Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2020-11901 (GCVE-0-2020-11901)
Vulnerability from cvelistv5 – Published: 2020-06-17 10:34 – Updated: 2024-08-04 11:42- n/a
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T11:42:00.815Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.kb.cert.org/vuls/id/257161/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.treck.com"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://jsof-tech.com/vulnerability-disclosure-policy/"
},
{
"name": "VU#257161",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "https://www.kb.cert.org/vuls/id/257161"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.jsof-tech.com/ripple20/"
},
{
"name": "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The Treck TCP/IP stack before 6.0.1.66 allows Remote Code execution via a single invalid DNS response."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-07-22T00:06:35",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.kb.cert.org/vuls/id/257161/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.treck.com"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://jsof-tech.com/vulnerability-disclosure-policy/"
},
{
"name": "VU#257161",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "https://www.kb.cert.org/vuls/id/257161"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.jsof-tech.com/ripple20/"
},
{
"name": "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2020-11901",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Treck TCP/IP stack before 6.0.1.66 allows Remote Code execution via a single invalid DNS response."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.kb.cert.org/vuls/id/257161/",
"refsource": "MISC",
"url": "https://www.kb.cert.org/vuls/id/257161/"
},
{
"name": "https://www.treck.com",
"refsource": "MISC",
"url": "https://www.treck.com"
},
{
"name": "https://jsof-tech.com/vulnerability-disclosure-policy/",
"refsource": "MISC",
"url": "https://jsof-tech.com/vulnerability-disclosure-policy/"
},
{
"name": "VU#257161",
"refsource": "CERT-VN",
"url": "https://www.kb.cert.org/vuls/id/257161"
},
{
"name": "https://www.jsof-tech.com/ripple20/",
"refsource": "MISC",
"url": "https://www.jsof-tech.com/ripple20/"
},
{
"name": "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC"
},
{
"name": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
"refsource": "CONFIRM",
"url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt"
},
{
"name": "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
"refsource": "MISC",
"url": "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2020-11901",
"datePublished": "2020-06-17T10:34:01",
"dateReserved": "2020-04-19T00:00:00",
"dateUpdated": "2024-08-04T11:42:00.815Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:treck:tcp\\\\/ip:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"6.0.1.66\", \"matchCriteriaId\": \"51F9D0DF-D9F0-4183-AC07-C799EFFE36C8\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"The Treck TCP/IP stack before 6.0.1.66 allows Remote Code execution via a single invalid DNS response.\"}, {\"lang\": \"es\", \"value\": \"La pila Treck TCP/IP versiones anteriores a 6.0.1.66, permite Una ejecuci\\u00f3n de C\\u00f3digo Remota por medio de una respuesta DNS no v\\u00e1lida \\u00fanica\"}]",
"id": "CVE-2020-11901",
"lastModified": "2024-11-21T04:58:51.653",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H\", \"baseScore\": 9.0, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.2, \"impactScore\": 6.0}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:C/I:C/A:C\", \"baseScore\": 9.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 8.6, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2020-06-17T11:15:10.350",
"references": "[{\"url\": \"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://jsof-tech.com/vulnerability-disclosure-policy/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://www.jsof-tech.com/ripple20/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\", \"Third Party Advisory\"]}, {\"url\": \"https://www.kb.cert.org/vuls/id/257161\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://www.kb.cert.org/vuls/id/257161/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mitigation\", \"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"https://www.treck.com\", \"source\": \"cve@mitre.org\", \"tags\": [\"Product\", \"Vendor Advisory\"]}, {\"url\": \"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://jsof-tech.com/vulnerability-disclosure-policy/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.jsof-tech.com/ripple20/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Third Party Advisory\"]}, {\"url\": \"https://www.kb.cert.org/vuls/id/257161\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.kb.cert.org/vuls/id/257161/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mitigation\", \"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"https://www.treck.com\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Product\", \"Vendor Advisory\"]}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-125\"}, {\"lang\": \"en\", \"value\": \"CWE-131\"}, {\"lang\": \"en\", \"value\": \"CWE-330\"}, {\"lang\": \"en\", \"value\": \"CWE-787\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2020-11901\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2020-06-17T11:15:10.350\",\"lastModified\":\"2024-11-21T04:58:51.653\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The Treck TCP/IP stack before 6.0.1.66 allows Remote Code execution via a single invalid DNS response.\"},{\"lang\":\"es\",\"value\":\"La pila Treck TCP/IP versiones anteriores a 6.0.1.66, permite Una ejecuci\u00f3n de C\u00f3digo Remota por medio de una respuesta DNS no v\u00e1lida \u00fanica\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":9.0,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.2,\"impactScore\":6.0}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:C/I:C/A:C\",\"baseScore\":9.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"},{\"lang\":\"en\",\"value\":\"CWE-131\"},{\"lang\":\"en\",\"value\":\"CWE-330\"},{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:treck:tcp\\\\/ip:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.0.1.66\",\"matchCriteriaId\":\"51F9D0DF-D9F0-4183-AC07-C799EFFE36C8\"}]}]}],\"references\":[{\"url\":\"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://jsof-tech.com/vulnerability-disclosure-policy/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.jsof-tech.com/ripple20/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://www.kb.cert.org/vuls/id/257161\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.kb.cert.org/vuls/id/257161/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mitigation\",\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://www.treck.com\",\"source\":\"cve@mitre.org\",\"tags\":[\"Product\",\"Vendor Advisory\"]},{\"url\":\"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://jsof-tech.com/vulnerability-disclosure-policy/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.jsof-tech.com/ripple20/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://www.kb.cert.org/vuls/id/257161\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.kb.cert.org/vuls/id/257161/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mitigation\",\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://www.treck.com\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Product\",\"Vendor Advisory\"]}]}}"
