneider Electric / Environmental Monitoring AP9319 AP9320 AP9340 AP9360 AP9361 NetBotz NBRK0200
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric Cooling Products - NetworkAir NMC1 AOS V3.9.2 and earlier
Schneider Electric / Cooling Products - NetworkAir
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric Cooling Products - InRow NMC1 AOS V3.9.2 and earlier
Schneider Electric / Cooling Products - InRow
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Schneider Electric NMC1 AOS V3.9.4 or later
Schneider Electric / NMC1 AOS
|
>=3.9.4 |
Network Management Card Family - Network Management Card 1 (NMC1), Network Management Card 2 (NMC2), Network Management Card 3 (NMC3)
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9630/AP9630CH/AP9630J NMC2 AOS V6.9.4 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9630/AP9630CH/AP9630J
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9631/AP9631CH/AP9631J NMC2 AOS V6.9.4 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9631/AP9631CH/AP9631J
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9635/AP9635CH NMC2 AOS V6.9.4 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9635/AP9635CH
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9617 (discontinued in Nov 2011) Smart-UPS NMC1 v3.9.2 and earlier
Schneider Electric / Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9617 (discontinued in Nov 2011)
|
<=Smart-UPS NMC1 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9619 (discontinued in Sep 2012) Smart-UPS NMC1 v3.9.2 and earlier
Schneider Electric / Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9619 (discontinued in Sep 2012)
|
<=Smart-UPS NMC1 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9618 (discontinued in Jan 2017) Smart-UPS NMC1 v3.9.2 and earlier
Schneider Electric / Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9618 (discontinued in Jan 2017)
|
<=Smart-UPS NMC1 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptable Power Supply (UPS) using NMC1 - SUMX Smart-UPS models embedded with NMC1 Smart-UPS NMC1 v3.9.2 and earlier
Schneider Electric / Uninterruptable Power Supply (UPS) using NMC1 - SUMX Smart-UPS models embedded with NMC1
|
<=Smart-UPS NMC1 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9640/AP9640J NMC3 AOS V1.3.0.6 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9640/AP9640J
|
<=NMC3 AOS 1.3.0.6 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9641/AP9641J NMC3 AOS V1.3.0.6 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9641/AP9641J
|
<=NMC3 AOS 1.3.0.6 |
Vendor Fix
fix
|
|
|
Schneider Electric Battery Management Embedded NMC2 - Battery Manager - AP9922 NMC2 AOS V6.9.4 and earlier
Schneider Electric / Battery Management Embedded NMC2 - Battery Manager - AP9922
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: InfraStruXure 150kVA PDU with 84 poles (X84P) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: InfraStruXure 150kVA PDU with 84 poles (X84P)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: InfraStruXure 40 and 60 kVA PDU (XPDU) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: InfraStruXure 40 and 60 kVA PDU (XPDU)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: Modular 150 and 175 kVA PDU NAM (XRDP) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: Modular 150 and 175 kVA PDU NAM (XRDP)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: 400 and 500 kVA PMM (PMM) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: 400 and 500 kVA PMM (PMM)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: Modular PDU/RPP (XRDP2G) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: Modular PDU/RPP (XRDP2G)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC Rack Power Distribution Units (rPDU) Embedded NMC2: 2G Metered/Switched Rack PDUs with embedded NMC2 NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC Rack Power Distribution Units (rPDU) Embedded NMC2: 2G Metered/Switched Rack PDUs with embedded NMC2
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC Rack Power Distribution Units (rPDU) Embedded NMC2: AP84XX, AP86XX, AP88XX, AP89XX NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC Rack Power Distribution Units (rPDU) Embedded NMC2: AP84XX, AP86XX, AP88XX, AP89XX
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC Rack Power Distribution Units (rPDU) Embedded NMC1: Metered/Switched Rack PDUs with embedded NMC1 - AP78XX, AP79XX NMC1 AOS V3.9.2 and earlier
Schneider Electric / APC Rack Power Distribution Units (rPDU) Embedded NMC1: Metered/Switched Rack PDUs with embedded NMC1 - AP78XX, AP79XX
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric Rack Automatic Transfer Switches (ATS) Embedded NMC2: - Rack Automatic Transfer Switches - AP44XX NMC2 AOS V6.8.8 and earlier
Schneider Electric / Rack Automatic Transfer Switches (ATS) Embedded NMC2: - Rack Automatic Transfer Switches - AP44XX
|
<=NMC2 AOS 6.8.8 |
Vendor Fix
fix
|
|
|
Schneider Electric Rack Automatic Transfer Switches (ATS) Embedded NMC1: - Rack Automatic Transfer Switches - AP77XX NMC1 AOS v3.9.2 and earlier
Schneider Electric / Rack Automatic Transfer Switches (ATS) Embedded NMC1: - Rack Automatic Transfer Switches - AP77XX
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric Environmental Monitoring Environmental Monitoring Unit with embedded NMC2 - NetBotz NBRK0250 NMC2 AOS V6.8.8 and earlier
Schneider Electric / Environmental Monitoring Environmental Monitoring Unit with embedded NMC2 - NetBotz NBRK0250
|
<=NMC2 AOS 6.8.8 |
Vendor Fix
fix
|
|
|
Schneider Electric Cooling Products Embedded NMC2 & Touchscreen Displays: InRow NMC2 AOS V6.9.4 and earlier
Schneider Electric / Cooling Products Embedded NMC2 & Touchscreen Displays: InRow
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Cooling Products Embedded NMC2 & Touchscreen Displays: Uniflair Cooling Devices NMC2 AOS V6.9.4 and earlier
Schneider Electric / Cooling Products Embedded NMC2 & Touchscreen Displays: Uniflair Cooling Devices
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Cooling Products Embedded NMC1 - Rack Air Removal Unit SX (RARU) NMC1 AOS V3.9.2 and earlier
Schneider Electric / Cooling Products Embedded NMC1 - Rack Air Removal Unit SX (RARU)
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9617 (discontinued in Nov 2011) NMC1 AOS V3.9.2 and earlier
Schneider Electric / NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9617 (discontinued in Nov 2011)
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9619 (discontinued in Sep 2012) NMC1 AOS V3.9.2 and earlier
Schneider Electric / NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9619 (discontinued in Sep 2012)
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9618 (discontinued in Jan 2017) NMC1 AOS V3.9.2 and earlier
Schneider Electric / NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9618 (discontinued in Jan 2017)
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - Audio/Video Network Management Enabled products S20BLK, G50NETB2, G50NETB-20A2 NMC1 AOS V3.9.2 and earlier
Schneider Electric / NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - Audio/Video Network Management Enabled products S20BLK, G50NETB2, G50NETB-20A2
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric Battery Management - Battery Management System - AP9920B1 NMC1 AOS V3.9.2 and earlier
Schneider Electric / Battery Management - Battery Management System - AP9920B1
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric Battery Management - Battery Management System - AP9921X NMC1 AOS V3.9.2 and earlier
Schneider Electric / Battery Management - Battery Management System - AP9921X
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric Environmental Monitoring AP9319 AP9320 AP9340 AP9360 AP9361 NetBotz NBRK0200 NMC1 AOS V3.9.2 and earlier
Schneider Electric / Environmental Monitoring AP9319 AP9320 AP9340 AP9360 AP9361 NetBotz NBRK0200
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric Cooling Products - NetworkAir NMC1 AOS V3.9.2 and earlier
Schneider Electric / Cooling Products - NetworkAir
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric Cooling Products - InRow NMC1 AOS V3.9.2 and earlier
Schneider Electric / Cooling Products - InRow
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Schneider Electric NMC2 AOS V6.9.2/6.9.4
Schneider Electric / NMC2 AOS
|
6.9.2|6.9.4 | ||
|
Schneider Electric NMC2 AOS V6.9.6 or later
Schneider Electric / NMC2 AOS
|
>=6.9.6 | ||
|
Schneider Electric NMC2 AOS V3.9.4 or later
Schneider Electric / NMC2 AOS
|
>=3.9.4 | ||
|
Schneider Electric NMC3 AOS V1.4 or later
Schneider Electric / NMC3 AOS
|
>=1.4 | ||
|
Schneider Electric NMC1 AOS V3.9.4 or later
Schneider Electric / NMC1 AOS
|
>=3.9.4 |
Network Management Card Family - Network Management Card 1 (NMC1), Network Management Card 2 (NMC2), Network Management Card 3 (NMC3)
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9630/AP9630CH/AP9630J NMC2 AOS V6.9.4 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9630/AP9630CH/AP9630J
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9631/AP9631CH/AP9631J NMC2 AOS V6.9.4 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9631/AP9631CH/AP9631J
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9635/AP9635CH NMC2 AOS V6.9.4 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9635/AP9635CH
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9617 (discontinued in Nov 2011) Smart-UPS NMC1 v3.9.2 and earlier
Schneider Electric / Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9617 (discontinued in Nov 2011)
|
<=Smart-UPS NMC1 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9619 (discontinued in Sep 2012) Smart-UPS NMC1 v3.9.2 and earlier
Schneider Electric / Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9619 (discontinued in Sep 2012)
|
<=Smart-UPS NMC1 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9618 (discontinued in Jan 2017) Smart-UPS NMC1 v3.9.2 and earlier
Schneider Electric / Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9618 (discontinued in Jan 2017)
|
<=Smart-UPS NMC1 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptable Power Supply (UPS) using NMC1 - SUMX Smart-UPS models embedded with NMC1 Smart-UPS NMC1 v3.9.2 and earlier
Schneider Electric / Uninterruptable Power Supply (UPS) using NMC1 - SUMX Smart-UPS models embedded with NMC1
|
<=Smart-UPS NMC1 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9640/AP9640J NMC3 AOS V1.3.0.6 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9640/AP9640J
|
<=NMC3 AOS 1.3.0.6 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9641/AP9641J NMC3 AOS V1.3.0.6 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9641/AP9641J
|
<=NMC3 AOS 1.3.0.6 |
Vendor Fix
fix
|
|
|
Schneider Electric Battery Management Embedded NMC2 - Battery Manager - AP9922 NMC2 AOS V6.9.4 and earlier
Schneider Electric / Battery Management Embedded NMC2 - Battery Manager - AP9922
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: InfraStruXure 150kVA PDU with 84 poles (X84P) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: InfraStruXure 150kVA PDU with 84 poles (X84P)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: InfraStruXure 40 and 60 kVA PDU (XPDU) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: InfraStruXure 40 and 60 kVA PDU (XPDU)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: Modular 150 and 175 kVA PDU NAM (XRDP) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: Modular 150 and 175 kVA PDU NAM (XRDP)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: 400 and 500 kVA PMM (PMM) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: 400 and 500 kVA PMM (PMM)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: Modular PDU/RPP (XRDP2G) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: Modular PDU/RPP (XRDP2G)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC Rack Power Distribution Units (rPDU) Embedded NMC2: 2G Metered/Switched Rack PDUs with embedded NMC2 NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC Rack Power Distribution Units (rPDU) Embedded NMC2: 2G Metered/Switched Rack PDUs with embedded NMC2
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC Rack Power Distribution Units (rPDU) Embedded NMC2: AP84XX, AP86XX, AP88XX, AP89XX NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC Rack Power Distribution Units (rPDU) Embedded NMC2: AP84XX, AP86XX, AP88XX, AP89XX
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC Rack Power Distribution Units (rPDU) Embedded NMC1: Metered/Switched Rack PDUs with embedded NMC1 - AP78XX, AP79XX NMC1 AOS V3.9.2 and earlier
Schneider Electric / APC Rack Power Distribution Units (rPDU) Embedded NMC1: Metered/Switched Rack PDUs with embedded NMC1 - AP78XX, AP79XX
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric Rack Automatic Transfer Switches (ATS) Embedded NMC2: - Rack Automatic Transfer Switches - AP44XX NMC2 AOS V6.8.8 and earlier
Schneider Electric / Rack Automatic Transfer Switches (ATS) Embedded NMC2: - Rack Automatic Transfer Switches - AP44XX
|
<=NMC2 AOS 6.8.8 |
Vendor Fix
fix
|
|
|
Schneider Electric Rack Automatic Transfer Switches (ATS) Embedded NMC1: - Rack Automatic Transfer Switches - AP77XX NMC1 AOS v3.9.2 and earlier
Schneider Electric / Rack Automatic Transfer Switches (ATS) Embedded NMC1: - Rack Automatic Transfer Switches - AP77XX
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric Environmental Monitoring Environmental Monitoring Unit with embedded NMC2 - NetBotz NBRK0250 NMC2 AOS V6.8.8 and earlier
Schneider Electric / Environmental Monitoring Environmental Monitoring Unit with embedded NMC2 - NetBotz NBRK0250
|
<=NMC2 AOS 6.8.8 |
Vendor Fix
fix
|
|
|
Schneider Electric Cooling Products Embedded NMC2 & Touchscreen Displays: InRow NMC2 AOS V6.9.4 and earlier
Schneider Electric / Cooling Products Embedded NMC2 & Touchscreen Displays: InRow
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Cooling Products Embedded NMC2 & Touchscreen Displays: Uniflair Cooling Devices NMC2 AOS V6.9.4 and earlier
Schneider Electric / Cooling Products Embedded NMC2 & Touchscreen Displays: Uniflair Cooling Devices
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Cooling Products Embedded NMC1 - Rack Air Removal Unit SX (RARU) NMC1 AOS V3.9.2 and earlier
Schneider Electric / Cooling Products Embedded NMC1 - Rack Air Removal Unit SX (RARU)
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9617 (discontinued in Nov 2011) NMC1 AOS V3.9.2 and earlier
Schneider Electric / NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9617 (discontinued in Nov 2011)
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9619 (discontinued in Sep 2012) NMC1 AOS V3.9.2 and earlier
Schneider Electric / NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9619 (discontinued in Sep 2012)
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9618 (discontinued in Jan 2017) NMC1 AOS V3.9.2 and earlier
Schneider Electric / NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9618 (discontinued in Jan 2017)
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - Audio/Video Network Management Enabled products S20BLK, G50NETB2, G50NETB-20A2 NMC1 AOS V3.9.2 and earlier
Schneider Electric / NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - Audio/Video Network Management Enabled products S20BLK, G50NETB2, G50NETB-20A2
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric Battery Management - Battery Management System - AP9920B1 NMC1 AOS V3.9.2 and earlier
Schneider Electric / Battery Management - Battery Management System - AP9920B1
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric Battery Management - Battery Management System - AP9921X NMC1 AOS V3.9.2 and earlier
Schneider Electric / Battery Management - Battery Management System - AP9921X
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric Environmental Monitoring AP9319 AP9320 AP9340 AP9360 AP9361 NetBotz NBRK0200 NMC1 AOS V3.9.2 and earlier
Schneider Electric / Environmental Monitoring AP9319 AP9320 AP9340 AP9360 AP9361 NetBotz NBRK0200
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric Cooling Products - NetworkAir NMC1 AOS V3.9.2 and earlier
Schneider Electric / Cooling Products - NetworkAir
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric Cooling Products - InRow NMC1 AOS V3.9.2 and earlier
Schneider Electric / Cooling Products - InRow
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Schneider Electric NMC2 AOS V6.9.2/6.9.4
Schneider Electric / NMC2 AOS
|
6.9.2|6.9.4 | ||
|
Schneider Electric NMC2 AOS V6.9.6 or later
Schneider Electric / NMC2 AOS
|
>=6.9.6 | ||
|
Schneider Electric NMC2 AOS V3.9.4 or later
Schneider Electric / NMC2 AOS
|
>=3.9.4 | ||
|
Schneider Electric NMC3 AOS V1.4 or later
Schneider Electric / NMC3 AOS
|
>=1.4 | ||
|
Schneider Electric NMC1 AOS V3.9.4 or later
Schneider Electric / NMC1 AOS
|
>=3.9.4 |
Network Management Card Family - Network Management Card 2 (NMC2), Network Management Card 3 (NMC3)
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9630/AP9630CH/AP9630J NMC2 AOS V6.9.4 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9630/AP9630CH/AP9630J
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9631/AP9631CH/AP9631J NMC2 AOS V6.9.4 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9631/AP9631CH/AP9631J
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9635/AP9635CH NMC2 AOS V6.9.4 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9635/AP9635CH
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9640/AP9640J NMC3 AOS V1.3.0.6 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9640/AP9640J
|
<=NMC3 AOS 1.3.0.6 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9641/AP9641J NMC3 AOS V1.3.0.6 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9641/AP9641J
|
<=NMC3 AOS 1.3.0.6 |
Vendor Fix
fix
|
|
|
Schneider Electric Battery Management Embedded NMC2 - Battery Manager - AP9922 NMC2 AOS V6.9.4 and earlier
Schneider Electric / Battery Management Embedded NMC2 - Battery Manager - AP9922
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: InfraStruXure 150kVA PDU with 84 poles (X84P) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: InfraStruXure 150kVA PDU with 84 poles (X84P)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: InfraStruXure 40 and 60 kVA PDU (XPDU) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: InfraStruXure 40 and 60 kVA PDU (XPDU)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: Modular 150 and 175 kVA PDU NAM (XRDP) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: Modular 150 and 175 kVA PDU NAM (XRDP)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: 400 and 500 kVA PMM (PMM) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: 400 and 500 kVA PMM (PMM)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: Modular PDU/RPP (XRDP2G) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: Modular PDU/RPP (XRDP2G)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC Rack Power Distribution Units (rPDU) Embedded NMC2: 2G Metered/Switched Rack PDUs with embedded NMC2 NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC Rack Power Distribution Units (rPDU) Embedded NMC2: 2G Metered/Switched Rack PDUs with embedded NMC2
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC Rack Power Distribution Units (rPDU) Embedded NMC2: AP84XX, AP86XX, AP88XX, AP89XX NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC Rack Power Distribution Units (rPDU) Embedded NMC2: AP84XX, AP86XX, AP88XX, AP89XX
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Rack Automatic Transfer Switches (ATS) Embedded NMC2: - Rack Automatic Transfer Switches - AP44XX NMC2 AOS V6.8.8 and earlier
Schneider Electric / Rack Automatic Transfer Switches (ATS) Embedded NMC2: - Rack Automatic Transfer Switches - AP44XX
|
<=NMC2 AOS 6.8.8 |
Vendor Fix
fix
|
|
|
Schneider Electric Environmental Monitoring Environmental Monitoring Unit with embedded NMC2 - NetBotz NBRK0250 NMC2 AOS V6.8.8 and earlier
Schneider Electric / Environmental Monitoring Environmental Monitoring Unit with embedded NMC2 - NetBotz NBRK0250
|
<=NMC2 AOS 6.8.8 |
Vendor Fix
fix
|
|
|
Schneider Electric Cooling Products Embedded NMC2 & Touchscreen Displays: InRow NMC2 AOS V6.9.4 and earlier
Schneider Electric / Cooling Products Embedded NMC2 & Touchscreen Displays: InRow
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Cooling Products Embedded NMC2 & Touchscreen Displays: Uniflair Cooling Devices NMC2 AOS V6.9.4 and earlier
Schneider Electric / Cooling Products Embedded NMC2 & Touchscreen Displays: Uniflair Cooling Devices
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Schneider Electric NMC2 AOS V6.9.2/6.9.4
Schneider Electric / NMC2 AOS
|
6.9.2|6.9.4 | ||
|
Schneider Electric NMC2 AOS V6.9.6 or later
Schneider Electric / NMC2 AOS
|
>=6.9.6 | ||
|
Schneider Electric NMC2 AOS V3.9.4 or later
Schneider Electric / NMC2 AOS
|
>=3.9.4 | ||
|
Schneider Electric NMC3 AOS V1.3.3.1
Schneider Electric / NMC3 AOS
|
1.3.3.1 | ||
|
Schneider Electric NMC3 AOS V1.4 or later
Schneider Electric / NMC3 AOS
|
>=1.4 |
Network Management Card Family - Network Management Card 1 (NMC1), Network Management Card 2 (NMC2), Network Management Card 3 (NMC3)
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9630/AP9630CH/AP9630J NMC2 AOS V6.9.4 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9630/AP9630CH/AP9630J
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9631/AP9631CH/AP9631J NMC2 AOS V6.9.4 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9631/AP9631CH/AP9631J
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9635/AP9635CH NMC2 AOS V6.9.4 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9635/AP9635CH
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9617 (discontinued in Nov 2011) Smart-UPS NMC1 v3.9.2 and earlier
Schneider Electric / Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9617 (discontinued in Nov 2011)
|
<=Smart-UPS NMC1 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9619 (discontinued in Sep 2012) Smart-UPS NMC1 v3.9.2 and earlier
Schneider Electric / Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9619 (discontinued in Sep 2012)
|
<=Smart-UPS NMC1 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9618 (discontinued in Jan 2017) Smart-UPS NMC1 v3.9.2 and earlier
