CNVD-2019-45191
Vulnerability from cnvd - Published: 2019-12-13
VLAI Severity ?
Title
Schneider Electric SoMachine Basic和Schneider Electric Modicon M221授权问题漏洞
Description
Schneider Electric SoMachine Basic和Schneider Electric Modicon M221都是法国施耐德电气(Schneider Electric)公司的产品。Schneider Electric SoMachine Basic是一套用于逻辑控制器编程的软件。Schneider Electric Modicon M221是一款可编程逻辑控制器。
Schneider Electric SoMachine Basic和Schneider Electric Modicon M221存在授权问题漏洞。攻击者可利用该漏洞未授权访问SoMachine Basic资源文件。
Severity
低
Patch Name
Schneider Electric SoMachine Basic和Schneider Electric Modicon M221授权问题漏洞的补丁
Patch Description
Schneider Electric SoMachine Basic和Schneider Electric Modicon M221都是法国施耐德电气(Schneider Electric)公司的产品。Schneider Electric SoMachine Basic是一套用于逻辑控制器编程的软件。Schneider Electric Modicon M221是一款可编程逻辑控制器。
Schneider Electric SoMachine Basic和Schneider Electric Modicon M221存在授权问题漏洞。攻击者可利用该漏洞未授权访问SoMachine Basic资源文件。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
厂商已发布了漏洞修复程序,请及时关注更新: https://www.schneider-electric.com/en/download/document/SEVD-2019-045-01/
Reference
https://nvd.nist.gov/vuln/detail/CVE-2018-7822
Impacted products
| Name | ['Schneider Electric Modicon M221 <V1.10.0.0', 'Schneider Electric SoMachine Basic'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2018-7822",
"cveUrl": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7822"
}
},
"description": "Schneider Electric SoMachine Basic\u548cSchneider Electric Modicon M221\u90fd\u662f\u6cd5\u56fd\u65bd\u8010\u5fb7\u7535\u6c14\uff08Schneider Electric\uff09\u516c\u53f8\u7684\u4ea7\u54c1\u3002Schneider Electric SoMachine Basic\u662f\u4e00\u5957\u7528\u4e8e\u903b\u8f91\u63a7\u5236\u5668\u7f16\u7a0b\u7684\u8f6f\u4ef6\u3002Schneider Electric Modicon M221\u662f\u4e00\u6b3e\u53ef\u7f16\u7a0b\u903b\u8f91\u63a7\u5236\u5668\u3002\n\nSchneider Electric SoMachine Basic\u548cSchneider Electric Modicon M221\u5b58\u5728\u6388\u6743\u95ee\u9898\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u672a\u6388\u6743\u8bbf\u95eeSoMachine Basic\u8d44\u6e90\u6587\u4ef6\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://www.schneider-electric.com/en/download/document/SEVD-2019-045-01/",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2019-45191",
"openTime": "2019-12-13",
"patchDescription": "Schneider Electric SoMachine Basic\u548cSchneider Electric Modicon M221\u90fd\u662f\u6cd5\u56fd\u65bd\u8010\u5fb7\u7535\u6c14\uff08Schneider Electric\uff09\u516c\u53f8\u7684\u4ea7\u54c1\u3002Schneider Electric SoMachine Basic\u662f\u4e00\u5957\u7528\u4e8e\u903b\u8f91\u63a7\u5236\u5668\u7f16\u7a0b\u7684\u8f6f\u4ef6\u3002Schneider Electric Modicon M221\u662f\u4e00\u6b3e\u53ef\u7f16\u7a0b\u903b\u8f91\u63a7\u5236\u5668\u3002\r\n\r\nSchneider Electric SoMachine Basic\u548cSchneider Electric Modicon M221\u5b58\u5728\u6388\u6743\u95ee\u9898\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u672a\u6388\u6743\u8bbf\u95eeSoMachine Basic\u8d44\u6e90\u6587\u4ef6\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Schneider Electric SoMachine Basic\u548cSchneider Electric Modicon M221\u6388\u6743\u95ee\u9898\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": [
"Schneider Electric Modicon M221 \u003cV1.10.0.0",
"Schneider Electric SoMachine Basic"
]
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2018-7822",
"serverity": "\u4f4e",
"submitTime": "2019-05-24",
"title": "Schneider Electric SoMachine Basic\u548cSchneider Electric Modicon M221\u6388\u6743\u95ee\u9898\u6f0f\u6d1e"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…