}
}
CNVD-2020-34251
Vulnerability from cnvd - Published: 2020-06-18厂商已发布了漏洞修复程序,请及时关注更新: https://treck.com/vulnerability-response-information/
| Name | Treck TCP/IP stack <6.0.1.66 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2020-11901"
}
},
"description": "Treck TCP/IP\u662f\u7f8e\u56fdTreck\u516c\u53f8\u7684\u4e00\u5957\u4e13\u7528\u4e8e\u5d4c\u5165\u5f0f\u7cfb\u7edf\u7684TCP\uff08\u4f20\u8f93\u63a7\u5236\u534f\u8bae\uff09/IP\uff08\u7f51\u9645\u4e92\u8fde\u534f\u8bae\uff09\u5957\u4ef6\u3002\n\nTreck TCP/IP\u4e2d\u7684DNS\u89e3\u6790\u7a0b\u5e8f\u7ec4\u4ef6\u5b58\u5728\u8f93\u5165\u9a8c\u8bc1\u9519\u8bef\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u8fdc\u7a0b\u6267\u884c\u4ee3\u7801\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://treck.com/vulnerability-response-information/",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2020-34251",
"openTime": "2020-06-18",
"patchDescription": "Treck TCP/IP\u662f\u7f8e\u56fdTreck\u516c\u53f8\u7684\u4e00\u5957\u4e13\u7528\u4e8e\u5d4c\u5165\u5f0f\u7cfb\u7edf\u7684TCP\uff08\u4f20\u8f93\u63a7\u5236\u534f\u8bae\uff09/IP\uff08\u7f51\u9645\u4e92\u8fde\u534f\u8bae\uff09\u5957\u4ef6\u3002\r\n\r\nTreck TCP/IP\u4e2d\u7684DNS\u89e3\u6790\u7a0b\u5e8f\u7ec4\u4ef6\u5b58\u5728\u8f93\u5165\u9a8c\u8bc1\u9519\u8bef\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u8fdc\u7a0b\u6267\u884c\u4ee3\u7801\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Treck TCP/IP\u8f93\u5165\u9a8c\u8bc1\u9519\u8bef\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "Treck TCP/IP stack \u003c6.0.1.66"
},
"referenceLink": "https://www.us-cert.gov/ics/advisories/icsa-20-168-01",
"serverity": "\u9ad8",
"submitTime": "2020-06-17",
"title": "Treck TCP/IP\u8f93\u5165\u9a8c\u8bc1\u9519\u8bef\u6f0f\u6d1e"
}
CVE-2020-11901
Vulnerability from csaf_se - Published: 2020-06-23 16:00 - Updated: 2022-08-08 13:57Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "We strongly recommend the following industry cybersecurity best practices.\n\nhttps://www.se.com/us/en/download/document/7EN52-0390/\n* Locate control and safety system networks and remote devices behind firewalls and isolate them from the business network.\n* Install physical controls so no unauthorized personnel can access your industrial control and safety systems, components, peripheral equipment, and networks.\n* Place all controllers in locked cabinets and never leave them in the \u201cProgram\u201d mode.\n* Never connect programming software to any network other than the network intended for that device.\n* Scan all methods of mobile data exchange with the isolated network such as CDs, USB drives, etc. before use in the terminals or any node connected to these networks.\n* Never allow mobile devices that have connected to any other network besides the intended network to connect to the safety or control networks without proper sanitation.\n* Minimize network exposure for all control system devices and systems and ensure that they are not accessible from the Internet.\n* When remote access is required, use secure methods, such as Virtual Private Networks (VPNs). Recognize that VPNs may have vulnerabilities and should be updated to the most current version available. Also, understand that VPNs are only as secure as the connected devices.\nFor more information refer to the Schneider Electric Recommended Cybersecurity Best Practices document. \n",
"title": "General Security Recommendations"
},
{
"category": "general",
"text": "This document provides an overview of the identified vulnerability or vulnerabilities and actions required to mitigate. For more details and assistance on how to protect your installation, contact your local Schneider Electric representative or Schneider Electric Industrial Cybersecurity Services: https://www.se.com/ww/en/work/solutions/cybersecurity/. These organizations will be fully aware of this situation and can support you through the process.\nFor further information related to cybersecurity in Schneider Electric\u2019s products, visit the company\u2019s cybersecurity support portal page: https://www.se.com/ww/en/work/support/cybersecurity/overview.jsp",
"title": "For More Information"
},
{
"category": "legal_disclaimer",
"text": "THIS NOTIFICATION DOCUMENT, THE INFORMATION CONTAINED HEREIN, AND ANY MATERIALS LINKED FROM IT (COLLECTIVELY, THIS \u201cNOTIFICATION\u201d) ARE INTENDED TO HELP PROVIDE AN OVERVIEW OF THE IDENTIFIED SITUATION AND SUGGESTED MITIGATION ACTIONS, REMEDIATION, FIX, AND/OR GENERAL SECURITY RECOMMENDATIONS AND IS PROVIDED ON AN \u201cAS-IS\u201d BASIS WITHOUT WARRANTY OR GUARANTEE OF ANY KIND. SCHNEIDER ELECTRIC DISCLAIMS ALL WARRANTIES RELATING TO THIS NOTIFICATION, EITHER EXPRESS OR IMPLIED, INCLUDING WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. SCHNEIDER ELECTRIC MAKES NO WARRANTY THAT THE NOTIFICATION WILL RESOLVE THE IDENTIFIED SITUATION. IN NO EVENT SHALL SCHNEIDER ELECTRIC BE LIABLE FOR ANY DAMAGES OR LOSSES WHATSOEVER IN CONNECTION WITH THIS NOTIFICATION, INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF SCHNEIDER ELECTRIC HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. YOUR USE OF THIS NOTIFICATION IS AT YOUR OWN RISK, AND YOU ARE SOLELY LIABLE FOR ANY DAMAGES TO YOUR SYSTEMS OR ASSETS OR OTHER LOSSES THAT MAY RESULT FROM YOUR USE OF THIS NOTIFICATION. SCHNEIDER ELECTRIC RESERVES THE RIGHT TO UPDATE OR CHANGE THIS NOTIFICATION AT ANY TIME AND IN ITS SOLE DISCRETION",
"title": "LEGAL DISCLAIMER"
},
{
"category": "general",