Schneider Electric / Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9618 (discontinued in Jan 2017)
|
<=Smart-UPS NMC1 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptable Power Supply (UPS) using NMC1 - SUMX Smart-UPS models embedded with NMC1 Smart-UPS NMC1 v3.9.2 and earlier
Schneider Electric / Uninterruptable Power Supply (UPS) using NMC1 - SUMX Smart-UPS models embedded with NMC1
|
<=Smart-UPS NMC1 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9640/AP9640J NMC3 AOS V1.3.0.6 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9640/AP9640J
|
<=NMC3 AOS 1.3.0.6 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9641/AP9641J NMC3 AOS V1.3.0.6 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9641/AP9641J
|
<=NMC3 AOS 1.3.0.6 |
Vendor Fix
fix
|
|
|
Schneider Electric Battery Management Embedded NMC2 - Battery Manager - AP9922 NMC2 AOS V6.9.4 and earlier
Schneider Electric / Battery Management Embedded NMC2 - Battery Manager - AP9922
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: InfraStruXure 150kVA PDU with 84 poles (X84P) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: InfraStruXure 150kVA PDU with 84 poles (X84P)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: InfraStruXure 40 and 60 kVA PDU (XPDU) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: InfraStruXure 40 and 60 kVA PDU (XPDU)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: Modular 150 and 175 kVA PDU NAM (XRDP) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: Modular 150 and 175 kVA PDU NAM (XRDP)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: 400 and 500 kVA PMM (PMM) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: 400 and 500 kVA PMM (PMM)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: Modular PDU/RPP (XRDP2G) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: Modular PDU/RPP (XRDP2G)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC Rack Power Distribution Units (rPDU) Embedded NMC2: 2G Metered/Switched Rack PDUs with embedded NMC2 NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC Rack Power Distribution Units (rPDU) Embedded NMC2: 2G Metered/Switched Rack PDUs with embedded NMC2
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC Rack Power Distribution Units (rPDU) Embedded NMC2: AP84XX, AP86XX, AP88XX, AP89XX NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC Rack Power Distribution Units (rPDU) Embedded NMC2: AP84XX, AP86XX, AP88XX, AP89XX
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC Rack Power Distribution Units (rPDU) Embedded NMC1: Metered/Switched Rack PDUs with embedded NMC1 - AP78XX, AP79XX NMC1 AOS V3.9.2 and earlier
Schneider Electric / APC Rack Power Distribution Units (rPDU) Embedded NMC1: Metered/Switched Rack PDUs with embedded NMC1 - AP78XX, AP79XX
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric Rack Automatic Transfer Switches (ATS) Embedded NMC2: - Rack Automatic Transfer Switches - AP44XX NMC2 AOS V6.8.8 and earlier
Schneider Electric / Rack Automatic Transfer Switches (ATS) Embedded NMC2: - Rack Automatic Transfer Switches - AP44XX
|
<=NMC2 AOS 6.8.8 |
Vendor Fix
fix
|
|
|
Schneider Electric Rack Automatic Transfer Switches (ATS) Embedded NMC1: - Rack Automatic Transfer Switches - AP77XX NMC1 AOS v3.9.2 and earlier
Schneider Electric / Rack Automatic Transfer Switches (ATS) Embedded NMC1: - Rack Automatic Transfer Switches - AP77XX
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric Environmental Monitoring Environmental Monitoring Unit with embedded NMC2 - NetBotz NBRK0250 NMC2 AOS V6.8.8 and earlier
Schneider Electric / Environmental Monitoring Environmental Monitoring Unit with embedded NMC2 - NetBotz NBRK0250
|
<=NMC2 AOS 6.8.8 |
Vendor Fix
fix
|
|
|
Schneider Electric Cooling Products Embedded NMC2 & Touchscreen Displays: InRow NMC2 AOS V6.9.4 and earlier
Schneider Electric / Cooling Products Embedded NMC2 & Touchscreen Displays: InRow
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Cooling Products Embedded NMC2 & Touchscreen Displays: Uniflair Cooling Devices NMC2 AOS V6.9.4 and earlier
Schneider Electric / Cooling Products Embedded NMC2 & Touchscreen Displays: Uniflair Cooling Devices
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Cooling Products Embedded NMC1 - Rack Air Removal Unit SX (RARU) NMC1 AOS V3.9.2 and earlier
Schneider Electric / Cooling Products Embedded NMC1 - Rack Air Removal Unit SX (RARU)
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9617 (discontinued in Nov 2011) NMC1 AOS V3.9.2 and earlier
Schneider Electric / NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9617 (discontinued in Nov 2011)
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9619 (discontinued in Sep 2012) NMC1 AOS V3.9.2 and earlier
Schneider Electric / NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9619 (discontinued in Sep 2012)
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9618 (discontinued in Jan 2017) NMC1 AOS V3.9.2 and earlier
Schneider Electric / NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9618 (discontinued in Jan 2017)
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - Audio/Video Network Management Enabled products S20BLK, G50NETB2, G50NETB-20A2 NMC1 AOS V3.9.2 and earlier
Schneider Electric / NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - Audio/Video Network Management Enabled products S20BLK, G50NETB2, G50NETB-20A2
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric Battery Management - Battery Management System - AP9920B1 NMC1 AOS V3.9.2 and earlier
Schneider Electric / Battery Management - Battery Management System - AP9920B1
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric Battery Management - Battery Management System - AP9921X NMC1 AOS V3.9.2 and earlier
Schneider Electric / Battery Management - Battery Management System - AP9921X
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric Environmental Monitoring AP9319 AP9320 AP9340 AP9360 AP9361 NetBotz NBRK0200 NMC1 AOS V3.9.2 and earlier
Schneider Electric / Environmental Monitoring AP9319 AP9320 AP9340 AP9360 AP9361 NetBotz NBRK0200
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric Cooling Products - NetworkAir NMC1 AOS V3.9.2 and earlier
Schneider Electric / Cooling Products - NetworkAir
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric Cooling Products - InRow NMC1 AOS V3.9.2 and earlier
Schneider Electric / Cooling Products - InRow
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Schneider Electric NMC2 AOS V6.9.2/6.9.4
Schneider Electric / NMC2 AOS
|
6.9.2|6.9.4 | ||
|
Schneider Electric NMC2 AOS V6.9.6 or later
Schneider Electric / NMC2 AOS
|
>=6.9.6 | ||
|
Schneider Electric NMC2 AOS V3.9.4 or later
Schneider Electric / NMC2 AOS
|
>=3.9.4 | ||
|
Schneider Electric NMC3 AOS V1.4 or later
Schneider Electric / NMC3 AOS
|
>=1.4 | ||
|
Schneider Electric NMC1 AOS V3.9.4 or later
Schneider Electric / NMC1 AOS
|
>=3.9.4 |
Network Management Card Family - Network Management Card 1 (NMC1)
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Schneider Electric Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9617 (discontinued in Nov 2011) Smart-UPS NMC1 v3.9.2 and earlier
Schneider Electric / Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9617 (discontinued in Nov 2011)
|
<=Smart-UPS NMC1 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9619 (discontinued in Sep 2012) Smart-UPS NMC1 v3.9.2 and earlier
Schneider Electric / Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9619 (discontinued in Sep 2012)
|
<=Smart-UPS NMC1 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9618 (discontinued in Jan 2017) Smart-UPS NMC1 v3.9.2 and earlier
Schneider Electric / Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9618 (discontinued in Jan 2017)
|
<=Smart-UPS NMC1 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptable Power Supply (UPS) using NMC1 - SUMX Smart-UPS models embedded with NMC1 Smart-UPS NMC1 v3.9.2 and earlier
Schneider Electric / Uninterruptable Power Supply (UPS) using NMC1 - SUMX Smart-UPS models embedded with NMC1
|
<=Smart-UPS NMC1 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric APC Rack Power Distribution Units (rPDU) Embedded NMC1: Metered/Switched Rack PDUs with embedded NMC1 - AP78XX, AP79XX NMC1 AOS V3.9.2 and earlier
Schneider Electric / APC Rack Power Distribution Units (rPDU) Embedded NMC1: Metered/Switched Rack PDUs with embedded NMC1 - AP78XX, AP79XX
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric Rack Automatic Transfer Switches (ATS) Embedded NMC1: - Rack Automatic Transfer Switches - AP77XX NMC1 AOS v3.9.2 and earlier
Schneider Electric / Rack Automatic Transfer Switches (ATS) Embedded NMC1: - Rack Automatic Transfer Switches - AP77XX
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric Cooling Products Embedded NMC1 - Rack Air Removal Unit SX (RARU) NMC1 AOS V3.9.2 and earlier
Schneider Electric / Cooling Products Embedded NMC1 - Rack Air Removal Unit SX (RARU)
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9617 (discontinued in Nov 2011) NMC1 AOS V3.9.2 and earlier
Schneider Electric / NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9617 (discontinued in Nov 2011)
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9619 (discontinued in Sep 2012) NMC1 AOS V3.9.2 and earlier
Schneider Electric / NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9619 (discontinued in Sep 2012)
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9618 (discontinued in Jan 2017) NMC1 AOS V3.9.2 and earlier
Schneider Electric / NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9618 (discontinued in Jan 2017)
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - Audio/Video Network Management Enabled products S20BLK, G50NETB2, G50NETB-20A2 NMC1 AOS V3.9.2 and earlier
Schneider Electric / NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - Audio/Video Network Management Enabled products S20BLK, G50NETB2, G50NETB-20A2
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric Battery Management - Battery Management System - AP9920B1 NMC1 AOS V3.9.2 and earlier
Schneider Electric / Battery Management - Battery Management System - AP9920B1
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric Battery Management - Battery Management System - AP9921X NMC1 AOS V3.9.2 and earlier
Schneider Electric / Battery Management - Battery Management System - AP9921X
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric Environmental Monitoring AP9319 AP9320 AP9340 AP9360 AP9361 NetBotz NBRK0200 NMC1 AOS V3.9.2 and earlier
Schneider Electric / Environmental Monitoring AP9319 AP9320 AP9340 AP9360 AP9361 NetBotz NBRK0200
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric Cooling Products - NetworkAir NMC1 AOS V3.9.2 and earlier
Schneider Electric / Cooling Products - NetworkAir
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric Cooling Products - InRow NMC1 AOS V3.9.2 and earlier
Schneider Electric / Cooling Products - InRow
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Schneider Electric NMC1 AOS V3.9.4 or later
Schneider Electric / NMC1 AOS
|
>=3.9.4 |
Network Management Card Family - Network Management Card 1 (NMC1), Network Management Card 2 (NMC2), Network Management Card 3 (NMC3)
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9630/AP9630CH/AP9630J NMC2 AOS V6.9.4 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9630/AP9630CH/AP9630J
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9631/AP9631CH/AP9631J NMC2 AOS V6.9.4 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9631/AP9631CH/AP9631J
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9635/AP9635CH NMC2 AOS V6.9.4 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9635/AP9635CH
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9617 (discontinued in Nov 2011) Smart-UPS NMC1 v3.9.2 and earlier
Schneider Electric / Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9617 (discontinued in Nov 2011)
|
<=Smart-UPS NMC1 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9619 (discontinued in Sep 2012) Smart-UPS NMC1 v3.9.2 and earlier
Schneider Electric / Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9619 (discontinued in Sep 2012)
|
<=Smart-UPS NMC1 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9618 (discontinued in Jan 2017) Smart-UPS NMC1 v3.9.2 and earlier
Schneider Electric / Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9618 (discontinued in Jan 2017)
|
<=Smart-UPS NMC1 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptable Power Supply (UPS) using NMC1 - SUMX Smart-UPS models embedded with NMC1 Smart-UPS NMC1 v3.9.2 and earlier
Schneider Electric / Uninterruptable Power Supply (UPS) using NMC1 - SUMX Smart-UPS models embedded with NMC1
|
<=Smart-UPS NMC1 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9640/AP9640J NMC3 AOS V1.3.0.6 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9640/AP9640J
|
<=NMC3 AOS 1.3.0.6 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9641/AP9641J NMC3 AOS V1.3.0.6 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9641/AP9641J
|
<=NMC3 AOS 1.3.0.6 |
Vendor Fix
fix
|
|
|
Schneider Electric Battery Management Embedded NMC2 - Battery Manager - AP9922 NMC2 AOS V6.9.4 and earlier
Schneider Electric / Battery Management Embedded NMC2 - Battery Manager - AP9922
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: InfraStruXure 150kVA PDU with 84 poles (X84P) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: InfraStruXure 150kVA PDU with 84 poles (X84P)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: InfraStruXure 40 and 60 kVA PDU (XPDU) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: InfraStruXure 40 and 60 kVA PDU (XPDU)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: Modular 150 and 175 kVA PDU NAM (XRDP) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: Modular 150 and 175 kVA PDU NAM (XRDP)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: 400 and 500 kVA PMM (PMM) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: 400 and 500 kVA PMM (PMM)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: Modular PDU/RPP (XRDP2G) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: Modular PDU/RPP (XRDP2G)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC Rack Power Distribution Units (rPDU) Embedded NMC2: 2G Metered/Switched Rack PDUs with embedded NMC2 NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC Rack Power Distribution Units (rPDU) Embedded NMC2: 2G Metered/Switched Rack PDUs with embedded NMC2
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC Rack Power Distribution Units (rPDU) Embedded NMC2: AP84XX, AP86XX, AP88XX, AP89XX NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC Rack Power Distribution Units (rPDU) Embedded NMC2: AP84XX, AP86XX, AP88XX, AP89XX
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC Rack Power Distribution Units (rPDU) Embedded NMC1: Metered/Switched Rack PDUs with embedded NMC1 - AP78XX, AP79XX NMC1 AOS V3.9.2 and earlier
Schneider Electric / APC Rack Power Distribution Units (rPDU) Embedded NMC1: Metered/Switched Rack PDUs with embedded NMC1 - AP78XX, AP79XX
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric Rack Automatic Transfer Switches (ATS) Embedded NMC2: - Rack Automatic Transfer Switches - AP44XX NMC2 AOS V6.8.8 and earlier
Schneider Electric / Rack Automatic Transfer Switches (ATS) Embedded NMC2: - Rack Automatic Transfer Switches - AP44XX
|
<=NMC2 AOS 6.8.8 |
Vendor Fix
fix
|
|
|
Schneider Electric Rack Automatic Transfer Switches (ATS) Embedded NMC1: - Rack Automatic Transfer Switches - AP77XX NMC1 AOS v3.9.2 and earlier
Schneider Electric / Rack Automatic Transfer Switches (ATS) Embedded NMC1: - Rack Automatic Transfer Switches - AP77XX
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric Environmental Monitoring Environmental Monitoring Unit with embedded NMC2 - NetBotz NBRK0250 NMC2 AOS V6.8.8 and earlier
Schneider Electric / Environmental Monitoring Environmental Monitoring Unit with embedded NMC2 - NetBotz NBRK0250
|
<=NMC2 AOS 6.8.8 |
Vendor Fix
fix
|
|
|
Schneider Electric Cooling Products Embedded NMC2 & Touchscreen Displays: InRow NMC2 AOS V6.9.4 and earlier
Schneider Electric / Cooling Products Embedded NMC2 & Touchscreen Displays: InRow
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Cooling Products Embedded NMC2 & Touchscreen Displays: Uniflair Cooling Devices NMC2 AOS V6.9.4 and earlier
Schneider Electric / Cooling Products Embedded NMC2 & Touchscreen Displays: Uniflair Cooling Devices
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Cooling Products Embedded NMC1 - Rack Air Removal Unit SX (RARU) NMC1 AOS V3.9.2 and earlier
Schneider Electric / Cooling Products Embedded NMC1 - Rack Air Removal Unit SX (RARU)
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9617 (discontinued in Nov 2011) NMC1 AOS V3.9.2 and earlier
Schneider Electric / NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9617 (discontinued in Nov 2011)
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9619 (discontinued in Sep 2012) NMC1 AOS V3.9.2 and earlier
Schneider Electric / NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9619 (discontinued in Sep 2012)
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9618 (discontinued in Jan 2017) NMC1 AOS V3.9.2 and earlier
Schneider Electric / NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9618 (discontinued in Jan 2017)
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - Audio/Video Network Management Enabled products S20BLK, G50NETB2, G50NETB-20A2 NMC1 AOS V3.9.2 and earlier
Schneider Electric / NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - Audio/Video Network Management Enabled products S20BLK, G50NETB2, G50NETB-20A2
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric Battery Management - Battery Management System - AP9920B1 NMC1 AOS V3.9.2 and earlier
Schneider Electric / Battery Management - Battery Management System - AP9920B1
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric Battery Management - Battery Management System - AP9921X NMC1 AOS V3.9.2 and earlier
Schneider Electric / Battery Management - Battery Management System - AP9921X
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric Environmental Monitoring AP9319 AP9320 AP9340 AP9360 AP9361 NetBotz NBRK0200 NMC1 AOS V3.9.2 and earlier
Schneider Electric / Environmental Monitoring AP9319 AP9320 AP9340 AP9360 AP9361 NetBotz NBRK0200
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric Cooling Products - NetworkAir NMC1 AOS V3.9.2 and earlier
Schneider Electric / Cooling Products - NetworkAir
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric Cooling Products - InRow NMC1 AOS V3.9.2 and earlier
Schneider Electric / Cooling Products - InRow
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Schneider Electric NMC2 AOS V6.9.2/6.9.4
Schneider Electric / NMC2 AOS
|
6.9.2|6.9.4 | ||
|
Schneider Electric NMC2 AOS V6.9.6 or later
Schneider Electric / NMC2 AOS
|
>=6.9.6 | ||
|
Schneider Electric NMC2 AOS V3.9.4 or later
Schneider Electric / NMC2 AOS
|
>=3.9.4 | ||
|
Schneider Electric NMC3 AOS V1.4 or later
Schneider Electric / NMC3 AOS
|
>=1.4 | ||
|
Schneider Electric NMC1 AOS V3.9.4 or later
Schneider Electric / NMC1 AOS
|
>=3.9.4 |
Network Management Card Family - Network Management Card 1 (NMC1), Network Management Card 2 (NMC2), Network Management Card 3 (NMC3)
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9630/AP9630CH/AP9630J NMC2 AOS V6.9.4 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9630/AP9630CH/AP9630J
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9631/AP9631CH/AP9631J NMC2 AOS V6.9.4 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9631/AP9631CH/AP9631J
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9635/AP9635CH NMC2 AOS V6.9.4 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9635/AP9635CH
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9617 (discontinued in Nov 2011) Smart-UPS NMC1 v3.9.2 and earlier
Schneider Electric / Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9617 (discontinued in Nov 2011)
|
<=Smart-UPS NMC1 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9619 (discontinued in Sep 2012) Smart-UPS NMC1 v3.9.2 and earlier
Schneider Electric / Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9619 (discontinued in Sep 2012)
|
<=Smart-UPS NMC1 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9618 (discontinued in Jan 2017) Smart-UPS NMC1 v3.9.2 and earlier
Schneider Electric / Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9618 (discontinued in Jan 2017)
|
<=Smart-UPS NMC1 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptable Power Supply (UPS) using NMC1 - SUMX Smart-UPS models embedded with NMC1 Smart-UPS NMC1 v3.9.2 and earlier
Schneider Electric / Uninterruptable Power Supply (UPS) using NMC1 - SUMX Smart-UPS models embedded with NMC1
|
<=Smart-UPS NMC1 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9640/AP9640J NMC3 AOS V1.3.0.6 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9640/AP9640J
|
<=NMC3 AOS 1.3.0.6 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9641/AP9641J NMC3 AOS V1.3.0.6 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9641/AP9641J
|
<=NMC3 AOS 1.3.0.6 |
Vendor Fix
fix
|
|
|
Schneider Electric Battery Management Embedded NMC2 - Battery Manager - AP9922 NMC2 AOS V6.9.4 and earlier
Schneider Electric / Battery Management Embedded NMC2 - Battery Manager - AP9922
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: InfraStruXure 150kVA PDU with 84 poles (X84P) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: InfraStruXure 150kVA PDU with 84 poles (X84P)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: InfraStruXure 40 and 60 kVA PDU (XPDU) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: InfraStruXure 40 and 60 kVA PDU (XPDU)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: Modular 150 and 175 kVA PDU NAM (XRDP) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: Modular 150 and 175 kVA PDU NAM (XRDP)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: 400 and 500 kVA PMM (PMM) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: 400 and 500 kVA PMM (PMM)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: Modular PDU/RPP (XRDP2G) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: Modular PDU/RPP (XRDP2G)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC Rack Power Distribution Units (rPDU) Embedded NMC2: 2G Metered/Switched Rack PDUs with embedded NMC2 NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC Rack Power Distribution Units (rPDU) Embedded NMC2: 2G Metered/Switched Rack PDUs with embedded NMC2
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC Rack Power Distribution Units (rPDU) Embedded NMC2: AP84XX, AP86XX, AP88XX, AP89XX NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC Rack Power Distribution Units (rPDU) Embedded NMC2: AP84XX, AP86XX, AP88XX, AP89XX
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC Rack Power Distribution Units (rPDU) Embedded NMC1: Metered/Switched Rack PDUs with embedded NMC1 - AP78XX, AP79XX NMC1 AOS V3.9.2 and earlier
Schneider Electric / APC Rack Power Distribution Units (rPDU) Embedded NMC1: Metered/Switched Rack PDUs with embedded NMC1 - AP78XX, AP79XX
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric Rack Automatic Transfer Switches (ATS) Embedded NMC2: - Rack Automatic Transfer Switches - AP44XX NMC2 AOS V6.8.8 and earlier
Schneider Electric / Rack Automatic Transfer Switches (ATS) Embedded NMC2: - Rack Automatic Transfer Switches - AP44XX
|
<=NMC2 AOS 6.8.8 |
Vendor Fix
fix
|
|
|
Schneider Electric Rack Automatic Transfer Switches (ATS) Embedded NMC1: - Rack Automatic Transfer Switches - AP77XX NMC1 AOS v3.9.2 and earlier
Schneider Electric / Rack Automatic Transfer Switches (ATS) Embedded NMC1: - Rack Automatic Transfer Switches - AP77XX
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric Environmental Monitoring Environmental Monitoring Unit with embedded NMC2 - NetBotz NBRK0250 NMC2 AOS V6.8.8 and earlier
Schneider Electric / Environmental Monitoring Environmental Monitoring Unit with embedded NMC2 - NetBotz NBRK0250
|
<=NMC2 AOS 6.8.8 |
Vendor Fix
fix
|
|
|
Schneider Electric Cooling Products Embedded NMC2 & Touchscreen Displays: InRow NMC2 AOS V6.9.4 and earlier
Schneider Electric / Cooling Products Embedded NMC2 & Touchscreen Displays: InRow
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Cooling Products Embedded NMC2 & Touchscreen Displays: Uniflair Cooling Devices NMC2 AOS V6.9.4 and earlier
Schneider Electric / Cooling Products Embedded NMC2 & Touchscreen Displays: Uniflair Cooling Devices
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Cooling Products Embedded NMC1 - Rack Air Removal Unit SX (RARU) NMC1 AOS V3.9.2 and earlier
Schneider Electric / Cooling Products Embedded NMC1 - Rack Air Removal Unit SX (RARU)
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9617 (discontinued in Nov 2011) NMC1 AOS V3.9.2 and earlier
Schneider Electric / NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9617 (discontinued in Nov 2011)
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9619 (discontinued in Sep 2012) NMC1 AOS V3.9.2 and earlier
Schneider Electric / NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9619 (discontinued in Sep 2012)
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9618 (discontinued in Jan 2017) NMC1 AOS V3.9.2 and earlier
Schneider Electric / NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9618 (discontinued in Jan 2017)
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - Audio/Video Network Management Enabled products S20BLK, G50NETB2, G50NETB-20A2 NMC1 AOS V3.9.2 and earlier
Schneider Electric / NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - Audio/Video Network Management Enabled products S20BLK, G50NETB2, G50NETB-20A2
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric Battery Management - Battery Management System - AP9920B1 NMC1 AOS V3.9.2 and earlier
Schneider Electric / Battery Management - Battery Management System - AP9920B1
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric Battery Management - Battery Management System - AP9921X NMC1 AOS V3.9.2 and earlier
Schneider Electric / Battery Management - Battery Management System - AP9921X
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric Environmental Monitoring AP9319 AP9320 AP9340 AP9360 AP9361 NetBotz NBRK0200 NMC1 AOS V3.9.2 and earlier
Schneider Electric / Environmental Monitoring AP9319 AP9320 AP9340 AP9360 AP9361 NetBotz NBRK0200
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric Cooling Products - NetworkAir NMC1 AOS V3.9.2 and earlier
Schneider Electric / Cooling Products - NetworkAir
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric Cooling Products - InRow NMC1 AOS V3.9.2 and earlier
Schneider Electric / Cooling Products - InRow
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Schneider Electric NMC2 AOS V6.9.2/6.9.4
Schneider Electric / NMC2 AOS
|
6.9.2|6.9.4 | ||
|
Schneider Electric NMC2 AOS V6.9.6 or later
Schneider Electric / NMC2 AOS
|
>=6.9.6 | ||
|
Schneider Electric NMC2 AOS V3.9.4 or later
Schneider Electric / NMC2 AOS
|
>=3.9.4 | ||
|
Schneider Electric NMC3 AOS V1.4 or later
Schneider Electric / NMC3 AOS
|
>=1.4 | ||
|
Schneider Electric NMC1 AOS V3.9.4 or later
Schneider Electric / NMC1 AOS
|
>=3.9.4 |
Network Management Card Family - Network Management Card 1 (NMC1), Network Management Card 2 (NMC2), Network Management Card 3 (NMC3)
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9630/AP9630CH/AP9630J NMC2 AOS V6.9.4 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9630/AP9630CH/AP9630J
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9631/AP9631CH/AP9631J NMC2 AOS V6.9.4 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9631/AP9631CH/AP9631J
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9635/AP9635CH NMC2 AOS V6.9.4 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9635/AP9635CH
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9617 (discontinued in Nov 2011) Smart-UPS NMC1 v3.9.2 and earlier
Schneider Electric / Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9617 (discontinued in Nov 2011)
|
<=Smart-UPS NMC1 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9619 (discontinued in Sep 2012) Smart-UPS NMC1 v3.9.2 and earlier
Schneider Electric / Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9619 (discontinued in Sep 2012)
|
<=Smart-UPS NMC1 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9618 (discontinued in Jan 2017) Smart-UPS NMC1 v3.9.2 and earlier
Schneider Electric / Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9618 (discontinued in Jan 2017)
|
<=Smart-UPS NMC1 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptable Power Supply (UPS) using NMC1 - SUMX Smart-UPS models embedded with NMC1 Smart-UPS NMC1 v3.9.2 and earlier
Schneider Electric / Uninterruptable Power Supply (UPS) using NMC1 - SUMX Smart-UPS models embedded with NMC1
|
<=Smart-UPS NMC1 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9640/AP9640J NMC3 AOS V1.3.0.6 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9640/AP9640J
|
<=NMC3 AOS 1.3.0.6 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9641/AP9641J NMC3 AOS V1.3.0.6 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9641/AP9641J
|
<=NMC3 AOS 1.3.0.6 |
Vendor Fix
fix
|
|
|
Schneider Electric Battery Management Embedded NMC2 - Battery Manager - AP9922 NMC2 AOS V6.9.4 and earlier
Schneider Electric / Battery Management Embedded NMC2 - Battery Manager - AP9922
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: InfraStruXure 150kVA PDU with 84 poles (X84P) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: InfraStruXure 150kVA PDU with 84 poles (X84P)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: InfraStruXure 40 and 60 kVA PDU (XPDU) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: InfraStruXure 40 and 60 kVA PDU (XPDU)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: Modular 150 and 175 kVA PDU NAM (XRDP) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: Modular 150 and 175 kVA PDU NAM (XRDP)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: 400 and 500 kVA PMM (PMM) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: 400 and 500 kVA PMM (PMM)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: Modular PDU/RPP (XRDP2G) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: Modular PDU/RPP (XRDP2G)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC Rack Power Distribution Units (rPDU) Embedded NMC2: 2G Metered/Switched Rack PDUs with embedded NMC2 NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC Rack Power Distribution Units (rPDU) Embedded NMC2: 2G Metered/Switched Rack PDUs with embedded NMC2
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC Rack Power Distribution Units (rPDU) Embedded NMC2: AP84XX, AP86XX, AP88XX, AP89XX NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC Rack Power Distribution Units (rPDU) Embedded NMC2: AP84XX, AP86XX, AP88XX, AP89XX
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC Rack Power Distribution Units (rPDU) Embedded NMC1: Metered/Switched Rack PDUs with embedded NMC1 - AP78XX, AP79XX NMC1 AOS V3.9.2 and earlier
Schneider Electric / APC Rack Power Distribution Units (rPDU) Embedded NMC1: Metered/Switched Rack PDUs with embedded NMC1 - AP78XX, AP79XX
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric Rack Automatic Transfer Switches (ATS) Embedded NMC2: - Rack Automatic Transfer Switches - AP44XX NMC2 AOS V6.8.8 and earlier
Schneider Electric / Rack Automatic Transfer Switches (ATS) Embedded NMC2: - Rack Automatic Transfer Switches - AP44XX
|
<=NMC2 AOS 6.8.8 |
Vendor Fix
fix
|
|
|
Schneider Electric Rack Automatic Transfer Switches (ATS) Embedded NMC1: - Rack Automatic Transfer Switches - AP77XX NMC1 AOS v3.9.2 and earlier
Schneider Electric / Rack Automatic Transfer Switches (ATS) Embedded NMC1: - Rack Automatic Transfer Switches - AP77XX
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric Environmental Monitoring Environmental Monitoring Unit with embedded NMC2 - NetBotz NBRK0250 NMC2 AOS V6.8.8 and earlier
Schneider Electric / Environmental Monitoring Environmental Monitoring Unit with embedded NMC2 - NetBotz NBRK0250
|
<=NMC2 AOS 6.8.8 |
Vendor Fix
fix
|
|
|
Schneider Electric Cooling Products Embedded NMC2 & Touchscreen Displays: InRow NMC2 AOS V6.9.4 and earlier
Schneider Electric / Cooling Products Embedded NMC2 & Touchscreen Displays: InRow
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Cooling Products Embedded NMC2 & Touchscreen Displays: Uniflair Cooling Devices NMC2 AOS V6.9.4 and earlier
Schneider Electric / Cooling Products Embedded NMC2 & Touchscreen Displays: Uniflair Cooling Devices
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Cooling Products Embedded NMC1 - Rack Air Removal Unit SX (RARU) NMC1 AOS V3.9.2 and earlier
Schneider Electric / Cooling Products Embedded NMC1 - Rack Air Removal Unit SX (RARU)
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9617 (discontinued in Nov 2011) NMC1 AOS V3.9.2 and earlier
Schneider Electric / NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9617 (discontinued in Nov 2011)
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9619 (discontinued in Sep 2012) NMC1 AOS V3.9.2 and earlier
Schneider Electric / NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9619 (discontinued in Sep 2012)
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9618 (discontinued in Jan 2017) NMC1 AOS V3.9.2 and earlier
Schneider Electric / NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9618 (discontinued in Jan 2017)
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - Audio/Video Network Management Enabled products S20BLK, G50NETB2, G50NETB-20A2 NMC1 AOS V3.9.2 and earlier
Schneider Electric / NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - Audio/Video Network Management Enabled products S20BLK, G50NETB2, G50NETB-20A2
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric Battery Management - Battery Management System - AP9920B1 NMC1 AOS V3.9.2 and earlier
Schneider Electric / Battery Management - Battery Management System - AP9920B1
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric Battery Management - Battery Management System - AP9921X NMC1 AOS V3.9.2 and earlier
Schneider Electric / Battery Management - Battery Management System - AP9921X
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric Environmental Monitoring AP9319 AP9320 AP9340 AP9360 AP9361 NetBotz NBRK0200 NMC1 AOS V3.9.2 and earlier
Schneider Electric / Environmental Monitoring AP9319 AP9320 AP9340 AP9360 AP9361 NetBotz NBRK0200
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric Cooling Products - NetworkAir NMC1 AOS V3.9.2 and earlier
Schneider Electric / Cooling Products - NetworkAir
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric Cooling Products - InRow NMC1 AOS V3.9.2 and earlier
Schneider Electric / Cooling Products - InRow
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Schneider Electric NMC2 AOS V6.9.2/6.9.4
Schneider Electric / NMC2 AOS
|
6.9.2|6.9.4 | ||
|
Schneider Electric NMC2 AOS V6.9.6 or later
Schneider Electric / NMC2 AOS
|
>=6.9.6 | ||
|
Schneider Electric NMC2 AOS V3.9.4 or later
Schneider Electric / NMC2 AOS
|
>=3.9.4 | ||
|
Schneider Electric NMC3 AOS V1.4 or later
Schneider Electric / NMC3 AOS
|
>=1.4 | ||
|
Schneider Electric NMC1 AOS V3.9.4 or later
Schneider Electric / NMC1 AOS
|
>=3.9.4 |
Network Management Card Family - Network Management Card 1 (NMC1), Network Management Card 2 (NMC2), Network Management Card 3 (NMC3)
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9630/AP9630CH/AP9630J NMC2 AOS V6.9.4 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9630/AP9630CH/AP9630J
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9631/AP9631CH/AP9631J NMC2 AOS V6.9.4 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9631/AP9631CH/AP9631J
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9635/AP9635CH NMC2 AOS V6.9.4 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9635/AP9635CH
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9617 (discontinued in Nov 2011) Smart-UPS NMC1 v3.9.2 and earlier
Schneider Electric / Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9617 (discontinued in Nov 2011)
|
<=Smart-UPS NMC1 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9619 (discontinued in Sep 2012) Smart-UPS NMC1 v3.9.2 and earlier
Schneider Electric / Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9619 (discontinued in Sep 2012)
|
<=Smart-UPS NMC1 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9618 (discontinued in Jan 2017) Smart-UPS NMC1 v3.9.2 and earlier
Schneider Electric / Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9618 (discontinued in Jan 2017)
|
<=Smart-UPS NMC1 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptable Power Supply (UPS) using NMC1 - SUMX Smart-UPS models embedded with NMC1 Smart-UPS NMC1 v3.9.2 and earlier
Schneider Electric / Uninterruptable Power Supply (UPS) using NMC1 - SUMX Smart-UPS models embedded with NMC1
|
<=Smart-UPS NMC1 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9640/AP9640J NMC3 AOS V1.3.0.6 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9640/AP9640J
|
<=NMC3 AOS 1.3.0.6 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9641/AP9641J NMC3 AOS V1.3.0.6 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9641/AP9641J
|
<=NMC3 AOS 1.3.0.6 |
Vendor Fix
fix
|
|
|
Schneider Electric Battery Management Embedded NMC2 - Battery Manager - AP9922 NMC2 AOS V6.9.4 and earlier
Schneider Electric / Battery Management Embedded NMC2 - Battery Manager - AP9922
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: InfraStruXure 150kVA PDU with 84 poles (X84P) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: InfraStruXure 150kVA PDU with 84 poles (X84P)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: InfraStruXure 40 and 60 kVA PDU (XPDU) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: InfraStruXure 40 and 60 kVA PDU (XPDU)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: Modular 150 and 175 kVA PDU NAM (XRDP) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: Modular 150 and 175 kVA PDU NAM (XRDP)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: 400 and 500 kVA PMM (PMM) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: 400 and 500 kVA PMM (PMM)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: Modular PDU/RPP (XRDP2G) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: Modular PDU/RPP (XRDP2G)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC Rack Power Distribution Units (rPDU) Embedded NMC2: 2G Metered/Switched Rack PDUs with embedded NMC2 NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC Rack Power Distribution Units (rPDU) Embedded NMC2: 2G Metered/Switched Rack PDUs with embedded NMC2
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC Rack Power Distribution Units (rPDU) Embedded NMC2: AP84XX, AP86XX, AP88XX, AP89XX NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC Rack Power Distribution Units (rPDU) Embedded NMC2: AP84XX, AP86XX, AP88XX, AP89XX
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC Rack Power Distribution Units (rPDU) Embedded NMC1: Metered/Switched Rack PDUs with embedded NMC1 - AP78XX, AP79XX NMC1 AOS V3.9.2 and earlier
Schneider Electric / APC Rack Power Distribution Units (rPDU) Embedded NMC1: Metered/Switched Rack PDUs with embedded NMC1 - AP78XX, AP79XX
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric Rack Automatic Transfer Switches (ATS) Embedded NMC2: - Rack Automatic Transfer Switches - AP44XX NMC2 AOS V6.8.8 and earlier
Schneider Electric / Rack Automatic Transfer Switches (ATS) Embedded NMC2: - Rack Automatic Transfer Switches - AP44XX
|
<=NMC2 AOS 6.8.8 |
Vendor Fix
fix
|
|
|
Schneider Electric Rack Automatic Transfer Switches (ATS) Embedded NMC1: - Rack Automatic Transfer Switches - AP77XX NMC1 AOS v3.9.2 and earlier
Schneider Electric / Rack Automatic Transfer Switches (ATS) Embedded NMC1: - Rack Automatic Transfer Switches - AP77XX
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric Environmental Monitoring Environmental Monitoring Unit with embedded NMC2 - NetBotz NBRK0250 NMC2 AOS V6.8.8 and earlier
Schneider Electric / Environmental Monitoring Environmental Monitoring Unit with embedded NMC2 - NetBotz NBRK0250
|
<=NMC2 AOS 6.8.8 |
Vendor Fix
fix
|
|
|
Schneider Electric Cooling Products Embedded NMC2 & Touchscreen Displays: InRow NMC2 AOS V6.9.4 and earlier
Schneider Electric / Cooling Products Embedded NMC2 & Touchscreen Displays: InRow
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Cooling Products Embedded NMC2 & Touchscreen Displays: Uniflair Cooling Devices NMC2 AOS V6.9.4 and earlier
Schneider Electric / Cooling Products Embedded NMC2 & Touchscreen Displays: Uniflair Cooling Devices
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Cooling Products Embedded NMC1 - Rack Air Removal Unit SX (RARU) NMC1 AOS V3.9.2 and earlier
Schneider Electric / Cooling Products Embedded NMC1 - Rack Air Removal Unit SX (RARU)
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9617 (discontinued in Nov 2011) NMC1 AOS V3.9.2 and earlier
Schneider Electric / NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9617 (discontinued in Nov 2011)
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9619 (discontinued in Sep 2012) NMC1 AOS V3.9.2 and earlier
Schneider Electric / NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9619 (discontinued in Sep 2012)
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9618 (discontinued in Jan 2017) NMC1 AOS V3.9.2 and earlier
Schneider Electric / NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9618 (discontinued in Jan 2017)
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - Audio/Video Network Management Enabled products S20BLK, G50NETB2, G50NETB-20A2 NMC1 AOS V3.9.2 and earlier
Schneider Electric / NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - Audio/Video Network Management Enabled products S20BLK, G50NETB2, G50NETB-20A2
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric Battery Management - Battery Management System - AP9920B1 NMC1 AOS V3.9.2 and earlier
Schneider Electric / Battery Management - Battery Management System - AP9920B1
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric Battery Management - Battery Management System - AP9921X NMC1 AOS V3.9.2 and earlier
Schneider Electric / Battery Management - Battery Management System - AP9921X
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric Environmental Monitoring AP9319 AP9320 AP9340 AP9360 AP9361 NetBotz NBRK0200 NMC1 AOS V3.9.2 and earlier
Schneider Electric / Environmental Monitoring AP9319 AP9320 AP9340 AP9360 AP9361 NetBotz NBRK0200
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric Cooling Products - NetworkAir NMC1 AOS V3.9.2 and earlier
Schneider Electric / Cooling Products - NetworkAir
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric Cooling Products - InRow NMC1 AOS V3.9.2 and earlier
Schneider Electric / Cooling Products - InRow
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Schneider Electric NMC2 AOS V6.9.2/6.9.4
Schneider Electric / NMC2 AOS
|
6.9.2|6.9.4 | ||
|
Schneider Electric NMC2 AOS V6.9.6 or later
Schneider Electric / NMC2 AOS
|
>=6.9.6 | ||
|
Schneider Electric NMC2 AOS V3.9.4 or later
Schneider Electric / NMC2 AOS
|
>=3.9.4 | ||
|
Schneider Electric NMC3 AOS V1.4 or later
Schneider Electric / NMC3 AOS
|
>=1.4 | ||
|
Schneider Electric NMC1 AOS V3.9.4 or later
Schneider Electric / NMC1 AOS
|
>=3.9.4 |
Network Management Card Family - Network Management Card 2 (NMC2), Network Management Card 3 (NMC3)
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9630/AP9630CH/AP9630J NMC2 AOS V6.9.4 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9630/AP9630CH/AP9630J
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9631/AP9631CH/AP9631J NMC2 AOS V6.9.4 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9631/AP9631CH/AP9631J
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9635/AP9635CH NMC2 AOS V6.9.4 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9635/AP9635CH
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9640/AP9640J NMC3 AOS V1.3.0.6 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9640/AP9640J
|
<=NMC3 AOS 1.3.0.6 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9641/AP9641J NMC3 AOS V1.3.0.6 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9641/AP9641J
|
<=NMC3 AOS 1.3.0.6 |
Vendor Fix