"text": "At Schneider, we believe access to energy and digital is a basic human right. We empower all to do more with less, ensuring Life Is On everywhere, for everyone, at every moment.\n\nWe provide energy and automation digital solutions for efficiency and sustainability. We combine world-leading energy technologies, real-time automation, software and services into integrated solutions for Homes, Buildings, Data Centers, Infrastructure and Industries.\n\nWe are committed to unleash the infinite possibilities of an open, global, innovative community that is passionate with our Meaningful Purpose, Inclusive and Empowered values.\n\nwww.se.com ",
"title": "About Schneider Electric"
},
{
"category": "summary",
"text": "Schneider Electric is aware of multiple vulnerabilities affecting Treck Inc.\u2019s embedded TCP/IP stack, collectively known as Ripple20, which Treck disclosed publicly on June 16. The vulnerabilities range in severity and therefore have varying levels of risk.\r\nSchneider Electric continues to assess how the newly disclosed vulnerabilities affect its offers. The company will continue to update this notification as additional offer-specific information becomes available.\r\nCustomers should immediately ensure they have implemented cybersecurity best practices across their operations to protect themselves from possible exploitation of these vulnerabilities. Where appropriate, this includes locating their industrial systems and remotely accessible devices behind firewalls; installing physical controls to prevent unauthorized access; preventing mission-critical systems and devices from being accessed from outside networks; and following the remediation and general security recommendations below.\r\nFor additional information and support, please contact your Schneider Electric sales or service representative or Schneider Electric\u2019s Customer Care Center.\r\nAugust 2022 Update: Added final mitigations for AVT6000 Medium Voltage Altivar Process Drive (page 2).",
"title": "Overview"
}
],
"publisher": {
"category": "vendor",
"contact_details": "cybersecurity@se.com",
"name": "Schneider Electric CPCERT",
"namespace": "https://www.se.com/ww/en/work/support/cybersecurity/security-notifications.jsp"
},
"references": [
{
"category": "self",
"summary": "Treck TCP/IP Vulnerabilities (Ripple20) - SEVD-2020-175-01 PDF Version",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2020-175-01\u0026p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=SEVD-2020-175-01_Treck_Vulnerabilities_Ripple20_Security_Notification_V2.18.pdf"
},
{
"category": "self",
"summary": "Treck TCP/IP Vulnerabilities (Ripple20) - SEVD-2020-175-01 CSAF Version",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2020-175-01\u0026p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=sevd-2020-175-01.json"
},
{
"category": "external",
"summary": "Recommended Cybersecurity Best Practices",
"url": "https://www.se.com/us/en/download/document/7EN52-0390/"
}
],
"title": "Treck TCP/IP Vulnerabilities (Ripple20)",
"tracking": {
"current_release_date": "2022-08-08T13:57:08.970Z",
"generator": {
"date": "2022-08-10T14:27:48.879Z",
"engine": {
"name": "Schneider Electric CSAF Generator",
"version": "1.1"
}
},
"id": "sevd-2020-175-01",
"initial_release_date": "2020-06-23T16:00:00.000Z",
"revision_history": [
{
"date": "2020-06-23T16:00:00.000Z",
"number": "1.0.0",
"summary": "Original Release"
},
{
"date": "2020-06-24T16:00:00.000Z",
"number": "1.1.0",
"summary": "- Added link to related SEVD-2020-174-01 Security Notification document for Network Management Card (NMC) offers (pages 4-5)\n- Minor formatting changes"
},
{
"date": "2020-06-27T16:00:00.000Z",
"number": "1.2.0",
"summary": "- Enhanced Andover Continuum affected product information (page 3)\n- Minor formatting changes"
},
{
"date": "2020-07-02T16:00:00.000Z",
"number": "1.3.0",
"summary": "Added Acti9 Smartlink EL B to affected product list (page 2)"
},
{
"date": "2020-07-14T16:00:00.000Z",
"number": "1.4.0",
"summary": "Removed Smartlink ELEC (duplicate reference for Acti9 Smartlink EL B) from the affected product list (page 3)"
},
{
"date": "2020-07-29T16:00:00.000Z",
"number": "2.0.0",
"summary": "- Added Wiser Energy IP module by Schneider Electric, Wiser Energy IP module by Schneider Electric , and Gateway Connector by Elko to affected products list (page 5)\n- Added XUPH001 OsSense communication module and XGCS850C201 OsiSense RFID compact smart antenna to affected products list (page 2)\n- Removed PowerLogic EGX100, ECI850 Sepam IEC 61850 Server, and PowerLogic G3200 Modbus to IEC 61850 Gateway from affected products list. (page 3)"
},
{
"date": "2020-08-05T16:00:00.000Z",
"number": "2.1.0",
"summary": "Added remediation for Uninterruptible Power Supply (UPS) using NMC2 (page 2)"
},
{
"date": "2020-08-06T16:00:00.000Z",
"number": "2.2.0",
"summary": "Corrected affected version(s) and enhanced remediation/mitigation version details for Uninterruptible Power Supply (UPS) using NMC2 (page 2)"
},
{
"date": "2020-09-01T16:00:00.000Z",
"number": "2.3.0",
"summary": "Added remediation for Cooling Products using NMC2 and partial remediations for ATM3BC bus coupler module \u2013 EIP, TM3BC bus coupler module \u2013 SL, and TM3BC bus coupler module \u2013 CANOpen (page 2-3)"
},
{
"date": "2020-10-13T16:00:00.000Z",
"number": "2.4.0",
"summary": "Added remediation guidance for VW3A3310 Altivar 61/71 Modbus TCP, VW3A3310D Altivar 61/71 Ethernet daisy chain, VW3A3316 Altivar 61/71 Ethernet IP, and VW3A3320 Altivar 61/71 Ethernet IP RSTP options. (page 2-3)"
},
{
"date": "2020-10-23T16:00:00.000Z",
"number": "2.5.0",
"summary": "- Added remediation for EGX150/Link150 Ethernet Gateway , Acti9 PowerTag Link / HD , Acti9 Smartlink SI D , and Acti9 Smartlink SI B\n- All APC Network Management Card related impact and remediation information has been moved to the existing Security Notification SEVD-2020-174-01 for increased clarity.\n- Added PowerLogic EGX100 to affected products list\n\u2022 Note: Based on information received earlier this year, Schneider Electric originally determined that its PowerLogic EGX100 was not affected by vulnerabilities in Treck Inc.\u2019s embedded TCP/IP stack. After receiving additional information and analysis from Treck, Inc and JSOF, Schneider Electric has determined this offer is impacted. Users of this product are encouraged to apply the recommended mitigation actions immediately to minimize the risks associated with vulnerabilities in Treck Inc.\u2019s embedded TCP/IP stack."