fix
|
|
|
Schneider Electric Battery Management Embedded NMC2 - Battery Manager - AP9922 NMC2 AOS V6.9.4 and earlier
Schneider Electric / Battery Management Embedded NMC2 - Battery Manager - AP9922
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: InfraStruXure 150kVA PDU with 84 poles (X84P) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: InfraStruXure 150kVA PDU with 84 poles (X84P)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: InfraStruXure 40 and 60 kVA PDU (XPDU) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: InfraStruXure 40 and 60 kVA PDU (XPDU)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: Modular 150 and 175 kVA PDU NAM (XRDP) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: Modular 150 and 175 kVA PDU NAM (XRDP)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: 400 and 500 kVA PMM (PMM) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: 400 and 500 kVA PMM (PMM)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: Modular PDU/RPP (XRDP2G) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: Modular PDU/RPP (XRDP2G)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC Rack Power Distribution Units (rPDU) Embedded NMC2: 2G Metered/Switched Rack PDUs with embedded NMC2 NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC Rack Power Distribution Units (rPDU) Embedded NMC2: 2G Metered/Switched Rack PDUs with embedded NMC2
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC Rack Power Distribution Units (rPDU) Embedded NMC2: AP84XX, AP86XX, AP88XX, AP89XX NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC Rack Power Distribution Units (rPDU) Embedded NMC2: AP84XX, AP86XX, AP88XX, AP89XX
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Rack Automatic Transfer Switches (ATS) Embedded NMC2: - Rack Automatic Transfer Switches - AP44XX NMC2 AOS V6.8.8 and earlier
Schneider Electric / Rack Automatic Transfer Switches (ATS) Embedded NMC2: - Rack Automatic Transfer Switches - AP44XX
|
<=NMC2 AOS 6.8.8 |
Vendor Fix
fix
|
|
|
Schneider Electric Environmental Monitoring Environmental Monitoring Unit with embedded NMC2 - NetBotz NBRK0250 NMC2 AOS V6.8.8 and earlier
Schneider Electric / Environmental Monitoring Environmental Monitoring Unit with embedded NMC2 - NetBotz NBRK0250
|
<=NMC2 AOS 6.8.8 |
Vendor Fix
fix
|
|
|
Schneider Electric Cooling Products Embedded NMC2 & Touchscreen Displays: InRow NMC2 AOS V6.9.4 and earlier
Schneider Electric / Cooling Products Embedded NMC2 & Touchscreen Displays: InRow
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Cooling Products Embedded NMC2 & Touchscreen Displays: Uniflair Cooling Devices NMC2 AOS V6.9.4 and earlier
Schneider Electric / Cooling Products Embedded NMC2 & Touchscreen Displays: Uniflair Cooling Devices
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Schneider Electric NMC2 AOS V6.9.2/6.9.4
Schneider Electric / NMC2 AOS
|
6.9.2|6.9.4 | ||
|
Schneider Electric NMC2 AOS V6.9.6 or later
Schneider Electric / NMC2 AOS
|
>=6.9.6 | ||
|
Schneider Electric NMC2 AOS V3.9.4 or later
Schneider Electric / NMC2 AOS
|
>=3.9.4 | ||
|
Schneider Electric NMC3 AOS V1.3.3.1
Schneider Electric / NMC3 AOS
|
1.3.3.1 | ||
|
Schneider Electric NMC3 AOS V1.4 or later
Schneider Electric / NMC3 AOS
|
>=1.4 |
Network Management Card Family - Network Management Card 1 (NMC1), Network Management Card 2 (NMC2), Network Management Card 3 (NMC3)
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9630/AP9630CH/AP9630J NMC2 AOS V6.9.4 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9630/AP9630CH/AP9630J
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9631/AP9631CH/AP9631J NMC2 AOS V6.9.4 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9631/AP9631CH/AP9631J
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9635/AP9635CH NMC2 AOS V6.9.4 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9635/AP9635CH
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9617 (discontinued in Nov 2011) Smart-UPS NMC1 v3.9.2 and earlier
Schneider Electric / Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9617 (discontinued in Nov 2011)
|
<=Smart-UPS NMC1 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9619 (discontinued in Sep 2012) Smart-UPS NMC1 v3.9.2 and earlier
Schneider Electric / Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9619 (discontinued in Sep 2012)
|
<=Smart-UPS NMC1 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9618 (discontinued in Jan 2017) Smart-UPS NMC1 v3.9.2 and earlier
Schneider Electric / Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9618 (discontinued in Jan 2017)
|
<=Smart-UPS NMC1 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptable Power Supply (UPS) using NMC1 - SUMX Smart-UPS models embedded with NMC1 Smart-UPS NMC1 v3.9.2 and earlier
Schneider Electric / Uninterruptable Power Supply (UPS) using NMC1 - SUMX Smart-UPS models embedded with NMC1
|
<=Smart-UPS NMC1 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9640/AP9640J NMC3 AOS V1.3.0.6 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9640/AP9640J
|
<=NMC3 AOS 1.3.0.6 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9641/AP9641J NMC3 AOS V1.3.0.6 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9641/AP9641J
|
<=NMC3 AOS 1.3.0.6 |
Vendor Fix
fix
|
|
|
Schneider Electric Battery Management Embedded NMC2 - Battery Manager - AP9922 NMC2 AOS V6.9.4 and earlier
Schneider Electric / Battery Management Embedded NMC2 - Battery Manager - AP9922
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: InfraStruXure 150kVA PDU with 84 poles (X84P) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: InfraStruXure 150kVA PDU with 84 poles (X84P)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: InfraStruXure 40 and 60 kVA PDU (XPDU) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: InfraStruXure 40 and 60 kVA PDU (XPDU)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: Modular 150 and 175 kVA PDU NAM (XRDP) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: Modular 150 and 175 kVA PDU NAM (XRDP)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: 400 and 500 kVA PMM (PMM) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: 400 and 500 kVA PMM (PMM)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: Modular PDU/RPP (XRDP2G) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: Modular PDU/RPP (XRDP2G)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC Rack Power Distribution Units (rPDU) Embedded NMC2: 2G Metered/Switched Rack PDUs with embedded NMC2 NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC Rack Power Distribution Units (rPDU) Embedded NMC2: 2G Metered/Switched Rack PDUs with embedded NMC2
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC Rack Power Distribution Units (rPDU) Embedded NMC2: AP84XX, AP86XX, AP88XX, AP89XX NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC Rack Power Distribution Units (rPDU) Embedded NMC2: AP84XX, AP86XX, AP88XX, AP89XX
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC Rack Power Distribution Units (rPDU) Embedded NMC1: Metered/Switched Rack PDUs with embedded NMC1 - AP78XX, AP79XX NMC1 AOS V3.9.2 and earlier
Schneider Electric / APC Rack Power Distribution Units (rPDU) Embedded NMC1: Metered/Switched Rack PDUs with embedded NMC1 - AP78XX, AP79XX
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric Rack Automatic Transfer Switches (ATS) Embedded NMC2: - Rack Automatic Transfer Switches - AP44XX NMC2 AOS V6.8.8 and earlier
Schneider Electric / Rack Automatic Transfer Switches (ATS) Embedded NMC2: - Rack Automatic Transfer Switches - AP44XX
|
<=NMC2 AOS 6.8.8 |
Vendor Fix
fix
|
|
|
Schneider Electric Rack Automatic Transfer Switches (ATS) Embedded NMC1: - Rack Automatic Transfer Switches - AP77XX NMC1 AOS v3.9.2 and earlier
Schneider Electric / Rack Automatic Transfer Switches (ATS) Embedded NMC1: - Rack Automatic Transfer Switches - AP77XX
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric Environmental Monitoring Environmental Monitoring Unit with embedded NMC2 - NetBotz NBRK0250 NMC2 AOS V6.8.8 and earlier
Schneider Electric / Environmental Monitoring Environmental Monitoring Unit with embedded NMC2 - NetBotz NBRK0250
|
<=NMC2 AOS 6.8.8 |
Vendor Fix
fix
|
|
|
Schneider Electric Cooling Products Embedded NMC2 & Touchscreen Displays: InRow NMC2 AOS V6.9.4 and earlier
Schneider Electric / Cooling Products Embedded NMC2 & Touchscreen Displays: InRow
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Cooling Products Embedded NMC2 & Touchscreen Displays: Uniflair Cooling Devices NMC2 AOS V6.9.4 and earlier
Schneider Electric / Cooling Products Embedded NMC2 & Touchscreen Displays: Uniflair Cooling Devices
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Cooling Products Embedded NMC1 - Rack Air Removal Unit SX (RARU) NMC1 AOS V3.9.2 and earlier
Schneider Electric / Cooling Products Embedded NMC1 - Rack Air Removal Unit SX (RARU)
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
|
|
|
Schneider Electric NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9617 (discontinued in Nov 2011) NMC1 AOS V3.9.2 and earlier
Schneider Electric / NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9617 (discontinued in Nov 2011)
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9619 (discontinued in Sep 2012) NMC1 AOS V3.9.2 and earlier
Schneider Electric / NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9619 (discontinued in Sep 2012)
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9618 (discontinued in Jan 2017) NMC1 AOS V3.9.2 and earlier
Schneider Electric / NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9618 (discontinued in Jan 2017)
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - Audio/Video Network Management Enabled products S20BLK, G50NETB2, G50NETB-20A2 NMC1 AOS V3.9.2 and earlier
Schneider Electric / NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - Audio/Video Network Management Enabled products S20BLK, G50NETB2, G50NETB-20A2
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric Battery Management - Battery Management System - AP9920B1 NMC1 AOS V3.9.2 and earlier
Schneider Electric / Battery Management - Battery Management System - AP9920B1
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric Battery Management - Battery Management System - AP9921X NMC1 AOS V3.9.2 and earlier
Schneider Electric / Battery Management - Battery Management System - AP9921X
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric Environmental Monitoring AP9319 AP9320 AP9340 AP9360 AP9361 NetBotz NBRK0200 NMC1 AOS V3.9.2 and earlier
Schneider Electric / Environmental Monitoring AP9319 AP9320 AP9340 AP9360 AP9361 NetBotz NBRK0200
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric Cooling Products - NetworkAir NMC1 AOS V3.9.2 and earlier
Schneider Electric / Cooling Products - NetworkAir
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
|
|
Schneider Electric Cooling Products - InRow NMC1 AOS V3.9.2 and earlier
Schneider Electric / Cooling Products - InRow
|
<=NMC1 AOS 3.9.2 |
Vendor Fix
fix
Mitigation
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Schneider Electric NMC2 AOS V6.9.2/6.9.4
Schneider Electric / NMC2 AOS
|
6.9.2|6.9.4 | ||
|
Schneider Electric NMC2 AOS V6.9.6 or later
Schneider Electric / NMC2 AOS
|
>=6.9.6 | ||
|
Schneider Electric NMC2 AOS V3.9.4 or later
Schneider Electric / NMC2 AOS
|
>=3.9.4 | ||
|
Schneider Electric NMC3 AOS V1.4 or later
Schneider Electric / NMC3 AOS
|
>=1.4 | ||
|
Schneider Electric NMC1 AOS V3.9.4 or later
Schneider Electric / NMC1 AOS
|
>=3.9.4 |
Network Management Card Family - Network Management Card 2 (NMC2), Network Management Card 3 (NMC3)
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9630/AP9630CH/AP9630J NMC2 AOS V6.9.4 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9630/AP9630CH/AP9630J
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9631/AP9631CH/AP9631J NMC2 AOS V6.9.4 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9631/AP9631CH/AP9631J
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9635/AP9635CH NMC2 AOS V6.9.4 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9635/AP9635CH
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9640/AP9640J NMC3 AOS V1.3.0.6 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9640/AP9640J
|
<=NMC3 AOS 1.3.0.6 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9641/AP9641J NMC3 AOS V1.3.0.6 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9641/AP9641J
|
<=NMC3 AOS 1.3.0.6 |
Vendor Fix
fix
|
|
|
Schneider Electric Battery Management Embedded NMC2 - Battery Manager - AP9922 NMC2 AOS V6.9.4 and earlier
Schneider Electric / Battery Management Embedded NMC2 - Battery Manager - AP9922
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: InfraStruXure 150kVA PDU with 84 poles (X84P) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: InfraStruXure 150kVA PDU with 84 poles (X84P)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: InfraStruXure 40 and 60 kVA PDU (XPDU) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: InfraStruXure 40 and 60 kVA PDU (XPDU)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: Modular 150 and 175 kVA PDU NAM (XRDP) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: Modular 150 and 175 kVA PDU NAM (XRDP)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: 400 and 500 kVA PMM (PMM) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: 400 and 500 kVA PMM (PMM)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: Modular PDU/RPP (XRDP2G) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: Modular PDU/RPP (XRDP2G)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC Rack Power Distribution Units (rPDU) Embedded NMC2: 2G Metered/Switched Rack PDUs with embedded NMC2 NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC Rack Power Distribution Units (rPDU) Embedded NMC2: 2G Metered/Switched Rack PDUs with embedded NMC2
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC Rack Power Distribution Units (rPDU) Embedded NMC2: AP84XX, AP86XX, AP88XX, AP89XX NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC Rack Power Distribution Units (rPDU) Embedded NMC2: AP84XX, AP86XX, AP88XX, AP89XX
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Rack Automatic Transfer Switches (ATS) Embedded NMC2: - Rack Automatic Transfer Switches - AP44XX NMC2 AOS V6.8.8 and earlier
Schneider Electric / Rack Automatic Transfer Switches (ATS) Embedded NMC2: - Rack Automatic Transfer Switches - AP44XX
|
<=NMC2 AOS 6.8.8 |
Vendor Fix
fix
|
|
|
Schneider Electric Environmental Monitoring Environmental Monitoring Unit with embedded NMC2 - NetBotz NBRK0250 NMC2 AOS V6.8.8 and earlier
Schneider Electric / Environmental Monitoring Environmental Monitoring Unit with embedded NMC2 - NetBotz NBRK0250
|
<=NMC2 AOS 6.8.8 |
Vendor Fix
fix
|
|
|
Schneider Electric Cooling Products Embedded NMC2 & Touchscreen Displays: InRow NMC2 AOS V6.9.4 and earlier
Schneider Electric / Cooling Products Embedded NMC2 & Touchscreen Displays: InRow
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Cooling Products Embedded NMC2 & Touchscreen Displays: Uniflair Cooling Devices NMC2 AOS V6.9.4 and earlier
Schneider Electric / Cooling Products Embedded NMC2 & Touchscreen Displays: Uniflair Cooling Devices
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Schneider Electric NMC2 AOS V6.9.2/6.9.4
Schneider Electric / NMC2 AOS
|
6.9.2|6.9.4 | ||
|
Schneider Electric NMC2 AOS V6.9.6 or later
Schneider Electric / NMC2 AOS
|
>=6.9.6 | ||
|
Schneider Electric NMC2 AOS V3.9.4 or later
Schneider Electric / NMC2 AOS
|
>=3.9.4 | ||
|
Schneider Electric NMC3 AOS V1.3.3.1
Schneider Electric / NMC3 AOS
|
1.3.3.1 | ||
|
Schneider Electric NMC3 AOS V1.4 or later
Schneider Electric / NMC3 AOS
|
>=1.4 |
Network Management Card Family - Network Management Card 2 (NMC2), Network Management Card 3 (NMC3)
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9630/AP9630CH/AP9630J NMC2 AOS V6.9.4 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9630/AP9630CH/AP9630J
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9631/AP9631CH/AP9631J NMC2 AOS V6.9.4 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9631/AP9631CH/AP9631J
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9635/AP9635CH NMC2 AOS V6.9.4 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9635/AP9635CH
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9640/AP9640J NMC3 AOS V1.3.0.6 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9640/AP9640J
|
<=NMC3 AOS 1.3.0.6 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9641/AP9641J NMC3 AOS V1.3.0.6 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9641/AP9641J
|
<=NMC3 AOS 1.3.0.6 |
Vendor Fix
fix
|
|
|
Schneider Electric Battery Management Embedded NMC2 - Battery Manager - AP9922 NMC2 AOS V6.9.4 and earlier
Schneider Electric / Battery Management Embedded NMC2 - Battery Manager - AP9922
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: InfraStruXure 150kVA PDU with 84 poles (X84P) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: InfraStruXure 150kVA PDU with 84 poles (X84P)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: InfraStruXure 40 and 60 kVA PDU (XPDU) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: InfraStruXure 40 and 60 kVA PDU (XPDU)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: Modular 150 and 175 kVA PDU NAM (XRDP) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: Modular 150 and 175 kVA PDU NAM (XRDP)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: 400 and 500 kVA PMM (PMM) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: 400 and 500 kVA PMM (PMM)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: Modular PDU/RPP (XRDP2G) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: Modular PDU/RPP (XRDP2G)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC Rack Power Distribution Units (rPDU) Embedded NMC2: 2G Metered/Switched Rack PDUs with embedded NMC2 NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC Rack Power Distribution Units (rPDU) Embedded NMC2: 2G Metered/Switched Rack PDUs with embedded NMC2
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC Rack Power Distribution Units (rPDU) Embedded NMC2: AP84XX, AP86XX, AP88XX, AP89XX NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC Rack Power Distribution Units (rPDU) Embedded NMC2: AP84XX, AP86XX, AP88XX, AP89XX
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Rack Automatic Transfer Switches (ATS) Embedded NMC2: - Rack Automatic Transfer Switches - AP44XX NMC2 AOS V6.8.8 and earlier
Schneider Electric / Rack Automatic Transfer Switches (ATS) Embedded NMC2: - Rack Automatic Transfer Switches - AP44XX
|
<=NMC2 AOS 6.8.8 |
Vendor Fix
fix
|
|
|
Schneider Electric Environmental Monitoring Environmental Monitoring Unit with embedded NMC2 - NetBotz NBRK0250 NMC2 AOS V6.8.8 and earlier
Schneider Electric / Environmental Monitoring Environmental Monitoring Unit with embedded NMC2 - NetBotz NBRK0250
|
<=NMC2 AOS 6.8.8 |
Vendor Fix
fix
|
|
|
Schneider Electric Cooling Products Embedded NMC2 & Touchscreen Displays: InRow NMC2 AOS V6.9.4 and earlier
Schneider Electric / Cooling Products Embedded NMC2 & Touchscreen Displays: InRow
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Cooling Products Embedded NMC2 & Touchscreen Displays: Uniflair Cooling Devices NMC2 AOS V6.9.4 and earlier
Schneider Electric / Cooling Products Embedded NMC2 & Touchscreen Displays: Uniflair Cooling Devices
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Schneider Electric NMC2 AOS V6.9.2/6.9.4
Schneider Electric / NMC2 AOS
|
6.9.2|6.9.4 | ||
|
Schneider Electric NMC2 AOS V6.9.6 or later
Schneider Electric / NMC2 AOS
|
>=6.9.6 | ||
|
Schneider Electric NMC2 AOS V3.9.4 or later
Schneider Electric / NMC2 AOS
|
>=3.9.4 | ||
|
Schneider Electric NMC3 AOS V1.3.3.1
Schneider Electric / NMC3 AOS
|
1.3.3.1 | ||
|
Schneider Electric NMC3 AOS V1.4 or later
Schneider Electric / NMC3 AOS
|
>=1.4 |
Network Management Card Family - Network Management Card 2 (NMC2), Network Management Card 3 (NMC3)
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9630/AP9630CH/AP9630J NMC2 AOS V6.9.4 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9630/AP9630CH/AP9630J
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9631/AP9631CH/AP9631J NMC2 AOS V6.9.4 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9631/AP9631CH/AP9631J
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9635/AP9635CH NMC2 AOS V6.9.4 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9635/AP9635CH
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9640/AP9640J NMC3 AOS V1.3.0.6 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9640/AP9640J
|
<=NMC3 AOS 1.3.0.6 |
Vendor Fix
fix
|
|
|
Schneider Electric Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9641/AP9641J NMC3 AOS V1.3.0.6 and earlier
Schneider Electric / Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9641/AP9641J
|
<=NMC3 AOS 1.3.0.6 |
Vendor Fix
fix
|
|
|
Schneider Electric Battery Management Embedded NMC2 - Battery Manager - AP9922 NMC2 AOS V6.9.4 and earlier
Schneider Electric / Battery Management Embedded NMC2 - Battery Manager - AP9922
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: InfraStruXure 150kVA PDU with 84 poles (X84P) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: InfraStruXure 150kVA PDU with 84 poles (X84P)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: InfraStruXure 40 and 60 kVA PDU (XPDU) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: InfraStruXure 40 and 60 kVA PDU (XPDU)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: Modular 150 and 175 kVA PDU NAM (XRDP) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: Modular 150 and 175 kVA PDU NAM (XRDP)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: 400 and 500 kVA PMM (PMM) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: 400 and 500 kVA PMM (PMM)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC 3-Phase Power Distribution Products: Modular PDU/RPP (XRDP2G) NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC 3-Phase Power Distribution Products: Modular PDU/RPP (XRDP2G)
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC Rack Power Distribution Units (rPDU) Embedded NMC2: 2G Metered/Switched Rack PDUs with embedded NMC2 NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC Rack Power Distribution Units (rPDU) Embedded NMC2: 2G Metered/Switched Rack PDUs with embedded NMC2
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric APC Rack Power Distribution Units (rPDU) Embedded NMC2: AP84XX, AP86XX, AP88XX, AP89XX NMC2 AOS V6.9.4 and earlier
Schneider Electric / APC Rack Power Distribution Units (rPDU) Embedded NMC2: AP84XX, AP86XX, AP88XX, AP89XX
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Rack Automatic Transfer Switches (ATS) Embedded NMC2: - Rack Automatic Transfer Switches - AP44XX NMC2 AOS V6.8.8 and earlier
Schneider Electric / Rack Automatic Transfer Switches (ATS) Embedded NMC2: - Rack Automatic Transfer Switches - AP44XX
|
<=NMC2 AOS 6.8.8 |
Vendor Fix
fix
|
|
|
Schneider Electric Environmental Monitoring Environmental Monitoring Unit with embedded NMC2 - NetBotz NBRK0250 NMC2 AOS V6.8.8 and earlier
Schneider Electric / Environmental Monitoring Environmental Monitoring Unit with embedded NMC2 - NetBotz NBRK0250
|
<=NMC2 AOS 6.8.8 |
Vendor Fix
fix
|
|
|
Schneider Electric Cooling Products Embedded NMC2 & Touchscreen Displays: InRow NMC2 AOS V6.9.4 and earlier
Schneider Electric / Cooling Products Embedded NMC2 & Touchscreen Displays: InRow
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
|
|
Schneider Electric Cooling Products Embedded NMC2 & Touchscreen Displays: Uniflair Cooling Devices NMC2 AOS V6.9.4 and earlier
Schneider Electric / Cooling Products Embedded NMC2 & Touchscreen Displays: Uniflair Cooling Devices
|
<=NMC2 AOS 6.9.4 |
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Schneider Electric NMC2 AOS V6.9.2/6.9.4
Schneider Electric / NMC2 AOS
|
6.9.2|6.9.4 | ||
|
Schneider Electric NMC2 AOS V6.9.6 or later
Schneider Electric / NMC2 AOS
|
>=6.9.6 | ||
|
Schneider Electric NMC2 AOS V3.9.4 or later
Schneider Electric / NMC2 AOS
|
>=3.9.4 | ||
|
Schneider Electric NMC3 AOS V1.3.3.1
Schneider Electric / NMC3 AOS
|
1.3.3.1 | ||
|
Schneider Electric NMC3 AOS V1.4 or later
Schneider Electric / NMC3 AOS
|
>=1.4 |
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "We strongly recommend the following industry cybersecurity best practices.\n\nhttps://www.se.com/us/en/download/document/7EN52-0390/\n* Locate control and safety system networks and remote devices behind firewalls and isolate them from the business network.\n* Install physical controls so no unauthorized personnel can access your industrial control and safety systems, components, peripheral equipment, and networks.\n* Place all controllers in locked cabinets and never leave them in the \u201cProgram\u201d mode.\n* Never connect programming software to any network other than the network intended for that device.\n* Scan all methods of mobile data exchange with the isolated network such as CDs, USB drives, etc. before use in the terminals or any node connected to these networks.\n* Never allow mobile devices that have connected to any other network besides the intended network to connect to the safety or control networks without proper sanitation.\n* Minimize network exposure for all control system devices and systems and ensure that they are not accessible from the Internet.\n* When remote access is required, use secure methods, such as Virtual Private Networks (VPNs). Recognize that VPNs may have vulnerabilities and should be updated to the most current version available. Also, understand that VPNs are only as secure as the connected devices.\nFor more information refer to the Schneider Electric Recommended Cybersecurity Best Practices document. \n",
"title": "General Security Recommendations"
},
{
"category": "general",
"text": "This document provides an overview of the identified vulnerability or vulnerabilities and actions required to mitigate. For more details and assistance on how to protect your installation, contact your local Schneider Electric representative or Schneider Electric Industrial Cybersecurity Services: https://www.se.com/ww/en/work/solutions/cybersecurity/. These organizations will be fully aware of this situation and can support you through the process.\nFor further information related to cybersecurity in Schneider Electric\u2019s products, visit the company\u2019s cybersecurity support portal page: https://www.se.com/ww/en/work/support/cybersecurity/overview.jsp",
"title": "For More Information"
},
{
"category": "legal_disclaimer",
"text": "THIS NOTIFICATION DOCUMENT, THE INFORMATION CONTAINED HEREIN, AND ANY MATERIALS LINKED FROM IT (COLLECTIVELY, THIS \u201cNOTIFICATION\u201d) ARE INTENDED TO HELP PROVIDE AN OVERVIEW OF THE IDENTIFIED SITUATION AND SUGGESTED MITIGATION ACTIONS, REMEDIATION, FIX, AND/OR GENERAL SECURITY RECOMMENDATIONS AND IS PROVIDED ON AN \u201cAS-IS\u201d BASIS WITHOUT WARRANTY OR GUARANTEE OF ANY KIND. SCHNEIDER ELECTRIC DISCLAIMS ALL WARRANTIES RELATING TO THIS NOTIFICATION, EITHER EXPRESS OR IMPLIED, INCLUDING WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. SCHNEIDER ELECTRIC MAKES NO WARRANTY THAT THE NOTIFICATION WILL RESOLVE THE IDENTIFIED SITUATION. IN NO EVENT SHALL SCHNEIDER ELECTRIC BE LIABLE FOR ANY DAMAGES OR LOSSES WHATSOEVER IN CONNECTION WITH THIS NOTIFICATION, INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF SCHNEIDER ELECTRIC HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. YOUR USE OF THIS NOTIFICATION IS AT YOUR OWN RISK, AND YOU ARE SOLELY LIABLE FOR ANY DAMAGES TO YOUR SYSTEMS OR ASSETS OR OTHER LOSSES THAT MAY RESULT FROM YOUR USE OF THIS NOTIFICATION. SCHNEIDER ELECTRIC RESERVES THE RIGHT TO UPDATE OR CHANGE THIS NOTIFICATION AT ANY TIME AND IN ITS SOLE DISCRETION",
"title": "LEGAL DISCLAIMER"
},
{
"category": "general",
"text": "At Schneider, we believe access to energy and digital is a basic human right. We empower all to do more with less, ensuring Life Is On everywhere, for everyone, at every moment.\n\nWe provide energy and automation digital solutions for efficiency and sustainability. We combine world-leading energy technologies, real-time automation, software and services into integrated solutions for Homes, Buildings, Data Centers, Infrastructure and Industries.\n\nWe are committed to unleash the infinite possibilities of an open, global, innovative community that is passionate with our Meaningful Purpose, Inclusive and Empowered values.\n\nwww.se.com ",
"title": "About Schneider Electric"
},
{
"category": "summary",
"text": "Schneider Electric became aware of multiple vulnerabilities affecting Treck Inc.\u0027s embedded TCP/IP \r\nstack, collectively known as Ripple20, which Treck publicly disclosed on June 16, 2020. Schneider \r\nElectric is also aware of a proof of concept published by JSOF that demonstrates how one of the \r\nTreck vulnerabilities, CVE-2020-11901, can be exploited to affect a Schneider Electric APC Smart\u0002UPS device using certain Network Management Card firmware versions. \r\nOn October 12, 2020, Schneider Electric received additional information and analysis from JSOF\r\nrelated to CVE-2020-11901\u2019s impact on APC by Schneider Electric Network Management Cards and \r\nNMC embedded devices. This new analysis indicates that the information we originally received was \r\nincomplete. Therefore our original remediations are only partially effective for CVE-2020-11901. We \r\nare expediting updated remediations, which will be made available as soon as possible. In the \r\nmeantime, customers should immediately apply the mitigations included in Remediation \u0026 Mitigations\r\nsection of this document.\r\nJune 2021 Update: Added remediations for Uninterruptible Power Supply (UPS), Rack Power \r\nDistribution Units (rPDU), Battery Management, Rack Automatic Transfer Switch (ATS), Rack Air \r\nRemoval Unit (RARU) using NMC1, as well as all other remaining NMC1 applications.",
"title": "Overview"
}
],
"publisher": {
"category": "vendor",
"contact_details": "cpcert@se.com",
"name": "Schneider Electric CPCERT",
"namespace": "https://www.se.com/ww/en/work/support/cybersecurity/security-notifications.jsp"
},
"references": [
{
"category": "self",
"summary": "APC by Schneider Electric Network Management Cards (NMC) and NMC Embedded Devices - SEVD-2020-174-01 PDF Version",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2020-174-01\u0026p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=SEVD-2020-174-01_APC_by_Schneider_Electric_Network_Management_Card_Security_Notification_V2.3.pdf"
},
{
"category": "self",
"summary": "APC by Schneider Electric Network Management Cards (NMC) and NMC Embedded Devices - SEVD-2020-174-01 CSAF Version",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2020-174-01\u0026p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=sevd-2020-174-01.json"
},
{
"category": "external",
"summary": "Recommended Cybersecurity Best Practices",
"url": "https://www.se.com/us/en/download/document/7EN52-0390/"
}
],
"title": "APC by Schneider Electric Network Management Cards (NMC) and NMC Embedded Devices",
"tracking": {
"current_release_date": "2021-06-30T00:00:00.000Z",
"generator": {
"date": "2021-06-30T00:00:00Z",
"engine": {
"name": "Schneider Electric CSAF Generator",
"version": "1.2"
}
},
"id": "SEVD-2020-174-01",
"initial_release_date": "2020-06-22T00:00:00.000Z",
"revision_history": [
{
"date": "2020-06-22T00:00:00.000Z",
"number": "1.0.0",
"summary": "Original Release"
},
{
"date": "2020-06-23T00:00:00.000Z",
"number": "1.1.0",
"summary": "Updated Affected Products \u0026 Details and Vulnerability Details \r\nsections formatting for clarity (pages 2-5) "
},
{
"date": "2020-08-05T00:00:00.000Z",
"number": "1.2.0",
"summary": "Updated remediation for \u201cUninterruptible Power Supply (UPS) using \r\nNMC2\u201d (page 2)"
},
{
"date": "2020-08-06T00:00:00.000Z",
"number": "1.3.0",
"summary": "Corrected affected version(s) and enhanced Remediation/Mitigation\r\nversion details for \u201cUninterruptible Power Supply (UPS) using NMC2\u201d \r\n(page 2)"
},
{
"date": "2020-09-01T00:00:00.000Z",
"number": "1.4.0",
"summary": "Added remediation for Cooling Products using NMC2 (page 2)"
},
{
"date": "2020-10-23T00:00:00.000Z",
"number": "2.0.0",
"summary": "Updated overview section, available remediations and affected \r\nproducts tables. New information regarding CVE-2020-11901. Added \r\nremediations for \u201cAPC 3-Phase Power Distribution Products\u201d, \u201cAPC Rack Power Distribution Units (PDU)\u201d, :Rack Automatic Transfer \r\nSwitches (ATS)\u201d, \u201cEnvironmental Monitoring\u201d (page 1-6)"
},
{
"date": "2020-12-18T00:00:00.000Z",
"number": "2.1.0",
"summary": "Added remediations for Uninterruptible Power Supply (UPS) using \r\nNMC2, APC 3-Phase Power Distribution Products using NMC2, APC \r\nRack Power Distribution Units (PDU) using NMC2, Rack Automatic \r\nTransfer Switches (ATS) using NMC2, Environmental Monitoring\r\nusing NMC2, Cooling Products using NMC2 (page 2-4) "
},
{
"date": "2021-01-12T00:00:00.000Z",
"number": "2.2.0",
"summary": "Added remediations for Uninterruptible Power Supply (UPS) using \r\nNMC3 (page 2)"
},
{
"date": "2021-06-30T00:00:00.000Z",
"number": "2.3.0",
"summary": "Added remediations for Uninterruptible Power Supply (UPS), Rack \r\nPower Distribution Units (rPDU), Battery Management, Rack \r\nAutomatic Transfer Switch (ATS), Rack Air Removal Unit (RARU) \r\nusing NMC1, as well as all other remaining NMC1 applications (page \r\n2, 4-6)"
}
],
"status": "final",
"version": "2.3.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=NMC2 AOS 6.9.4",
"product": {
"name": "Schneider Electric Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9630/AP9630CH/AP9630J NMC2 AOS V6.9.4 and earlier",
"product_id": "1"
}
}
],
"category": "product_name",
"name": "Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9630/AP9630CH/AP9630J"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=NMC2 AOS 6.9.4",
"product": {
"name": "Schneider Electric Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9631/AP9631CH/AP9631J NMC2 AOS V6.9.4 and earlier",
"product_id": "2"
}
}
],
"category": "product_name",
"name": "Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9631/AP9631CH/AP9631J"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=NMC2 AOS 6.9.4",
"product": {
"name": "Schneider Electric Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9635/AP9635CH NMC2 AOS V6.9.4 and earlier",
"product_id": "3"
}
}
],
"category": "product_name",
"name": "Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9635/AP9635CH"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=Smart-UPS NMC1 3.9.2",
"product": {
"name": "Schneider Electric Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9617 (discontinued in Nov 2011) Smart-UPS NMC1 v3.9.2 and earlier",
"product_id": "4"
}
}
],
"category": "product_name",
"name": "Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9617 (discontinued in Nov 2011) "
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=Smart-UPS NMC1 3.9.2",
"product": {
"name": "Schneider Electric Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9619 (discontinued in Sep 2012) Smart-UPS NMC1 v3.9.2 and earlier",
"product_id": "5"
}
}
],
"category": "product_name",
"name": "Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9619 (discontinued in Sep 2012)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=Smart-UPS NMC1 3.9.2",
"product": {
"name": "Schneider Electric Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9618 (discontinued in Jan 2017) Smart-UPS NMC1 v3.9.2 and earlier",
"product_id": "6"
}
}
],
"category": "product_name",
"name": "Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9618 (discontinued in Jan 2017)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=Smart-UPS NMC1 3.9.2",
"product": {
"name": "Schneider Electric Uninterruptable Power Supply (UPS) using NMC1 - SUMX Smart-UPS models embedded with NMC1 Smart-UPS NMC1 v3.9.2 and earlier",
"product_id": "7"
}
}
],
"category": "product_name",
"name": "Uninterruptable Power Supply (UPS) using NMC1 - SUMX Smart-UPS models embedded with NMC1"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=NMC3 AOS 1.3.0.6",
"product": {
"name": "Schneider Electric Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9640/AP9640J NMC3 AOS V1.3.0.6 and earlier",
"product_id": "8"
}
}
],
"category": "product_name",
"name": "Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9640/AP9640J"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=NMC3 AOS 1.3.0.6",
"product": {
"name": "Schneider Electric Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9641/AP9641J NMC3 AOS V1.3.0.6 and earlier",
"product_id": "9"
}
}
],
"category": "product_name",
"name": "Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9641/AP9641J"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=NMC2 AOS 6.9.4",
"product": {
"name": "Schneider Electric Battery Management Embedded NMC2 - Battery Manager - AP9922 NMC2 AOS V6.9.4 and earlier",
"product_id": "10"
}
}
],
"category": "product_name",
"name": "Battery Management Embedded NMC2 - Battery Manager - AP9922"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=NMC2 AOS 6.9.4",
"product": {
"name": "Schneider Electric APC 3-Phase Power Distribution Products: InfraStruXure 150kVA PDU with 84 poles (X84P) NMC2 AOS V6.9.4 and earlier",
"product_id": "11"
}
}
],
"category": "product_name",
"name": "APC 3-Phase Power Distribution Products: InfraStruXure 150kVA PDU with 84 poles (X84P)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=NMC2 AOS 6.9.4",
"product": {
"name": "Schneider Electric APC 3-Phase Power Distribution Products: InfraStruXure 40 and 60 kVA PDU (XPDU) NMC2 AOS V6.9.4 and earlier",
"product_id": "12"
}
}
],
"category": "product_name",
"name": "APC 3-Phase Power Distribution Products: InfraStruXure 40 and 60 kVA PDU (XPDU)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=NMC2 AOS 6.9.4",
"product": {
"name": "Schneider Electric APC 3-Phase Power Distribution Products: Modular 150 and 175 kVA PDU NAM (XRDP) NMC2 AOS V6.9.4 and earlier",
"product_id": "13"
}
}
],
"category": "product_name",
"name": "APC 3-Phase Power Distribution Products: Modular 150 and 175 kVA PDU NAM (XRDP)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=NMC2 AOS 6.9.4",
"product": {
"name": "Schneider Electric APC 3-Phase Power Distribution Products: 400 and 500 kVA PMM (PMM) NMC2 AOS V6.9.4 and earlier",
"product_id": "14"
}
}
],
"category": "product_name",
"name": "APC 3-Phase Power Distribution Products: 400 and 500 kVA PMM (PMM)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=NMC2 AOS 6.9.4",
"product": {
"name": "Schneider Electric APC 3-Phase Power Distribution Products: Modular PDU/RPP (XRDP2G) NMC2 AOS V6.9.4 and earlier",
"product_id": "15"
}
}
],
"category": "product_name",
"name": "APC 3-Phase Power Distribution Products: Modular PDU/RPP (XRDP2G)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=NMC2 AOS 6.9.4",
"product": {
"name": "Schneider Electric APC Rack Power Distribution Units (rPDU) Embedded NMC2: 2G Metered/Switched Rack PDUs with embedded NMC2 NMC2 AOS V6.9.4 and earlier",
"product_id": "16"
}
}
],
"category": "product_name",
"name": "APC Rack Power Distribution Units (rPDU) Embedded NMC2: 2G Metered/Switched Rack PDUs with embedded NMC2"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=NMC2 AOS 6.9.4",
"product": {
"name": "Schneider Electric APC Rack Power Distribution Units (rPDU) Embedded NMC2: AP84XX, AP86XX, AP88XX, AP89XX NMC2 AOS V6.9.4 and earlier",
"product_id": "17"
}
}
],
"category": "product_name",
"name": "APC Rack Power Distribution Units (rPDU) Embedded NMC2: AP84XX, AP86XX, AP88XX, AP89XX"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=NMC1 AOS 3.9.2",
"product": {
"name": "Schneider Electric APC Rack Power Distribution Units (rPDU) Embedded NMC1: Metered/Switched Rack PDUs with embedded NMC1 - AP78XX, AP79XX NMC1 AOS V3.9.2 and earlier",
"product_id": "18"
}
}
],
"category": "product_name",
"name": "APC Rack Power Distribution Units (rPDU) Embedded NMC1: Metered/Switched Rack PDUs with embedded NMC1 - AP78XX, AP79XX"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=NMC2 AOS 6.8.8",
"product": {
"name": "Schneider Electric Rack Automatic Transfer Switches (ATS) Embedded NMC2: - Rack Automatic Transfer Switches - AP44XX NMC2 AOS V6.8.8 and earlier",
"product_id": "19"
}
}
],
"category": "product_name",
"name": "Rack Automatic Transfer Switches (ATS) Embedded NMC2: - Rack Automatic Transfer Switches - AP44XX"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=NMC1 AOS 3.9.2",
"product": {
"name": "Schneider Electric Rack Automatic Transfer Switches (ATS) Embedded NMC1: - Rack Automatic Transfer Switches - AP77XX NMC1 AOS v3.9.2 and earlier",
"product_id": "20"
}
}
],
"category": "product_name",
"name": "Rack Automatic Transfer Switches (ATS) Embedded NMC1: - Rack Automatic Transfer Switches - AP77XX"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=NMC2 AOS 6.8.8",
"product": {
"name": "Schneider Electric Environmental Monitoring Environmental Monitoring Unit with embedded NMC2 - NetBotz NBRK0250 NMC2 AOS V6.8.8 and earlier",
"product_id": "21"
}
}
],
"category": "product_name",
"name": "Environmental Monitoring Environmental Monitoring Unit with embedded NMC2 - NetBotz NBRK0250"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=NMC2 AOS 6.9.4",
"product": {
"name": "Schneider Electric Cooling Products Embedded NMC2 \u0026 Touchscreen Displays: InRow NMC2 AOS V6.9.4 and earlier",
"product_id": "22"
}
}
],
"category": "product_name",
"name": "Cooling Products Embedded NMC2 \u0026 Touchscreen Displays: InRow"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=NMC2 AOS 6.9.4",
"product": {
"name": "Schneider Electric Cooling Products Embedded NMC2 \u0026 Touchscreen Displays: Uniflair Cooling Devices NMC2 AOS V6.9.4 and earlier",
"product_id": "23"
}
}
],
"category": "product_name",
"name": "Cooling Products Embedded NMC2 \u0026 Touchscreen Displays: Uniflair Cooling Devices"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=NMC1 AOS 3.9.2",
"product": {
"name": "Schneider Electric Cooling Products Embedded NMC1 - Rack Air Removal Unit SX (RARU) NMC1 AOS V3.9.2 and earlier",
"product_id": "24"
}
}
],
"category": "product_name",
"name": "Cooling Products Embedded NMC1 - Rack Air Removal Unit SX (RARU)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=NMC1 AOS 3.9.2",
"product": {
"name": "Schneider Electric NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9617 (discontinued in Nov 2011) NMC1 AOS V3.9.2 and earlier",
"product_id": "25"
}
}
],
"category": "product_name",
"name": "NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9617 (discontinued in Nov 2011)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=NMC1 AOS 3.9.2",
"product": {
"name": "Schneider Electric NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9619 (discontinued in Sep 2012) NMC1 AOS V3.9.2 and earlier",
"product_id": "26"
}
}
],
"category": "product_name",
"name": "NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9619 (discontinued in Sep 2012)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=NMC1 AOS 3.9.2",
"product": {
"name": "Schneider Electric NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9618 (discontinued in Jan 2017) NMC1 AOS V3.9.2 and earlier",
"product_id": "27"
}
}
],
"category": "product_name",
"name": "NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9618 (discontinued in Jan 2017)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=NMC1 AOS 3.9.2",
"product": {
"name": "Schneider Electric NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - Audio/Video Network Management Enabled products S20BLK, G50NETB2, G50NETB-20A2 NMC1 AOS V3.9.2 and earlier",
"product_id": "28"
}
}
],
"category": "product_name",
"name": "NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - Audio/Video Network Management Enabled products S20BLK, G50NETB2, G50NETB-20A2"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=NMC1 AOS 3.9.2",
"product": {
"name": "Schneider Electric Battery Management - Battery Management System - AP9920B1 NMC1 AOS V3.9.2 and earlier",
"product_id": "29"
}
}
],
"category": "product_name",
"name": "Battery Management - Battery Management System - AP9920B1"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=NMC1 AOS 3.9.2",