},
{
"date": "2020-11-10T17:00:00.000Z",
"number": "2.6.0",
"summary": "Added remediations for eIFE Ethernet Interface for MasterPact MTZ drawout circuit breakers, IFE Ethernet Interface for ComPact, PowerPact, and MasterPact circuit breakers, and IFE Gateway (page 4)"
},
{
"date": "2020-12-08T17:00:00.000Z",
"number": "2.7.0",
"summary": "Added remediations for SCADAPack 32 RTU, XUPH001 OsSense communication module, XGCS850C201 OsiSense RFID compact smart antenna, ATV340E Altivar Machine Drives, ATV630/650/660/680/6A0/6B0 Altivar Process Drives, ATV930/950/960/980/9A0/9B0 Altivar Process Drives, VW3A3720, VW3A3721 Altivar Process Communication Modules, ACE850 Sepam communication interface, PowerLogic EGX300 Ethernet Gateway, PowerLogic EGX100 Ethernet Gateway, Acti9 Smartlink IP (page 2, 4-5)"
},
{
"date": "2020-12-08T17:00:00.000Z",
"number": "2.8.0",
"summary": "Added remediations for EcoStruxure Building SmartX IP RP"
},
{
"date": "2021-01-12T17:00:00.000Z",
"number": "2.9.0",
"summary": "Added remediations for PowerLogic PM5000 Series Power Meters in Download Links section (page 11)"
},
{
"date": "2021-03-09T17:00:00.000Z",
"number": "2.10.0",
"summary": "Fixed version for EcoStruxure Building SmartX IP MP Controllers and EcoStruxure Building SmartX IP RP Controllers corrected to 3.02.02 (previously listed as 3.02.01) (page 6)"
},
{
"date": "2021-04-12T16:00:00.000Z",
"number": "2.11.0",
"summary": "Added remediation for Acti9 PowerTag Link C (page 5)"
},
{
"date": "2021-05-11T16:00:00.000Z",
"number": "2.12.0",
"summary": "Added remediation for ZBRCETH Modbus TCP communication\nmodule for ZBRN1 Harmony Hub (page 4)"
},
{
"date": "2021-07-13T16:00:00.000Z",
"number": "2.13.0",
"summary": "Added remediation for TM3 bus coupler modules \u2013 EIP/SL/CANOpen and Acti9 Smartlink EL B A9XELC08 (page 2-3, 5)"
},
{
"date": "2021-08-10T16:00:00.000Z",
"number": "2.14.0",
"summary": "Corrected download links for TM3 bus coupler modules \u2013 EIP/SL/CANOpen (page 2-3)"
},
{
"date": "2021-11-09T17:00:00.000Z",
"number": "2.15.0",
"summary": "Added remediation for TeSys T LTMRxxEyy Motor Controllers (page 8)"
},
{
"date": "2021-11-18T17:00:00.000Z",
"number": "2.16.0",
"summary": "Added remediation for Wiser Energy IP module by Schneider Electric (EER31800), Wiser Energy IP module by Clipsal (EER72600), and Gateway Connector by Elko (EKO01827) (page 6-7)"
},
{
"date": "2022-03-08T17:00:00.000Z",
"number": "2.17.0",
"summary": "Added final mitigations for Andover Continuum Controllers (page 6)"
},
{
"date": "2022-08-09T16:00:00.000Z",
"number": "2.18.0",
"summary": "Added final mitigations for AVT6000 Medium Voltage Altivar Process Drive (page 2)"
}
],
"status": "final",
"version": "2.18.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c3.2IE25",
"product": {
"name": "Schneider Electric ATV340E Altivar Machine Drives prior to 3.2IE25",
"product_id": "CSAFPID-0002"
}
},
{
"category": "product_version",
"name": "3.2IE25",
"product": {
"name": "Schneider Electric ATV340E Altivar Machine Drives V3.2IE25",
"product_id": "CSAFPID-0003"
}
}
],
"category": "product_name",
"name": "ATV340E Altivar Machine Drives"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c3.3IE33",
"product": {
"name": "Schneider Electric ATV630/650/660/680/6A0/6B0 Altivar Process Drives prior to 3.3IE33",
"product_id": "CSAFPID-0004"
}
},
{
"category": "product_version",
"name": "3.3IE26",
"product": {
"name": "Schneider Electric ATV630/650/660/680/6A0/6B0 Altivar Process Drives V3.3IE26",
"product_id": "CSAFPID-0005"
}
}
],
"category": "product_name",
"name": "ATV630/650/660/680/6A0/6B0 Altivar Process Drives"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c3.3IE26",
"product": {
"name": "Schneider Electric ATV930/950/960/980/9A0/9B0 Altivar Process Drives prior to V3.3IE26",
"product_id": "CSAFPID-0006"
}
},
{
"category": "product_version",
"name": "V3.3IE26",
"product": {
"name": "Schneider Electric ATV930/950/960/980/9A0/9B0 Altivar Process Drives V3.3IE26",
"product_id": "CSAFPID-0007"
}
}
],
"category": "product_name",
"name": "ATV930/950/960/980/9A0/9B0 Altivar Process Drives"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c1.6IE01",
"product": {
"name": "Schneider Electric ATV6000 Medium Voltage Altivar Process Drives prior to V1.6IE01",
"product_id": "CSAFPID-0008"
}
},
{
"category": "product_version_range",
"name": "\u003e=3.3IE26",
"product": {
"name": "Schneider Electric ATV6000 Medium Voltage Altivar Process Drives Version 3.3IE26 and later",
"product_id": "CSAFPID-0009"
}
}
],
"category": "product_name",
"name": "ATV6000 Medium Voltage Altivar Process Drives"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c2.25",
"product": {
"name": "Schneider Electric SCADAPack 32 RTU prior to V2.25",
"product_id": "CSAFPID-0010"
}
},
{
"category": "product_version_range",
"name": "\u003e=2.25",
"product": {
"name": "Schneider Electric SCADAPack 32 RTU version 2.25 and later",
"product_id": "CSAFPID-0011"
}
}
],
"category": "product_name",
"name": "SCADAPack 32 RTU"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c2.2.1.1",
"product": {
"name": "Schneider Electric TM3BC bus coupler module \u2013 EIP prior to V2.2.1.1",
"product_id": "CSAFPID-0012"
}
},
{
"category": "product_version",
"name": "2.2.1.1",
"product": {
"name": "Schneider Electric TM3BC bus coupler module \u2013 EIP V2.2.1.1",
"product_id": "CSAFPID-0013"
}
}
],
"category": "product_name",
"name": "TM3BC bus coupler module \u2013 EIP"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c2.1.1.1",
"product": {
"name": "Schneider Electric TM3BC bus coupler module - SL prior to V2.1.1.1",
"product_id": "CSAFPID-0014"
}
},
{
"category": "product_version",
"name": "2.1.1.1",
"product": {
"name": "Schneider Electric TM3BC bus coupler module - SL V2.1.1.1",
"product_id": "CSAFPID-0015"
}
}
],
"category": "product_name",
"name": "TM3BC bus coupler module - SL"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c2.1.1.1",
"product": {
"name": "Schneider Electric TM3BC bus coupler module - CANOpen prior to V2.1.1.1",
"product_id": "CSAFPID-0016"
}
},
{
"category": "product_version",
"name": "2.1.1.1",
"product": {
"name": "Schneider Electric TM3BC bus coupler module - CANOpen V2.1.1.1",
"product_id": "CSAFPID-0017"
}
}
],
"category": "product_name",
"name": "TM3BC bus coupler module - CANOpen"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=2.1IE09",
"product": {
"name": "Schneider Electric VW3A3310 Altivar 61/71 Modbus TCP option version 2.1IE09 and prior",
"product_id": "CSAFPID-0018"
}
}
],
"category": "product_name",
"name": "VW3A3310 Altivar 61/71 Modbus TCP option"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=3.0IE11",
"product": {
"name": "Schneider Electric VW3A3310D Altivar 61/71 Ethernet daisy chain option Version 3.0IE11 and prior",
"product_id": "CSAFPID-0019"
}
}
],
"category": "product_name",
"name": "VW3A3310D Altivar 61/71 Ethernet daisy chain option"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=V1.2IE14",
"product": {
"name": "Schneider Electric VW3A3320 Altivar 61/71 Ethernet IP option Version V1.2IE14 and prior",
"product_id": "CSAFPID-0052"
}
}
],
"category": "product_name",
"name": "VW3A3320 Altivar 61/71 Ethernet IP option"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=V1.1IE19",
"product": {
"name": "Schneider Electric VW3A3320 Altivar 61/71 Ethernet IP RSTP option version V1.1IE19 and prior",
"product_id": "CSAFPID-0020"