"product": {
"name": "Schneider Electric Battery Management - Battery Management System - AP9921X NMC1 AOS V3.9.2 and earlier",
"product_id": "30"
}
}
],
"category": "product_name",
"name": "Battery Management - Battery Management System - AP9921X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=NMC1 AOS 3.9.2",
"product": {
"name": "Schneider Electric Environmental Monitoring AP9319 AP9320 AP9340 AP9360 AP9361 NetBotz NBRK0200 NMC1 AOS V3.9.2 and earlier",
"product_id": "31"
}
}
],
"category": "product_name",
"name": "Environmental Monitoring AP9319 AP9320 AP9340 AP9360 AP9361 NetBotz NBRK0200"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=NMC1 AOS 3.9.2",
"product": {
"name": "Schneider Electric Cooling Products - NetworkAir NMC1 AOS V3.9.2 and earlier",
"product_id": "32"
}
}
],
"category": "product_name",
"name": "Cooling Products - NetworkAir"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=NMC1 AOS 3.9.2",
"product": {
"name": "Schneider Electric Cooling Products - InRow NMC1 AOS V3.9.2 and earlier",
"product_id": "33"
}
}
],
"category": "product_name",
"name": "Cooling Products - InRow"
},
{
"branches": [
{
"category": "product_version_range",
"name": "6.9.2|6.9.4",
"product": {
"name": "Schneider Electric NMC2 AOS V6.9.2/6.9.4",
"product_id": "34"
}
}
],
"category": "product_name",
"name": "NMC2 AOS"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=6.9.6",
"product": {
"name": "Schneider Electric NMC2 AOS V6.9.6 or later",
"product_id": "35"
}
}
],
"category": "product_name",
"name": "NMC2 AOS"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=3.9.4",
"product": {
"name": "Schneider Electric NMC2 AOS V3.9.4 or later",
"product_id": "36"
}
}
],
"category": "product_name",
"name": "NMC2 AOS"
},
{
"branches": [
{
"category": "product_version",
"name": "1.3.3.1",
"product": {
"name": "Schneider Electric NMC3 AOS V1.3.3.1",
"product_id": "37"
}
}
],
"category": "product_name",
"name": "NMC3 AOS "
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=1.4",
"product": {
"name": "Schneider Electric NMC3 AOS V1.4 or later",
"product_id": "38"
}
}
],
"category": "product_name",
"name": "NMC3 AOS "
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=3.9.4",
"product": {
"name": "Schneider Electric NMC1 AOS V3.9.4 or later",
"product_id": "39"
}
}
],
"category": "product_name",
"name": "NMC1 AOS"
}
],
"category": "vendor",
"name": "Schneider Electric"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-11901",
"notes": [
{
"category": "description",
"text": "Network Management Card Family - Network Management Card 1 (NMC1), Network Management Card 2 (NMC2), Network Management Card 3 (NMC3)",
"title": "CVE Description"
}
],
"product_status": {
"fixed": [
"35",
"36",
"38",
"39"
],
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platforms. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOS V6.9.6 or \r\nlater. \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"1",
"2",
"3"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for the SUMX application \r\nrunning on the NMC1 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOS V3.9.4 or \r\nlater. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"4",
"5",
"6",
"7"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC3 platforms. \r\nCustomers are urged to upgrade to \r\napplications using NMC3 AOS V1.4 or \r\nlater.\r\nNote: AOS V1.3.3.1 addressed 14 of \r\nthe 15 CVEs. NMC3 AOS V1.4 \r\naddresses CVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"8",
"9"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"10"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"11",
"12",
"13",
"14",
"15"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"16",
"17"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC1 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC1 AOSV3.9.4 or \r\nlater\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"18"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC1 and NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOSV6.9.6 or \r\nlater or NMC1 AOSv3.9.4 or later\r\n \r\nNote: NMC2 AOS V6.9.2/6.9.4 \r\naddressed 14 of the 15 CVEs. AOS \r\nV6.9.6 addresses CVE-2020-11901.\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"19",
"20"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"21"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"22",
"23"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for RARU NMC1 \r\napplication \r\nCustomers are urged to upgrade to \r\napplications using NMC1 AOSV3.9.4 or \r\nlater\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"24"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "These are End of Commercialization \r\noffers.\r\nTo reduce risk of exploitation, apply \r\nthe mitigations detailed in the \r\nRecommended Mitigations section.\r\nContact your local support team for \r\nfurther assistance in upgrading to \r\nNMC2 or NMC3 platforms. ",
"product_ids": [
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/support/contact-us/"
},
{
"category": "mitigation",
"details": "Schneider Electric is implementing remediations which will be made available as soon as possible. In \r\nthe meantime, we recommend that our customers protect their installations from the cyber risks \r\nassociated with the Treck vulnerabilities by immediately taking these mitigating actions: \r\nFor devices on a local network: \r\n Network Partitioning: Locate devices behind firewalls capable of deep packet inspection with \r\nrulesets limiting access with only approved protocols and functions and to only those devices \r\nand endpoints requiring access. \r\n\u2022 Anomalous IP traffic: Block and detect anomalous IP traffic and malformed packets. Refer to \r\nthe Solution section of the CERT-Coordination Center Vulnerability Note VU#257161 https://kb.cert.org/vuls/id/257161 for \r\ndetails.\r\n\u2022 Disable DHCP on the NMC and configure it to use a static IP address.\r\n\u2022 To avoid the use of DNS, set DNS servers to 0.0.0.0 and utilize static IP addresses for all \r\nservers the NMC will connect. \r\n\u2022 If DNS must be used then normalize DNS through a secure recursive server or application \r\nlayer firewall\r\n\u2022 Enable only secure remote access methods. Disable any insecure protocols. \r\nFor devices that must communicate via the Internet: \r\n\u2022 Minimize network exposure for embedded and critical devices, keeping exposure to the \r\nminimum necessary, and ensuring that devices are not accessible from the Internet unless \r\nabsolutely essential.\r\n\u2022 Ensure communications to devices are via the EcoStruxure IT Gateway. The EcoStruxure IT \r\nplatform https://ecostruxureit.com/what-is-ecostruxure-it/ is security hardened with a mandatory two-factor authentication and high encryption \r\nstandards. Device data is securely transported to the EcoStruxure IT platform using the \r\nEcoStruxure IT Gateway, which uses an outbound connection to minimize risk to your \r\nenvironment.\r\nIf network access is not required: \r\n\u2022 Remove the Ethernet cable from the SmartSlot NMC, or the embedded NMC Ethernet port if \r\nan embedded NMC is present. \r\nAdditional mitigations: \r\n\u2022 Access Controls: Install physical and logical controls, so that no unauthorized personnel or \r\ndevice can access your systems, components, peripheral equipment, and networks. ",
"product_ids": [
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33"
],
"restart_required": {
"category": "none"
},
"url": "https://kb.cert.org/vuls/id/257161"
}
],
"title": "CVE-2020-11901"
},
{
"cve": "CVE-2020-11902",
"notes": [
{
"category": "description",
"text": "Network Management Card Family - Network Management Card 2 (NMC2), Network Management Card 3 (NMC3)",
"title": "CVE Description"
}
],
"product_status": {
"fixed": [
"34",
"35",
"36",
"37",
"38"
],
"known_affected": [
"1",
"2",
"3",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"19",
"21",
"22",
"23"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platforms. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOS V6.9.6 or \r\nlater. \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"1",
"2",
"3"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC3 platforms. \r\nCustomers are urged to upgrade to \r\napplications using NMC3 AOS V1.4 or \r\nlater.\r\nNote: AOS V1.3.3.1 addressed 14 of \r\nthe 15 CVEs. NMC3 AOS V1.4 \r\naddresses CVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"8",
"9"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"10"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"11",
"12",
"13",
"14",
"15"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"16",
"17"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC1 and NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOSV6.9.6 or \r\nlater or NMC1 AOSv3.9.4 or later\r\n \r\nNote: NMC2 AOS V6.9.2/6.9.4 \r\naddressed 14 of the 15 CVEs. AOS \r\nV6.9.6 addresses CVE-2020-11901.\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"19"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"21"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"22",
"23"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
}
],
"title": "CVE-2020-11902"
},
{
"cve": "CVE-2020-11903",
"notes": [
{
"category": "description",
"text": "Network Management Card Family - Network Management Card 1 (NMC1)",
"title": "CVE Description"
}
],
"product_status": {
"fixed": [
"39"
],
"known_affected": [
"4",
"5",
"6",
"7",
"18",
"20",
"24",
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for the SUMX application \r\nrunning on the NMC1 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOS V3.9.4 or \r\nlater. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"4",
"5",
"6",
"7"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC1 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC1 AOSV3.9.4 or \r\nlater\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"18"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC1 and NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOSV6.9.6 or \r\nlater or NMC1 AOSv3.9.4 or later\r\n \r\nNote: NMC2 AOS V6.9.2/6.9.4 \r\naddressed 14 of the 15 CVEs. AOS \r\nV6.9.6 addresses CVE-2020-11901.\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"20"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for RARU NMC1 \r\napplication \r\nCustomers are urged to upgrade to \r\napplications using NMC1 AOSV3.9.4 or \r\nlater\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"24"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "These are End of Commercialization \r\noffers.\r\nTo reduce risk of exploitation, apply \r\nthe mitigations detailed in the \r\nRecommended Mitigations section.\r\nContact your local support team for \r\nfurther assistance in upgrading to \r\nNMC2 or NMC3 platforms. ",
"product_ids": [
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/support/contact-us/"
},
{
"category": "mitigation",
"details": "Schneider Electric is implementing remediations which will be made available as soon as possible. In \r\nthe meantime, we recommend that our customers protect their installations from the cyber risks \r\nassociated with the Treck vulnerabilities by immediately taking these mitigating actions: \r\nFor devices on a local network: \r\n Network Partitioning: Locate devices behind firewalls capable of deep packet inspection with \r\nrulesets limiting access with only approved protocols and functions and to only those devices \r\nand endpoints requiring access. \r\n\u2022 Anomalous IP traffic: Block and detect anomalous IP traffic and malformed packets. Refer to \r\nthe Solution section of the CERT-Coordination Center Vulnerability Note VU#257161 https://kb.cert.org/vuls/id/257161 for \r\ndetails.\r\n\u2022 Disable DHCP on the NMC and configure it to use a static IP address.\r\n\u2022 To avoid the use of DNS, set DNS servers to 0.0.0.0 and utilize static IP addresses for all \r\nservers the NMC will connect. \r\n\u2022 If DNS must be used then normalize DNS through a secure recursive server or application \r\nlayer firewall\r\n\u2022 Enable only secure remote access methods. Disable any insecure protocols. \r\nFor devices that must communicate via the Internet: \r\n\u2022 Minimize network exposure for embedded and critical devices, keeping exposure to the \r\nminimum necessary, and ensuring that devices are not accessible from the Internet unless \r\nabsolutely essential.\r\n\u2022 Ensure communications to devices are via the EcoStruxure IT Gateway. The EcoStruxure IT \r\nplatform https://ecostruxureit.com/what-is-ecostruxure-it/ is security hardened with a mandatory two-factor authentication and high encryption \r\nstandards. Device data is securely transported to the EcoStruxure IT platform using the \r\nEcoStruxure IT Gateway, which uses an outbound connection to minimize risk to your \r\nenvironment.\r\nIf network access is not required: \r\n\u2022 Remove the Ethernet cable from the SmartSlot NMC, or the embedded NMC Ethernet port if \r\nan embedded NMC is present. \r\nAdditional mitigations: \r\n\u2022 Access Controls: Install physical and logical controls, so that no unauthorized personnel or \r\ndevice can access your systems, components, peripheral equipment, and networks. ",
"product_ids": [
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33"
],
"restart_required": {
"category": "none"
},
"url": "https://kb.cert.org/vuls/id/257161"
}
],
"title": "CVE-2020-11903"
},
{
"cve": "CVE-2020-11904",
"notes": [
{
"category": "description",
"text": "Network Management Card Family - Network Management Card 1 (NMC1), Network Management Card 2 (NMC2), Network Management Card 3 (NMC3)",
"title": "CVE Description"
}
],
"product_status": {
"fixed": [
"34",
"35",
"36",
"38",
"39"
],
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platforms. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOS V6.9.6 or \r\nlater. \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"1",
"2",
"3"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for the SUMX application \r\nrunning on the NMC1 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOS V3.9.4 or \r\nlater. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"4",
"5",
"6",
"7"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC3 platforms. \r\nCustomers are urged to upgrade to \r\napplications using NMC3 AOS V1.4 or \r\nlater.\r\nNote: AOS V1.3.3.1 addressed 14 of \r\nthe 15 CVEs. NMC3 AOS V1.4 \r\naddresses CVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"8",
"9"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"10"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"11",
"12",
"13",
"14",
"15"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"16",
"17"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC1 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC1 AOSV3.9.4 or \r\nlater\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"18"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC1 and NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOSV6.9.6 or \r\nlater or NMC1 AOSv3.9.4 or later\r\n \r\nNote: NMC2 AOS V6.9.2/6.9.4 \r\naddressed 14 of the 15 CVEs. AOS \r\nV6.9.6 addresses CVE-2020-11901.\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"19",
"20"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"21"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"22",
"23"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for RARU NMC1 \r\napplication \r\nCustomers are urged to upgrade to \r\napplications using NMC1 AOSV3.9.4 or \r\nlater\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"24"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "These are End of Commercialization \r\noffers.\r\nTo reduce risk of exploitation, apply \r\nthe mitigations detailed in the \r\nRecommended Mitigations section.\r\nContact your local support team for \r\nfurther assistance in upgrading to \r\nNMC2 or NMC3 platforms. ",
"product_ids": [
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/support/contact-us/"
},
{
"category": "mitigation",
"details": "Schneider Electric is implementing remediations which will be made available as soon as possible. In \r\nthe meantime, we recommend that our customers protect their installations from the cyber risks \r\nassociated with the Treck vulnerabilities by immediately taking these mitigating actions: \r\nFor devices on a local network: \r\n Network Partitioning: Locate devices behind firewalls capable of deep packet inspection with \r\nrulesets limiting access with only approved protocols and functions and to only those devices \r\nand endpoints requiring access. \r\n\u2022 Anomalous IP traffic: Block and detect anomalous IP traffic and malformed packets. Refer to \r\nthe Solution section of the CERT-Coordination Center Vulnerability Note VU#257161 https://kb.cert.org/vuls/id/257161 for \r\ndetails.\r\n\u2022 Disable DHCP on the NMC and configure it to use a static IP address.\r\n\u2022 To avoid the use of DNS, set DNS servers to 0.0.0.0 and utilize static IP addresses for all \r\nservers the NMC will connect. \r\n\u2022 If DNS must be used then normalize DNS through a secure recursive server or application \r\nlayer firewall\r\n\u2022 Enable only secure remote access methods. Disable any insecure protocols. \r\nFor devices that must communicate via the Internet: \r\n\u2022 Minimize network exposure for embedded and critical devices, keeping exposure to the \r\nminimum necessary, and ensuring that devices are not accessible from the Internet unless \r\nabsolutely essential.\r\n\u2022 Ensure communications to devices are via the EcoStruxure IT Gateway. The EcoStruxure IT \r\nplatform https://ecostruxureit.com/what-is-ecostruxure-it/ is security hardened with a mandatory two-factor authentication and high encryption \r\nstandards. Device data is securely transported to the EcoStruxure IT platform using the \r\nEcoStruxure IT Gateway, which uses an outbound connection to minimize risk to your \r\nenvironment.\r\nIf network access is not required: \r\n\u2022 Remove the Ethernet cable from the SmartSlot NMC, or the embedded NMC Ethernet port if \r\nan embedded NMC is present. \r\nAdditional mitigations: \r\n\u2022 Access Controls: Install physical and logical controls, so that no unauthorized personnel or \r\ndevice can access your systems, components, peripheral equipment, and networks. ",
"product_ids": [
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33"
],
"restart_required": {
"category": "none"
},
"url": "https://kb.cert.org/vuls/id/257161"
}
],
"title": "CVE-2020-11904"
},
{
"cve": "CVE-2020-11905",
"notes": [
{
"category": "description",
"text": "Network Management Card Family - Network Management Card 1 (NMC1), Network Management Card 2 (NMC2), Network Management Card 3 (NMC3)",
"title": "CVE Description"
}
],
"product_status": {
"fixed": [
"34",
"35",
"36",
"38",
"39"
],
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platforms. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOS V6.9.6 or \r\nlater. \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"1",
"2",
"3"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for the SUMX application \r\nrunning on the NMC1 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOS V3.9.4 or \r\nlater. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"4",
"5",
"6",
"7"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC3 platforms. \r\nCustomers are urged to upgrade to \r\napplications using NMC3 AOS V1.4 or \r\nlater.\r\nNote: AOS V1.3.3.1 addressed 14 of \r\nthe 15 CVEs. NMC3 AOS V1.4 \r\naddresses CVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"8",
"9"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"10"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"11",
"12",
"13",
"14",
"15"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"16",
"17"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC1 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC1 AOSV3.9.4 or \r\nlater\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"18"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC1 and NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOSV6.9.6 or \r\nlater or NMC1 AOSv3.9.4 or later\r\n \r\nNote: NMC2 AOS V6.9.2/6.9.4 \r\naddressed 14 of the 15 CVEs. AOS \r\nV6.9.6 addresses CVE-2020-11901.\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"19",
"20"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"21"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"22",
"23"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for RARU NMC1 \r\napplication \r\nCustomers are urged to upgrade to \r\napplications using NMC1 AOSV3.9.4 or \r\nlater\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"24"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "These are End of Commercialization \r\noffers.\r\nTo reduce risk of exploitation, apply \r\nthe mitigations detailed in the \r\nRecommended Mitigations section.\r\nContact your local support team for \r\nfurther assistance in upgrading to \r\nNMC2 or NMC3 platforms. ",
"product_ids": [
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/support/contact-us/"
},
{
"category": "mitigation",
"details": "Schneider Electric is implementing remediations which will be made available as soon as possible. In \r\nthe meantime, we recommend that our customers protect their installations from the cyber risks \r\nassociated with the Treck vulnerabilities by immediately taking these mitigating actions: \r\nFor devices on a local network: \r\n Network Partitioning: Locate devices behind firewalls capable of deep packet inspection with \r\nrulesets limiting access with only approved protocols and functions and to only those devices \r\nand endpoints requiring access. \r\n\u2022 Anomalous IP traffic: Block and detect anomalous IP traffic and malformed packets. Refer to \r\nthe Solution section of the CERT-Coordination Center Vulnerability Note VU#257161 https://kb.cert.org/vuls/id/257161 for \r\ndetails.\r\n\u2022 Disable DHCP on the NMC and configure it to use a static IP address.\r\n\u2022 To avoid the use of DNS, set DNS servers to 0.0.0.0 and utilize static IP addresses for all \r\nservers the NMC will connect. \r\n\u2022 If DNS must be used then normalize DNS through a secure recursive server or application \r\nlayer firewall\r\n\u2022 Enable only secure remote access methods. Disable any insecure protocols. \r\nFor devices that must communicate via the Internet: \r\n\u2022 Minimize network exposure for embedded and critical devices, keeping exposure to the \r\nminimum necessary, and ensuring that devices are not accessible from the Internet unless \r\nabsolutely essential.\r\n\u2022 Ensure communications to devices are via the EcoStruxure IT Gateway. The EcoStruxure IT \r\nplatform https://ecostruxureit.com/what-is-ecostruxure-it/ is security hardened with a mandatory two-factor authentication and high encryption \r\nstandards. Device data is securely transported to the EcoStruxure IT platform using the \r\nEcoStruxure IT Gateway, which uses an outbound connection to minimize risk to your \r\nenvironment.\r\nIf network access is not required: \r\n\u2022 Remove the Ethernet cable from the SmartSlot NMC, or the embedded NMC Ethernet port if \r\nan embedded NMC is present. \r\nAdditional mitigations: \r\n\u2022 Access Controls: Install physical and logical controls, so that no unauthorized personnel or \r\ndevice can access your systems, components, peripheral equipment, and networks. ",
"product_ids": [
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33"
],
"restart_required": {
"category": "none"
},
"url": "https://kb.cert.org/vuls/id/257161"
}
],
"title": "CVE-2020-11905"
},
{
"cve": "CVE-2020-11906",
"notes": [
{
"category": "description",
"text": "Network Management Card Family - Network Management Card 2 (NMC2), Network Management Card 3 (NMC3)",
"title": "CVE Description"
}
],
"product_status": {
"fixed": [
"34",
"35",
"36",
"37",
"38"
],
"known_affected": [
"1",
"2",
"3",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"19",
"21",
"22",
"23"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platforms. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOS V6.9.6 or \r\nlater. \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"1",
"2",
"3"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC3 platforms. \r\nCustomers are urged to upgrade to \r\napplications using NMC3 AOS V1.4 or \r\nlater.\r\nNote: AOS V1.3.3.1 addressed 14 of \r\nthe 15 CVEs. NMC3 AOS V1.4 \r\naddresses CVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"8",
"9"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"10"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"11",
"12",
"13",
"14",
"15"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"16",
"17"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC1 and NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOSV6.9.6 or \r\nlater or NMC1 AOSv3.9.4 or later\r\n \r\nNote: NMC2 AOS V6.9.2/6.9.4 \r\naddressed 14 of the 15 CVEs. AOS \r\nV6.9.6 addresses CVE-2020-11901.\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"19"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"21"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"22",
"23"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
}
],
"title": "CVE-2020-11906"
},
{
"cve": "CVE-2020-11907",
"notes": [
{
"category": "description",
"text": "Network Management Card Family - Network Management Card 1 (NMC1), Network Management Card 2 (NMC2), Network Management Card 3 (NMC3)",
"title": "CVE Description"
}
],
"product_status": {
"fixed": [
"34",
"35",
"36",
"38",
"39"
],
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platforms. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOS V6.9.6 or \r\nlater. \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"1",
"2",
"3"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for the SUMX application \r\nrunning on the NMC1 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOS V3.9.4 or \r\nlater. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"4",
"5",
"6",
"7"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC3 platforms. \r\nCustomers are urged to upgrade to \r\napplications using NMC3 AOS V1.4 or \r\nlater.\r\nNote: AOS V1.3.3.1 addressed 14 of \r\nthe 15 CVEs. NMC3 AOS V1.4 \r\naddresses CVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"8",
"9"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"10"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"11",
"12",
"13",
"14",
"15"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"16",
"17"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC1 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC1 AOSV3.9.4 or \r\nlater\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"18"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC1 and NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOSV6.9.6 or \r\nlater or NMC1 AOSv3.9.4 or later\r\n \r\nNote: NMC2 AOS V6.9.2/6.9.4 \r\naddressed 14 of the 15 CVEs. AOS \r\nV6.9.6 addresses CVE-2020-11901.\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"19",
"20"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"21"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"22",
"23"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for RARU NMC1 \r\napplication \r\nCustomers are urged to upgrade to \r\napplications using NMC1 AOSV3.9.4 or \r\nlater\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"24"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "These are End of Commercialization \r\noffers.\r\nTo reduce risk of exploitation, apply \r\nthe mitigations detailed in the \r\nRecommended Mitigations section.\r\nContact your local support team for \r\nfurther assistance in upgrading to \r\nNMC2 or NMC3 platforms. ",
"product_ids": [
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/support/contact-us/"
},
{
"category": "mitigation",
"details": "Schneider Electric is implementing remediations which will be made available as soon as possible. In \r\nthe meantime, we recommend that our customers protect their installations from the cyber risks \r\nassociated with the Treck vulnerabilities by immediately taking these mitigating actions: \r\nFor devices on a local network: \r\n Network Partitioning: Locate devices behind firewalls capable of deep packet inspection with \r\nrulesets limiting access with only approved protocols and functions and to only those devices \r\nand endpoints requiring access. \r\n\u2022 Anomalous IP traffic: Block and detect anomalous IP traffic and malformed packets. Refer to \r\nthe Solution section of the CERT-Coordination Center Vulnerability Note VU#257161 https://kb.cert.org/vuls/id/257161 for \r\ndetails.\r\n\u2022 Disable DHCP on the NMC and configure it to use a static IP address.\r\n\u2022 To avoid the use of DNS, set DNS servers to 0.0.0.0 and utilize static IP addresses for all \r\nservers the NMC will connect. \r\n\u2022 If DNS must be used then normalize DNS through a secure recursive server or application \r\nlayer firewall\r\n\u2022 Enable only secure remote access methods. Disable any insecure protocols. \r\nFor devices that must communicate via the Internet: \r\n\u2022 Minimize network exposure for embedded and critical devices, keeping exposure to the \r\nminimum necessary, and ensuring that devices are not accessible from the Internet unless \r\nabsolutely essential.\r\n\u2022 Ensure communications to devices are via the EcoStruxure IT Gateway. The EcoStruxure IT \r\nplatform https://ecostruxureit.com/what-is-ecostruxure-it/ is security hardened with a mandatory two-factor authentication and high encryption \r\nstandards. Device data is securely transported to the EcoStruxure IT platform using the \r\nEcoStruxure IT Gateway, which uses an outbound connection to minimize risk to your \r\nenvironment.\r\nIf network access is not required: \r\n\u2022 Remove the Ethernet cable from the SmartSlot NMC, or the embedded NMC Ethernet port if \r\nan embedded NMC is present. \r\nAdditional mitigations: \r\n\u2022 Access Controls: Install physical and logical controls, so that no unauthorized personnel or \r\ndevice can access your systems, components, peripheral equipment, and networks. ",
"product_ids": [
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33"
],
"restart_required": {
"category": "none"
},
"url": "https://kb.cert.org/vuls/id/257161"
}
],
"title": "CVE-2020-11907"
},
{
"cve": "CVE-2020-11908",
"notes": [
{
"category": "description",
"text": "Network Management Card Family - Network Management Card 1 (NMC1)",
"title": "CVE Description"
}
],
"product_status": {
"fixed": [
"39"
],
"known_affected": [
"4",
"5",
"6",
"7",
"18",
"20",
"24",
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for the SUMX application \r\nrunning on the NMC1 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOS V3.9.4 or \r\nlater. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"4",
"5",
"6",
"7"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC1 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC1 AOSV3.9.4 or \r\nlater\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"18"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC1 and NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOSV6.9.6 or \r\nlater or NMC1 AOSv3.9.4 or later\r\n \r\nNote: NMC2 AOS V6.9.2/6.9.4 \r\naddressed 14 of the 15 CVEs. AOS \r\nV6.9.6 addresses CVE-2020-11901.\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"20"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for RARU NMC1 \r\napplication \r\nCustomers are urged to upgrade to \r\napplications using NMC1 AOSV3.9.4 or \r\nlater\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"24"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "These are End of Commercialization \r\noffers.\r\nTo reduce risk of exploitation, apply \r\nthe mitigations detailed in the \r\nRecommended Mitigations section.\r\nContact your local support team for \r\nfurther assistance in upgrading to \r\nNMC2 or NMC3 platforms. ",
"product_ids": [
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/support/contact-us/"
},
{
"category": "mitigation",
"details": "Schneider Electric is implementing remediations which will be made available as soon as possible. In \r\nthe meantime, we recommend that our customers protect their installations from the cyber risks \r\nassociated with the Treck vulnerabilities by immediately taking these mitigating actions: \r\nFor devices on a local network: \r\n Network Partitioning: Locate devices behind firewalls capable of deep packet inspection with \r\nrulesets limiting access with only approved protocols and functions and to only those devices \r\nand endpoints requiring access. \r\n\u2022 Anomalous IP traffic: Block and detect anomalous IP traffic and malformed packets. Refer to \r\nthe Solution section of the CERT-Coordination Center Vulnerability Note VU#257161 https://kb.cert.org/vuls/id/257161 for \r\ndetails.\r\n\u2022 Disable DHCP on the NMC and configure it to use a static IP address.\r\n\u2022 To avoid the use of DNS, set DNS servers to 0.0.0.0 and utilize static IP addresses for all \r\nservers the NMC will connect. \r\n\u2022 If DNS must be used then normalize DNS through a secure recursive server or application \r\nlayer firewall\r\n\u2022 Enable only secure remote access methods. Disable any insecure protocols. \r\nFor devices that must communicate via the Internet: \r\n\u2022 Minimize network exposure for embedded and critical devices, keeping exposure to the \r\nminimum necessary, and ensuring that devices are not accessible from the Internet unless \r\nabsolutely essential.\r\n\u2022 Ensure communications to devices are via the EcoStruxure IT Gateway. The EcoStruxure IT \r\nplatform https://ecostruxureit.com/what-is-ecostruxure-it/ is security hardened with a mandatory two-factor authentication and high encryption \r\nstandards. Device data is securely transported to the EcoStruxure IT platform using the \r\nEcoStruxure IT Gateway, which uses an outbound connection to minimize risk to your \r\nenvironment.\r\nIf network access is not required: \r\n\u2022 Remove the Ethernet cable from the SmartSlot NMC, or the embedded NMC Ethernet port if \r\nan embedded NMC is present. \r\nAdditional mitigations: \r\n\u2022 Access Controls: Install physical and logical controls, so that no unauthorized personnel or \r\ndevice can access your systems, components, peripheral equipment, and networks. ",
"product_ids": [
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33"
],
"restart_required": {
"category": "none"
},
"url": "https://kb.cert.org/vuls/id/257161"
}
],
"title": "CVE-2020-11908"
},
{
"cve": "CVE-2020-11909",
"notes": [
{
"category": "description",
"text": "Network Management Card Family - Network Management Card 1 (NMC1), Network Management Card 2 (NMC2), Network Management Card 3 (NMC3)",
"title": "CVE Description"
}
],
"product_status": {
"fixed": [
"34",
"35",
"36",
"38",
"39"
],
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platforms. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOS V6.9.6 or \r\nlater. \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"1",
"2",
"3"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for the SUMX application \r\nrunning on the NMC1 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOS V3.9.4 or \r\nlater. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"4",
"5",
"6",
"7"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC3 platforms. \r\nCustomers are urged to upgrade to \r\napplications using NMC3 AOS V1.4 or \r\nlater.\r\nNote: AOS V1.3.3.1 addressed 14 of \r\nthe 15 CVEs. NMC3 AOS V1.4 \r\naddresses CVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"8",
"9"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"10"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"11",
"12",
"13",
"14",
"15"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"16",
"17"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC1 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC1 AOSV3.9.4 or \r\nlater\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"18"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC1 and NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOSV6.9.6 or \r\nlater or NMC1 AOSv3.9.4 or later\r\n \r\nNote: NMC2 AOS V6.9.2/6.9.4 \r\naddressed 14 of the 15 CVEs. AOS \r\nV6.9.6 addresses CVE-2020-11901.\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"19",
"20"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"21"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"22",
"23"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for RARU NMC1 \r\napplication \r\nCustomers are urged to upgrade to \r\napplications using NMC1 AOSV3.9.4 or \r\nlater\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"24"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "These are End of Commercialization \r\noffers.\r\nTo reduce risk of exploitation, apply \r\nthe mitigations detailed in the \r\nRecommended Mitigations section.\r\nContact your local support team for \r\nfurther assistance in upgrading to \r\nNMC2 or NMC3 platforms. ",
"product_ids": [
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/support/contact-us/"
},
{
"category": "mitigation",
"details": "Schneider Electric is implementing remediations which will be made available as soon as possible. In \r\nthe meantime, we recommend that our customers protect their installations from the cyber risks \r\nassociated with the Treck vulnerabilities by immediately taking these mitigating actions: \r\nFor devices on a local network: \r\n Network Partitioning: Locate devices behind firewalls capable of deep packet inspection with \r\nrulesets limiting access with only approved protocols and functions and to only those devices \r\nand endpoints requiring access. \r\n\u2022 Anomalous IP traffic: Block and detect anomalous IP traffic and malformed packets. Refer to \r\nthe Solution section of the CERT-Coordination Center Vulnerability Note VU#257161 https://kb.cert.org/vuls/id/257161 for \r\ndetails.\r\n\u2022 Disable DHCP on the NMC and configure it to use a static IP address.\r\n\u2022 To avoid the use of DNS, set DNS servers to 0.0.0.0 and utilize static IP addresses for all \r\nservers the NMC will connect. \r\n\u2022 If DNS must be used then normalize DNS through a secure recursive server or application \r\nlayer firewall\r\n\u2022 Enable only secure remote access methods. Disable any insecure protocols. \r\nFor devices that must communicate via the Internet: \r\n\u2022 Minimize network exposure for embedded and critical devices, keeping exposure to the \r\nminimum necessary, and ensuring that devices are not accessible from the Internet unless \r\nabsolutely essential.\r\n\u2022 Ensure communications to devices are via the EcoStruxure IT Gateway. The EcoStruxure IT \r\nplatform https://ecostruxureit.com/what-is-ecostruxure-it/ is security hardened with a mandatory two-factor authentication and high encryption \r\nstandards. Device data is securely transported to the EcoStruxure IT platform using the \r\nEcoStruxure IT Gateway, which uses an outbound connection to minimize risk to your \r\nenvironment.\r\nIf network access is not required: \r\n\u2022 Remove the Ethernet cable from the SmartSlot NMC, or the embedded NMC Ethernet port if \r\nan embedded NMC is present. \r\nAdditional mitigations: \r\n\u2022 Access Controls: Install physical and logical controls, so that no unauthorized personnel or \r\ndevice can access your systems, components, peripheral equipment, and networks. ",
"product_ids": [
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33"
],
"restart_required": {
"category": "none"
},
"url": "https://kb.cert.org/vuls/id/257161"
}
],
"title": "CVE-2020-11909"
},
{
"cve": "CVE-2020-11910",
"notes": [
{
"category": "description",
"text": "Network Management Card Family - Network Management Card 1 (NMC1), Network Management Card 2 (NMC2), Network Management Card 3 (NMC3)",
"title": "CVE Description"
}
],
"product_status": {
"fixed": [
"34",
"35",
"36",
"38",
"39"
],
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platforms. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOS V6.9.6 or \r\nlater. \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"1",
"2",
"3"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for the SUMX application \r\nrunning on the NMC1 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOS V3.9.4 or \r\nlater. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"4",
"5",
"6",
"7"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC3 platforms. \r\nCustomers are urged to upgrade to \r\napplications using NMC3 AOS V1.4 or \r\nlater.\r\nNote: AOS V1.3.3.1 addressed 14 of \r\nthe 15 CVEs. NMC3 AOS V1.4 \r\naddresses CVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"8",
"9"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"10"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"11",
"12",
"13",
"14",
"15"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"16",
"17"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC1 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC1 AOSV3.9.4 or \r\nlater\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"18"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC1 and NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOSV6.9.6 or \r\nlater or NMC1 AOSv3.9.4 or later\r\n \r\nNote: NMC2 AOS V6.9.2/6.9.4 \r\naddressed 14 of the 15 CVEs. AOS \r\nV6.9.6 addresses CVE-2020-11901.\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"19",
"20"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"21"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"22",
"23"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for RARU NMC1 \r\napplication \r\nCustomers are urged to upgrade to \r\napplications using NMC1 AOSV3.9.4 or \r\nlater\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"24"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "These are End of Commercialization \r\noffers.\r\nTo reduce risk of exploitation, apply \r\nthe mitigations detailed in the \r\nRecommended Mitigations section.\r\nContact your local support team for \r\nfurther assistance in upgrading to \r\nNMC2 or NMC3 platforms. ",
"product_ids": [
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/support/contact-us/"
},
{
"category": "mitigation",
"details": "Schneider Electric is implementing remediations which will be made available as soon as possible. In \r\nthe meantime, we recommend that our customers protect their installations from the cyber risks \r\nassociated with the Treck vulnerabilities by immediately taking these mitigating actions: \r\nFor devices on a local network: \r\n Network Partitioning: Locate devices behind firewalls capable of deep packet inspection with \r\nrulesets limiting access with only approved protocols and functions and to only those devices \r\nand endpoints requiring access. \r\n\u2022 Anomalous IP traffic: Block and detect anomalous IP traffic and malformed packets. Refer to \r\nthe Solution section of the CERT-Coordination Center Vulnerability Note VU#257161 https://kb.cert.org/vuls/id/257161 for \r\ndetails.\r\n\u2022 Disable DHCP on the NMC and configure it to use a static IP address.\r\n\u2022 To avoid the use of DNS, set DNS servers to 0.0.0.0 and utilize static IP addresses for all \r\nservers the NMC will connect. \r\n\u2022 If DNS must be used then normalize DNS through a secure recursive server or application \r\nlayer firewall\r\n\u2022 Enable only secure remote access methods. Disable any insecure protocols. \r\nFor devices that must communicate via the Internet: \r\n\u2022 Minimize network exposure for embedded and critical devices, keeping exposure to the \r\nminimum necessary, and ensuring that devices are not accessible from the Internet unless \r\nabsolutely essential.\r\n\u2022 Ensure communications to devices are via the EcoStruxure IT Gateway. The EcoStruxure IT \r\nplatform https://ecostruxureit.com/what-is-ecostruxure-it/ is security hardened with a mandatory two-factor authentication and high encryption \r\nstandards. Device data is securely transported to the EcoStruxure IT platform using the \r\nEcoStruxure IT Gateway, which uses an outbound connection to minimize risk to your \r\nenvironment.\r\nIf network access is not required: \r\n\u2022 Remove the Ethernet cable from the SmartSlot NMC, or the embedded NMC Ethernet port if \r\nan embedded NMC is present. \r\nAdditional mitigations: \r\n\u2022 Access Controls: Install physical and logical controls, so that no unauthorized personnel or \r\ndevice can access your systems, components, peripheral equipment, and networks. ",