}
}
],
"category": "product_name",
"name": "VW3A3320 Altivar 61/71 Ethernet IP RSTP option"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Schneider Electric XUPH001 OsSense communication module all versions",
"product_id": "CSAFPID-0021"
}
}
],
"category": "product_name",
"name": "XUPH001 OsSense communication module"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Schneider Electric XGCS850C201 OsiSense RFID compact smart antenna all versions",
"product_id": "CSAFPID-0022"
}
}
],
"category": "product_name",
"name": "XGCS850C201 OsiSense RFID compact smart antenna"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV1.15IE25",
"product": {
"name": "Schneider Electric VW3A3720, VW3A3721 Altivar Process Communication Modules All Versions prior to V1.15IE25",
"product_id": "CSAFPID-0023"
}
},
{
"category": "product_version_range",
"name": "\u003e=V1.15IE25",
"product": {
"name": "Schneider Electric VW3A3720, VW3A3721 Altivar Process Communication Modules version V1.15IE25 and prior",
"product_id": "CSAFPID-0024"
}
}
],
"category": "product_name",
"name": "VW3A3720, VW3A3721 Altivar Process Communication Modules"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=SV:02.04|\u003c= PV:02|\u003c=RL:02",
"product": {
"name": "Schneider Electric ZBRCETH Modbus TCP communication \u003c=SV:02.04 | \u003c= PV:02 | \u003c=RL:02 ",
"product_id": "CSAFPID-0025"
}
},
{
"category": "product_version_range",
"name": "\u003e=SV:02.05|\u003e=PV:03|\u003e=RL:03",
"product": {
"name": "Schneider Electric ZBRCETH Modbus TCP communication \u003e=SV:02.05|\u003e=PV:03|\u003e=RL:03",
"product_id": "CSAFPID-0035"
}
}
],
"category": "product_name",
"name": "ZBRCETH Modbus TCP communication"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Schneider Electric ACE850 Sepam communication interface all versions",
"product_id": "CSAFPID-0026"
}
}
],
"category": "product_name",
"name": "ACE850 Sepam communication interface"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Schneider Electric Acti9 Smartlink EL B A9XELC08 all versions",
"product_id": "CSAFPID-0027"
}
}
],
"category": "product_name",
"name": "Acti9 Smartlink EL B A9XELC08"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Schneider Electric Acti9 Smartlink IP all versions",
"product_id": "CSAFPID-0028"
}
}
],
"category": "product_name",
"name": "Acti9 Smartlink IP"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=V1.7.4",
"product": {
"name": "Schneider Electric Acti9 PowerTag Link C (Formerly named Acti9 Smartlink EL D) version V1.7.4 and prior",
"product_id": "CSAFPID-0029"
}
}
],
"category": "product_name",
"name": "Acti9 PowerTag Link C (Formerly named Acti9 Smartlink EL D)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "V6.2",
"product": {
"name": "Schneider Electric Acti9 PowerTag Link C (Formerly named Acti9 Smartlink EL D) V6.2",
"product_id": "CSAFPID-0053"
}
}
],
"category": "product_name",
"name": "Acti9 PowerTag Link C (Formerly named Acti9 Smartlink EL D)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Schneider Electric Andover Continuum controller models all versions",
"product_id": "CSAFPID-0030",
"product_identification_helper": {
"model_numbers": [
"NetController 1 (NC1) = Model CX9900",
"NetController 2 (NC2) = Model CX9680",
"ACX2 = Model ACX5720 and ACX5740",
"CX9200 series",
"CX9400 series",
"CX9924",
"CX9702",
"BCX4040 series",
"BCX9640 series"
]
}
}
}
],
"category": "product_name",
"name": "Andover Continuum controller models"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=V1.7.4",
"product": {
"name": "Schneider Electric Wiser Energy IP module by Schneider Electric (EER31800) version V1.7.4 and prior",
"product_id": "CSAFPID-0031"
}
},
{
"category": "product_version",
"name": "6.2",
"product": {
"name": "Schneider Electric Wiser Energy IP module by Schneider Electric (EER31800) 6.2",
"product_id": "CSAFPID-0054"
}
}
],
"category": "product_name",
"name": "Wiser Energy IP module by Schneider Electric (EER31800)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=V1.7.4",
"product": {
"name": "Schneider Electric Wiser Energy IP module by Clipsal (EER72600) version V1.7.4 and prior",
"product_id": "CSAFPID-0032"
}
},
{
"category": "product_version",
"name": "6.2",
"product": {
"name": "Schneider Electric Wiser Energy IP module by Clipsal (EER72600) 6.2",
"product_id": "CSAFPID-0056"
}
}
],
"category": "product_name",
"name": "Wiser Energy IP module by Clipsal (EER72600)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=V1.7.4",
"product": {
"name": "Schneider Electric Gateway Connector by Elko (EKO01827) version V1.7.4 and prior",
"product_id": "CSAFPID-0033"
}
},
{
"category": "product_version",
"name": "6.2",
"product": {
"name": "Schneider Electric Gateway Connector by Elko (EKO01827) 6.2",
"product_id": "CSAFPID-0057"
}
}
],
"category": "product_name",
"name": "Gateway Connector by Elko (EKO01827)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c001.008.007",
"product": {
"name": "Schneider Electric Acti9 PowerTag Link / HD version prior to 001.008.007",
"product_id": "CSAFPID-0034"
}
},
{
"category": "product_version",
"name": "7.0",
"product": {
"name": "Schneider Electric Acti9 PowerTag Link / HD 7.0",
"product_id": "CSAFPID-0055"
}
}
],
"category": "product_name",
"name": "Acti9 PowerTag Link / HD"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c002.004.002",
"product": {
"name": "Schneider Electric Acti9 Smartlink SI D version prior to 002.004.002",
"product_id": "CSAFPID-0036"
}
}
],
"category": "product_name",
"name": "Acti9 Smartlink SI D"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c002.004.002",
"product": {
"name": "Schneider Electric Acti9 Smartlink SI B version prior to 002.004.002",
"product_id": "CSAFPID-0037"
}
}
],
"category": "product_name",
"name": "Acti9 Smartlink SI B"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=V5.1.15",
"product": {
"name": "Schneider Electric EGX150/Link150 Ethernet Gateway version V5.1.15 and prior",
"product_id": "CSAFPID-0038"
}
},
{
"category": "product_version",
"name": "V5.1.18",
"product": {
"name": "Schneider Electric EGX150/Link150 Ethernet Gateway V5.1.18",
"product_id": "CSAFPID-0039"
}
}
],
"category": "product_name",
"name": "EGX150/Link150 Ethernet Gateway"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV4.001.000",
"product": {
"name": "Schneider Electric eIFE Ethernet Interface for MasterPact MTZ drawout circuit breakers Firmware versions prior to V4.001.000",
"product_id": "CSAFPID-0042"
}
}
],
"category": "product_name",
"name": "eIFE Ethernet Interface for MasterPact MTZ drawout circuit breakers"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Schneider Electric EcoStruxure Building SmartX IP MP Controllers all versions",
"product_id": "CSAFPID-0040"
}
},
{
"category": "product_version_range",
"name": "\u003e=3.02.02",
"product": {
"name": "Schneider Electric EcoStruxure Building SmartX IP MP Controllers versions 3.02.02 and later",
"product_id": "CSAFPID-0041"
}
}
],
"category": "product_name",
"name": "EcoStruxure Building SmartX IP MP Controllers"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Schneider Electric EcoStruxure Building SmartX IP RP Controllers All versions",
"product_id": "CSAFPID-0043"
}
},
{
"category": "product_version_range",
"name": "\u003e=3.02.02",
"product": {
"name": "Schneider Electric EcoStruxure Building SmartX IP RP Controllers version 3.02.02 and later",
"product_id": "CSAFPID-0044"