"product_ids": [
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33"
],
"restart_required": {
"category": "none"
},
"url": "https://kb.cert.org/vuls/id/257161"
}
],
"title": "CVE-2020-11910"
},
{
"cve": "CVE-2020-11911",
"notes": [
{
"category": "description",
"text": "Network Management Card Family - Network Management Card 1 (NMC1), Network Management Card 2 (NMC2), Network Management Card 3 (NMC3)",
"title": "CVE Description"
}
],
"product_status": {
"fixed": [
"34",
"35",
"36",
"38",
"39"
],
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platforms. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOS V6.9.6 or \r\nlater. \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"1",
"2",
"3"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for the SUMX application \r\nrunning on the NMC1 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOS V3.9.4 or \r\nlater. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"4",
"5",
"6",
"7"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC3 platforms. \r\nCustomers are urged to upgrade to \r\napplications using NMC3 AOS V1.4 or \r\nlater.\r\nNote: AOS V1.3.3.1 addressed 14 of \r\nthe 15 CVEs. NMC3 AOS V1.4 \r\naddresses CVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"8",
"9"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"10"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"11",
"12",
"13",
"14",
"15"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"16",
"17"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC1 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC1 AOSV3.9.4 or \r\nlater\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"18"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC1 and NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOSV6.9.6 or \r\nlater or NMC1 AOSv3.9.4 or later\r\n \r\nNote: NMC2 AOS V6.9.2/6.9.4 \r\naddressed 14 of the 15 CVEs. AOS \r\nV6.9.6 addresses CVE-2020-11901.\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"19",
"20"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"21"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"22",
"23"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for RARU NMC1 \r\napplication \r\nCustomers are urged to upgrade to \r\napplications using NMC1 AOSV3.9.4 or \r\nlater\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"24"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "These are End of Commercialization \r\noffers.\r\nTo reduce risk of exploitation, apply \r\nthe mitigations detailed in the \r\nRecommended Mitigations section.\r\nContact your local support team for \r\nfurther assistance in upgrading to \r\nNMC2 or NMC3 platforms. ",
"product_ids": [
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/support/contact-us/"
},
{
"category": "mitigation",
"details": "Schneider Electric is implementing remediations which will be made available as soon as possible. In \r\nthe meantime, we recommend that our customers protect their installations from the cyber risks \r\nassociated with the Treck vulnerabilities by immediately taking these mitigating actions: \r\nFor devices on a local network: \r\n Network Partitioning: Locate devices behind firewalls capable of deep packet inspection with \r\nrulesets limiting access with only approved protocols and functions and to only those devices \r\nand endpoints requiring access. \r\n\u2022 Anomalous IP traffic: Block and detect anomalous IP traffic and malformed packets. Refer to \r\nthe Solution section of the CERT-Coordination Center Vulnerability Note VU#257161 https://kb.cert.org/vuls/id/257161 for \r\ndetails.\r\n\u2022 Disable DHCP on the NMC and configure it to use a static IP address.\r\n\u2022 To avoid the use of DNS, set DNS servers to 0.0.0.0 and utilize static IP addresses for all \r\nservers the NMC will connect. \r\n\u2022 If DNS must be used then normalize DNS through a secure recursive server or application \r\nlayer firewall\r\n\u2022 Enable only secure remote access methods. Disable any insecure protocols. \r\nFor devices that must communicate via the Internet: \r\n\u2022 Minimize network exposure for embedded and critical devices, keeping exposure to the \r\nminimum necessary, and ensuring that devices are not accessible from the Internet unless \r\nabsolutely essential.\r\n\u2022 Ensure communications to devices are via the EcoStruxure IT Gateway. The EcoStruxure IT \r\nplatform https://ecostruxureit.com/what-is-ecostruxure-it/ is security hardened with a mandatory two-factor authentication and high encryption \r\nstandards. Device data is securely transported to the EcoStruxure IT platform using the \r\nEcoStruxure IT Gateway, which uses an outbound connection to minimize risk to your \r\nenvironment.\r\nIf network access is not required: \r\n\u2022 Remove the Ethernet cable from the SmartSlot NMC, or the embedded NMC Ethernet port if \r\nan embedded NMC is present. \r\nAdditional mitigations: \r\n\u2022 Access Controls: Install physical and logical controls, so that no unauthorized personnel or \r\ndevice can access your systems, components, peripheral equipment, and networks. ",
"product_ids": [
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33"
],
"restart_required": {
"category": "none"
},
"url": "https://kb.cert.org/vuls/id/257161"
}
],
"title": "CVE-2020-11911"
},
{
"cve": "CVE-2020-11912",
"notes": [
{
"category": "description",
"text": "Network Management Card Family - Network Management Card 1 (NMC1), Network Management Card 2 (NMC2), Network Management Card 3 (NMC3)",
"title": "CVE Description"
}
],
"product_status": {
"fixed": [
"34",
"35",
"36",
"38",
"39"
],
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platforms. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOS V6.9.6 or \r\nlater. \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"1",
"2",
"3"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for the SUMX application \r\nrunning on the NMC1 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOS V3.9.4 or \r\nlater. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"4",
"5",
"6",
"7"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC3 platforms. \r\nCustomers are urged to upgrade to \r\napplications using NMC3 AOS V1.4 or \r\nlater.\r\nNote: AOS V1.3.3.1 addressed 14 of \r\nthe 15 CVEs. NMC3 AOS V1.4 \r\naddresses CVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"8",
"9"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"10"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"11",
"12",
"13",
"14",
"15"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"16",
"17"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC1 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC1 AOSV3.9.4 or \r\nlater\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"18"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC1 and NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOSV6.9.6 or \r\nlater or NMC1 AOSv3.9.4 or later\r\n \r\nNote: NMC2 AOS V6.9.2/6.9.4 \r\naddressed 14 of the 15 CVEs. AOS \r\nV6.9.6 addresses CVE-2020-11901.\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"19",
"20"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"21"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"22",
"23"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for RARU NMC1 \r\napplication \r\nCustomers are urged to upgrade to \r\napplications using NMC1 AOSV3.9.4 or \r\nlater\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"24"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "These are End of Commercialization \r\noffers.\r\nTo reduce risk of exploitation, apply \r\nthe mitigations detailed in the \r\nRecommended Mitigations section.\r\nContact your local support team for \r\nfurther assistance in upgrading to \r\nNMC2 or NMC3 platforms. ",
"product_ids": [
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/support/contact-us/"
},
{
"category": "mitigation",
"details": "Schneider Electric is implementing remediations which will be made available as soon as possible. In \r\nthe meantime, we recommend that our customers protect their installations from the cyber risks \r\nassociated with the Treck vulnerabilities by immediately taking these mitigating actions: \r\nFor devices on a local network: \r\n Network Partitioning: Locate devices behind firewalls capable of deep packet inspection with \r\nrulesets limiting access with only approved protocols and functions and to only those devices \r\nand endpoints requiring access. \r\n\u2022 Anomalous IP traffic: Block and detect anomalous IP traffic and malformed packets. Refer to \r\nthe Solution section of the CERT-Coordination Center Vulnerability Note VU#257161 https://kb.cert.org/vuls/id/257161 for \r\ndetails.\r\n\u2022 Disable DHCP on the NMC and configure it to use a static IP address.\r\n\u2022 To avoid the use of DNS, set DNS servers to 0.0.0.0 and utilize static IP addresses for all \r\nservers the NMC will connect. \r\n\u2022 If DNS must be used then normalize DNS through a secure recursive server or application \r\nlayer firewall\r\n\u2022 Enable only secure remote access methods. Disable any insecure protocols. \r\nFor devices that must communicate via the Internet: \r\n\u2022 Minimize network exposure for embedded and critical devices, keeping exposure to the \r\nminimum necessary, and ensuring that devices are not accessible from the Internet unless \r\nabsolutely essential.\r\n\u2022 Ensure communications to devices are via the EcoStruxure IT Gateway. The EcoStruxure IT \r\nplatform https://ecostruxureit.com/what-is-ecostruxure-it/ is security hardened with a mandatory two-factor authentication and high encryption \r\nstandards. Device data is securely transported to the EcoStruxure IT platform using the \r\nEcoStruxure IT Gateway, which uses an outbound connection to minimize risk to your \r\nenvironment.\r\nIf network access is not required: \r\n\u2022 Remove the Ethernet cable from the SmartSlot NMC, or the embedded NMC Ethernet port if \r\nan embedded NMC is present. \r\nAdditional mitigations: \r\n\u2022 Access Controls: Install physical and logical controls, so that no unauthorized personnel or \r\ndevice can access your systems, components, peripheral equipment, and networks. ",
"product_ids": [
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33"
],
"restart_required": {
"category": "none"
},
"url": "https://kb.cert.org/vuls/id/257161"
}
],
"title": "CVE-2020-11912"
},
{
"cve": "CVE-2020-11913",
"notes": [
{
"category": "description",
"text": "Network Management Card Family - Network Management Card 2 (NMC2), Network Management Card 3 (NMC3)",
"title": "CVE Description"
}
],
"product_status": {
"fixed": [
"34",
"35",
"36",
"37",
"38"
],
"known_affected": [
"1",
"2",
"3",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"19",
"21",
"22",
"23"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platforms. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOS V6.9.6 or \r\nlater. \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"1",
"2",
"3"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC3 platforms. \r\nCustomers are urged to upgrade to \r\napplications using NMC3 AOS V1.4 or \r\nlater.\r\nNote: AOS V1.3.3.1 addressed 14 of \r\nthe 15 CVEs. NMC3 AOS V1.4 \r\naddresses CVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"8",
"9"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"10"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"11",
"12",
"13",
"14",
"15"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"16",
"17"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC1 and NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOSV6.9.6 or \r\nlater or NMC1 AOSv3.9.4 or later\r\n \r\nNote: NMC2 AOS V6.9.2/6.9.4 \r\naddressed 14 of the 15 CVEs. AOS \r\nV6.9.6 addresses CVE-2020-11901.\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"19"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"21"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"22",
"23"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
}
],
"title": "CVE-2020-11913"
},
{
"cve": "CVE-2020-11914",
"notes": [
{
"category": "description",
"text": "Network Management Card Family - Network Management Card 1 (NMC1), Network Management Card 2 (NMC2), Network Management Card 3 (NMC3)",
"title": "CVE Description"
}
],
"product_status": {
"fixed": [
"34",
"35",
"36",
"38",
"39"
],
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platforms. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOS V6.9.6 or \r\nlater. \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"1",
"2",
"3"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for the SUMX application \r\nrunning on the NMC1 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOS V3.9.4 or \r\nlater. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"4",
"5",
"6",
"7"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC3 platforms. \r\nCustomers are urged to upgrade to \r\napplications using NMC3 AOS V1.4 or \r\nlater.\r\nNote: AOS V1.3.3.1 addressed 14 of \r\nthe 15 CVEs. NMC3 AOS V1.4 \r\naddresses CVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"8",
"9"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"10"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"11",
"12",
"13",
"14",
"15"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"16",
"17"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC1 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC1 AOSV3.9.4 or \r\nlater\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"18"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC1 and NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOSV6.9.6 or \r\nlater or NMC1 AOSv3.9.4 or later\r\n \r\nNote: NMC2 AOS V6.9.2/6.9.4 \r\naddressed 14 of the 15 CVEs. AOS \r\nV6.9.6 addresses CVE-2020-11901.\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"19",
"20"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"21"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"22",
"23"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for RARU NMC1 \r\napplication \r\nCustomers are urged to upgrade to \r\napplications using NMC1 AOSV3.9.4 or \r\nlater\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"24"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "These are End of Commercialization \r\noffers.\r\nTo reduce risk of exploitation, apply \r\nthe mitigations detailed in the \r\nRecommended Mitigations section.\r\nContact your local support team for \r\nfurther assistance in upgrading to \r\nNMC2 or NMC3 platforms. ",
"product_ids": [
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/support/contact-us/"
},
{
"category": "mitigation",
"details": "Schneider Electric is implementing remediations which will be made available as soon as possible. In \r\nthe meantime, we recommend that our customers protect their installations from the cyber risks \r\nassociated with the Treck vulnerabilities by immediately taking these mitigating actions: \r\nFor devices on a local network: \r\n Network Partitioning: Locate devices behind firewalls capable of deep packet inspection with \r\nrulesets limiting access with only approved protocols and functions and to only those devices \r\nand endpoints requiring access. \r\n\u2022 Anomalous IP traffic: Block and detect anomalous IP traffic and malformed packets. Refer to \r\nthe Solution section of the CERT-Coordination Center Vulnerability Note VU#257161 https://kb.cert.org/vuls/id/257161 for \r\ndetails.\r\n\u2022 Disable DHCP on the NMC and configure it to use a static IP address.\r\n\u2022 To avoid the use of DNS, set DNS servers to 0.0.0.0 and utilize static IP addresses for all \r\nservers the NMC will connect. \r\n\u2022 If DNS must be used then normalize DNS through a secure recursive server or application \r\nlayer firewall\r\n\u2022 Enable only secure remote access methods. Disable any insecure protocols. \r\nFor devices that must communicate via the Internet: \r\n\u2022 Minimize network exposure for embedded and critical devices, keeping exposure to the \r\nminimum necessary, and ensuring that devices are not accessible from the Internet unless \r\nabsolutely essential.\r\n\u2022 Ensure communications to devices are via the EcoStruxure IT Gateway. The EcoStruxure IT \r\nplatform https://ecostruxureit.com/what-is-ecostruxure-it/ is security hardened with a mandatory two-factor authentication and high encryption \r\nstandards. Device data is securely transported to the EcoStruxure IT platform using the \r\nEcoStruxure IT Gateway, which uses an outbound connection to minimize risk to your \r\nenvironment.\r\nIf network access is not required: \r\n\u2022 Remove the Ethernet cable from the SmartSlot NMC, or the embedded NMC Ethernet port if \r\nan embedded NMC is present. \r\nAdditional mitigations: \r\n\u2022 Access Controls: Install physical and logical controls, so that no unauthorized personnel or \r\ndevice can access your systems, components, peripheral equipment, and networks. ",
"product_ids": [
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33"
],
"restart_required": {
"category": "none"
},
"url": "https://kb.cert.org/vuls/id/257161"
}
],
"title": "CVE-2020-11914"
},
{
"cve": "CVE-2020-11896",
"notes": [
{
"category": "description",
"text": "Network Management Card Family - Network Management Card 2 (NMC2), Network Management Card 3 (NMC3)",
"title": "CVE Description"
}
],
"product_status": {
"fixed": [
"34",
"35",
"36",
"37",
"38"
],
"known_affected": [
"1",
"2",
"3",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"19",
"21",
"22",
"23"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platforms. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOS V6.9.6 or \r\nlater. \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"1",
"2",
"3"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC3 platforms. \r\nCustomers are urged to upgrade to \r\napplications using NMC3 AOS V1.4 or \r\nlater.\r\nNote: AOS V1.3.3.1 addressed 14 of \r\nthe 15 CVEs. NMC3 AOS V1.4 \r\naddresses CVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"8",
"9"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"10"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"11",
"12",
"13",
"14",
"15"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"16",
"17"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC1 and NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOSV6.9.6 or \r\nlater or NMC1 AOSv3.9.4 or later\r\n \r\nNote: NMC2 AOS V6.9.2/6.9.4 \r\naddressed 14 of the 15 CVEs. AOS \r\nV6.9.6 addresses CVE-2020-11901.\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"19"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"21"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"22",
"23"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
}
],
"title": "CVE-2020-11896"
},
{
"cve": "CVE-2020-11898",
"notes": [
{
"category": "description",
"text": "Network Management Card Family - Network Management Card 2 (NMC2), Network Management Card 3 (NMC3)",
"title": "CVE Description"
}
],
"product_status": {
"fixed": [
"34",
"35",
"36",
"37",
"38"
],
"known_affected": [
"1",
"2",
"3",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"19",
"21",
"22",
"23"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platforms. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOS V6.9.6 or \r\nlater. \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"1",
"2",
"3"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC3 platforms. \r\nCustomers are urged to upgrade to \r\napplications using NMC3 AOS V1.4 or \r\nlater.\r\nNote: AOS V1.3.3.1 addressed 14 of \r\nthe 15 CVEs. NMC3 AOS V1.4 \r\naddresses CVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"8",
"9"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"10"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"11",
"12",
"13",
"14",
"15"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"16",
"17"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC1 and NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOSV6.9.6 or \r\nlater or NMC1 AOSv3.9.4 or later\r\n \r\nNote: NMC2 AOS V6.9.2/6.9.4 \r\naddressed 14 of the 15 CVEs. AOS \r\nV6.9.6 addresses CVE-2020-11901.\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"19"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"21"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"22",
"23"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
}
],
"title": "CVE-2020-11898"
},
{
"cve": "CVE-2020-11899",
"notes": [
{
"category": "description",
"text": "Network Management Card Family - Network Management Card 2 (NMC2), Network Management Card 3 (NMC3)",
"title": "CVE Description"
}
],
"product_status": {
"fixed": [
"34",
"35",
"36",
"37",
"38"
],
"known_affected": [
"1",
"2",
"3",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"19",
"21",
"22",
"23"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platforms. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOS V6.9.6 or \r\nlater. \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"1",
"2",
"3"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC3 platforms. \r\nCustomers are urged to upgrade to \r\napplications using NMC3 AOS V1.4 or \r\nlater.\r\nNote: AOS V1.3.3.1 addressed 14 of \r\nthe 15 CVEs. NMC3 AOS V1.4 \r\naddresses CVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"8",
"9"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"10"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"11",
"12",
"13",
"14",
"15"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"16",
"17"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC1 and NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOSV6.9.6 or \r\nlater or NMC1 AOSv3.9.4 or later\r\n \r\nNote: NMC2 AOS V6.9.2/6.9.4 \r\naddressed 14 of the 15 CVEs. AOS \r\nV6.9.6 addresses CVE-2020-11901.\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"19"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"21"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"22",
"23"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
}
],
"title": "CVE-2020-11913"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.