}
}
],
"category": "product_name",
"name": "EcoStruxure Building SmartX IP RP Controllers"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV4.001.000",
"product": {
"name": "Schneider Electric IFE Ethernet Interface for ComPact, PowerPact, and MasterPact circuit breakers Firmware versions prior to V4.001.000",
"product_id": "CSAFPID-0046"
}
}
],
"category": "product_name",
"name": "IFE Ethernet Interface for ComPact, PowerPact, and MasterPact circuit breakers"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV3.011.003",
"product": {
"name": "Schneider Electric IFE Gateway Firmware versions prior to V3.011.003",
"product_id": "CSAFPID-0045"
}
}
],
"category": "product_name",
"name": "IFE Gateway"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=3.0",
"product": {
"name": "Schneider Electric PowerLogic EGX100 Ethernet Gateway verison 3.0 and later",
"product_id": "CSAFPID-0047"
}
}
],
"category": "product_name",
"name": "PowerLogic EGX100 Ethernet Gateway"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Schneider Electric PowerLogic EGX300 Ethernet Gateway all version",
"product_id": "CSAFPID-0048"
}
}
],
"category": "product_name",
"name": "PowerLogic EGX300 Ethernet Gateway"
},
{
"branches": [
{
"category": "product_version_range",
"name": "Specified in Download Links section",
"product": {
"name": "Schneider Electric PowerLogic PM5000 series power meters Specified in Download Links section",
"product_id": "CSAFPID-0049"
}
}
],
"category": "product_name",
"name": "PowerLogic PM5000 series power meters"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=V2.8",
"product": {
"name": "Schneider Electric TeSys T LTMRxxEyy Motor Controllers version V2.8 and prior",
"product_id": "CSAFPID-0050"
}
},
{
"category": "product_version",
"name": "V2.9",
"product": {
"name": "Schneider Electric TeSys T LTMRxxEyy Motor Controllers V2.9",
"product_id": "CSAFPID-0051"
}
}
],
"category": "product_name",
"name": "TeSys T LTMRxxEyy Motor Controllers"
}
],
"category": "vendor",
"name": "Schneider Electric"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-11896",
"notes": [
{
"category": "details",
"text": "Additional details on these specific vulnerabilities can be found on the ICS-CERT Advisory at https://www.us-cert.gov/ics/advisories/ICSA-20-168-01."
}
],
"product_status": {
"fixed": [
"CSAFPID-0003",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0013",
"CSAFPID-0015",
"CSAFPID-0017",
"CSAFPID-0025",
"CSAFPID-0053",
"CSAFPID-0054",
"CSAFPID-0056",
"CSAFPID-0057"
],
"known_affected": [
"CSAFPID-0002",
"CSAFPID-0004",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0014",
"CSAFPID-0016",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0052",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0050"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V3.2IE25 and above.\nFor product release prior to V3.2IE25, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V3.3IE33 and above.\nFor product release prior to V3.3IE33, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0004"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V3.3IE26 and above.\nFor product release prior V3.3IE26, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0006"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V1.6IE01 and above. For product release prior to V1.6IE01, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0008"
]
},
{
"category": "vendor_fix",
"details": "Telepace Studio must be used to update the SCADAPack 32 RTU firmware to version 2.25 or newer.\nDownload and install Telepace Studio 5.4.2 or newer from https://shop.exchange.se.com/en-US/apps/55670",
"product_ids": [
"CSAFPID-0010"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in firmware version V2.2.1.1 available for download below:\nhttps://www.se.com/ww/en/download/document/TM3BC_EIP_2_2_1_1/",
"product_ids": [
"CSAFPID-0012"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in firmware version V2.1.1.1 available for download below:\nhttps://www.se.com/ww/en/download/document/TM3BC_MBSL_2_1_1_1/",
"product_ids": [
"CSAFPID-0014"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in firmware version V2.1.1.1 available for download below:\nhttps://www.se.com/ww/en/download/document/TM3BC_CO_2_1_1_1/",
"product_ids": [
"CSAFPID-0016"
]
},
{
"category": "no_fix_planned",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0018"
]
},
{
"category": "no_fix_planned",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0019"
]
},
{
"category": "none_available",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0052"
]
},
{
"category": "no_fix_planned",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0020"
]
},
{
"category": "mitigation",
"details": "This offer is not affected by CVE-2020-11897, CVE-2020-11899, CVE-2020-11900, CVE-2020-11902, CVE-2020-11903, CVE-2020-11905, CVE-2020-11908, CVE-2020-11913.\nFor other CVEs, the CVSS score is evaluated as Medium in the product context.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0021"
]
},
{
"category": "mitigation",
"details": "This offer is not affected by CVE-2020-11897, CVE-2020-11899, CVE-2020-11900, CVE-2020-11902, CVE-2020-11903, CVE-2020-11905, CVE-2020-11908, CVE-2020-11913.\nFor other CVEs, the CVSS score is evaluated as Medium in the product context.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0022"
]
},
{
"category": "vendor_fix",
"details": "A fix is available in product releases V1.15IE25 and above.\nFor product release prior V1.15IE25, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0023"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases\nSV:02.05, PV:03, RL:03 and above.\nFor product release prior to SV:02.05, PV:03, RL:03, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for\nmore information on upgrading to SV:02.05.",
"product_ids": [
"CSAFPID-0025"
]
},
{
"category": "mitigation",
"details": "The ACE850 ethernet module for SEPAM protection relays is a product designed to be operated on a secure network.\nTo minimize the risk from both Ripple 20 and the network-accessible functions of the relay we recommend that concerned customers:\n- Enable the IP-based filtering capability in the ACE850\n- Place strong, active controls on the network hosting the ACE850\n- Consider moving to a newer relay such as the Easergy series if product-level access protections are required\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0026"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization Offer.\nIf possible, this product should be replaced by PowerTagLink-C (commercial reference A9XELC10 for which a patch is available from version 1.7.5 or greater.\nFor specific applications not supported by PowerTag Link C (pulse metering, Acti9 RCA, Acti9 iPF+SD 24), apply the mitigation detailed in the Recommended Mitigation section.",
"product_ids": [
"CSAFPID-0027"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nIf possible, this product should be replaced by Smartlink SIB (commercial reference: A9XMZA08) for which a patch is available in FW version 2.18 or greater.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0028"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Acti9 PowerTag Link C which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0029"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nCustomers should immediately apply the mitigations detailed in the Recommended Mitigations section below to reduce the risk of exploit.\nCustomers should also consider upgrading to EcoStruxure Building Operation which is not impacted by this vulnerability.",
"product_ids": [
"CSAFPID-0030"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Wiser Energy IP module by Schneider Electric which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0031"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Wiser Energy IP module by Clipsal which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0032"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Gateway Connector by Elko which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0033"
]
},
{
"category": "vendor_fix",
"details": "Customers should update firmware using EcoStruxure Power Commission (EPC) installer V7.0 available here: https://www.se.com/ww/en/product-range-download/64482-acti9-powertag-link/?selected-nodeid=12492093362#/software-firmware-tab",
"product_ids": [
"CSAFPID-0034"
]
},
{
"category": "vendor_fix",
"details": "Customers should update firmware using EcoStruxure Power Commission (EPC) installer V7.0 available here: https://www.se.com/ww/en/product-range-download/64482-acti9-powertag-link/?selected-nodeid=12492093362#/software-firmware-tab",
"product_ids": [
"CSAFPID-0036",
"CSAFPID-0037"
]
},
{
"category": "vendor_fix",
"details": "A fix is available in V5.1.18: https://www.se.com/ww/en/product-range-download/63423-link150/?selected-node-id=12366756685 - /software-firmware-tab",
"product_ids": [
"CSAFPID-0038"
]
},
{
"category": "vendor_fix",
"details": "The firmware is available through EcoStruxure Power Commission (EPC) software V2.18. The updated version of EPC is available here:\nhttps://www.se.com/ww/en/download/document/Ecoreach_Installer/",
"product_ids": [
"CSAFPID-0042"
]
},
{
"category": "vendor_fix",
"details": "All issues remediated in the 3.02.02 release, and higher. Update files can be found on the Schneider Electric Exchange https://ecoxpert.se.com/ --\n1. Search for \u2018relebov3.2.1\u2019\n2. Set the Filter criteria to RN or Firmware, as required.",
"product_ids": [
"CSAFPID-0040"
]
},
{
"category": "vendor_fix",
"details": "All issues remediated in the 3.02.02\nrelease, and higher. Update files can be found on the Schneider Electric Exchange https://ecoxpert.se.com/\n1. Search for \u2018relebov3.2.1\u2019\n2. Set the Filter criteria to RN or Firmware, as required",
"product_ids": [
"CSAFPID-0043"
]
},
{
"category": "vendor_fix",
"details": "The firmware is available through EcoStruxure Power Commission (EPC) software V2.18. The updated version of EPC is available here:\nhttps://www.se.com/ww/en/download/document/Ecoreach_Installer/",
"product_ids": [
"CSAFPID-0046"
]
},
{
"category": "vendor_fix",
"details": "The firmware is available through EcoStruxure Power Commission (EPC) software V2.18. The updated version of EPC is available here:\nhttps://www.se.com/ww/en/download/document/Ecoreach_Installer/",
"product_ids": [
"CSAFPID-0045"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nIf possible, this product should be replaced by Link 150 (commercial reference: EGX150) for which a patch is available in FW version 5.1.18 or greater.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0047"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nIf possible, this product should be replaced by Com\u2019X510 (commercial reference: EBX510) which is not impacted by this vulnerability.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0048"
]
},
{
"category": "vendor_fix",
"details": "PowerLogic PM5000 Model,Affected Version,Remediation/Mitigation\n\"PM5560, PM5563, PM5580\",V2.7.8 and earlier,\"A fix in V2.8.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5560_PM5563_PM5580_V2.8.3_Release.zip\u0026p_Doc_Ref=PM5560_PM5563_PM5580\"\nPM5561,V10.7.1 and earlier,\"A fix in V10.7.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5561_upgrade_10.7.3_Release.zip\u0026p_Doc_Ref=PM5561\"\nPM5650,V2.10.1 and earlier,\"A fix in V2.11.2 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5650_upgrade_V2.11.2_Release.zip\u0026p_Doc_Ref=PM5650\"\nPM5570,V3.1.0 and earlier,\"A fix in V3.1.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5570_upgrade_V3.1.3_Release.zip\u0026p_Doc_Ref=PM5570\"\nPM5660,V3.1.1 and earlier,\"A fix in V3.1.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5660_upgrade_V3.1.3_Release.zip\u0026p_Doc_Ref=PM5660\"\nPM5760,V3.1.1 and earlier,\"A fix in V3.1.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5760_upgrade_V3.1.3_Release.zip\u0026p_Doc_Ref=PM5760\"\n\"PM5320, PM5340\",V2.1.3 and earlier,\"A fix in V2.1.5 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5320_PM5340_v2.1.5_HW_vB1.zip\u0026p_Doc_Ref=PM5320_PM5340\"\nPM5341,V2.4.1 and earlier,\"A fix in V2.4.4 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5341_v2.4.4_HW_vB1.zip\u0026p_Doc_Ref=PM5341\"",
"product_ids": [
"CSAFPID-0049"
]
},
{
"category": "vendor_fix",
"details": "Firmware V2.9 of the TeSys T LTMRxxEyy Motor Controllers includes a fix for this vulnerability and is available for download here:\nhttps://download.schneider-electric.com/files?p_Archive_Name=Evo_TeSysT_Pack-13.zip\u0026p_enDocType=Firmware\u0026p_Doc_Ref=Evo_TeSysT_Pack-13",
"product_ids": [
"CSAFPID-0050"
]
},
{
"category": "mitigation",
"details": "Since the vulnerabilities are present in the TCP/IP stack, an active network connection is required to exploit them. Therefore, Schneider Electric customers can act now to mitigate the risk of attack by limiting access to their devices.\nFor devices on a local network:\n\u2022 Network Partitioning: Locate devices behind firewalls capable of deep packet inspection with rulesets limiting access with only approved protocols and functions and to only those devices and endpoints requiring access.\n\u2022 Anomalous IP traffic: Block and detect anomalous IP traffic and malformed packets. Refer to the Solution section of the CERT-Coordination Center Vulnerability Note VU#257161 for details.\n\u2022 Disable DHCP on the NMC and configure it to use a static IP address.\n\u2022 To avoid the use of DNS, set DNS servers to 0.0.0.0 and utilize static IP addresses for all servers the NMC will connect.\n\u2022 If DNS must be used, then normalize DNS through a secure recursive server or application layer firewall\n\u2022 Enable only secure remote access methods. Disable any insecure protocols.\nFor devices that must communicate via the Internet:\n\u2022 Minimize network exposure for embedded and critical devices, keeping exposure to the minimum necessary, and ensuring that devices are not accessible from the Internet unless absolutely essential.\nIf network access is not required:\n\u2022 Remove the Ethernet cable from the affected device.\nAdditional mitigations:\n\u2022 Access Controls: Install physical and logical controls so no unauthorized personnel or device can access your systems, components, peripheral equipment, and networks.\nFor more details and assistance on how to protect your installation, please contact your local Schneider Electric Industrial Cybersecurity Services organization, which is fully aware of this situation and can support you through the process.",
"product_ids": [
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2020-11897",
"notes": [
{
"category": "details",
"text": "Additional details on these specific vulnerabilities can be found on the ICS-CERT Advisory at https://www.us-cert.gov/ics/advisories/ICSA-20-168-01."
}
],
"product_status": {
"fixed": [
"CSAFPID-0003",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0013",
"CSAFPID-0015",
"CSAFPID-0017",
"CSAFPID-0025",
"CSAFPID-0053",
"CSAFPID-0054",
"CSAFPID-0056",
"CSAFPID-0057"
],
"known_affected": [
"CSAFPID-0002",
"CSAFPID-0004",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0014",
"CSAFPID-0016",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0052",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0050"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V3.2IE25 and above.\nFor product release prior to V3.2IE25, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V3.3IE33 and above.\nFor product release prior to V3.3IE33, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0004"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V3.3IE26 and above.\nFor product release prior V3.3IE26, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0006"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V1.6IE01 and above. For product release prior to V1.6IE01, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0008"
]
},
{
"category": "vendor_fix",
"details": "Telepace Studio must be used to update the SCADAPack 32 RTU firmware to version 2.25 or newer.\nDownload and install Telepace Studio 5.4.2 or newer from https://shop.exchange.se.com/en-US/apps/55670",
"product_ids": [
"CSAFPID-0010"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in firmware version V2.2.1.1 available for download below:\nhttps://www.se.com/ww/en/download/document/TM3BC_EIP_2_2_1_1/",
"product_ids": [
"CSAFPID-0012"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in firmware version V2.1.1.1 available for download below:\nhttps://www.se.com/ww/en/download/document/TM3BC_MBSL_2_1_1_1/",
"product_ids": [
"CSAFPID-0014"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in firmware version V2.1.1.1 available for download below:\nhttps://www.se.com/ww/en/download/document/TM3BC_CO_2_1_1_1/",
"product_ids": [
"CSAFPID-0016"
]
},
{
"category": "no_fix_planned",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0018"
]
},
{
"category": "no_fix_planned",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0019"
]
},
{
"category": "none_available",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0052"
]
},
{
"category": "no_fix_planned",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0020"
]
},
{
"category": "vendor_fix",
"details": "A fix is available in product releases V1.15IE25 and above.\nFor product release prior V1.15IE25, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0023"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases\nSV:02.05, PV:03, RL:03 and above.\nFor product release prior to SV:02.05, PV:03, RL:03, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for\nmore information on upgrading to SV:02.05.",
"product_ids": [
"CSAFPID-0025"
]
},
{
"category": "mitigation",
"details": "The ACE850 ethernet module for SEPAM protection relays is a product designed to be operated on a secure network.\nTo minimize the risk from both Ripple 20 and the network-accessible functions of the relay we recommend that concerned customers:\n- Enable the IP-based filtering capability in the ACE850\n- Place strong, active controls on the network hosting the ACE850\n- Consider moving to a newer relay such as the Easergy series if product-level access protections are required\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0026"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization Offer.\nIf possible, this product should be replaced by PowerTagLink-C (commercial reference A9XELC10 for which a patch is available from version 1.7.5 or greater.\nFor specific applications not supported by PowerTag Link C (pulse metering, Acti9 RCA, Acti9 iPF+SD 24), apply the mitigation detailed in the Recommended Mitigation section.",
"product_ids": [
"CSAFPID-0027"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nIf possible, this product should be replaced by Smartlink SIB (commercial reference: A9XMZA08) for which a patch is available in FW version 2.18 or greater.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0028"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Acti9 PowerTag Link C which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0029"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nCustomers should immediately apply the mitigations detailed in the Recommended Mitigations section below to reduce the risk of exploit.\nCustomers should also consider upgrading to EcoStruxure Building Operation which is not impacted by this vulnerability.",
"product_ids": [
"CSAFPID-0030"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Wiser Energy IP module by Schneider Electric which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0031"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Wiser Energy IP module by Clipsal which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0032"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Gateway Connector by Elko which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0033"
]
},
{
"category": "vendor_fix",
"details": "Customers should update firmware using EcoStruxure Power Commission (EPC) installer V7.0 available here: https://www.se.com/ww/en/product-range-download/64482-acti9-powertag-link/?selected-nodeid=12492093362#/software-firmware-tab",
"product_ids": [
"CSAFPID-0034"
]
},
{
"category": "vendor_fix",
"details": "Customers should update firmware using EcoStruxure Power Commission (EPC) installer V7.0 available here: https://www.se.com/ww/en/product-range-download/64482-acti9-powertag-link/?selected-nodeid=12492093362#/software-firmware-tab",
"product_ids": [
"CSAFPID-0036",
"CSAFPID-0037"
]
},
{
"category": "vendor_fix",
"details": "A fix is available in V5.1.18: https://www.se.com/ww/en/product-range-download/63423-link150/?selected-node-id=12366756685 - /software-firmware-tab",
"product_ids": [
"CSAFPID-0038"
]
},
{
"category": "vendor_fix",
"details": "The firmware is available through EcoStruxure Power Commission (EPC) software V2.18. The updated version of EPC is available here:\nhttps://www.se.com/ww/en/download/document/Ecoreach_Installer/",
"product_ids": [
"CSAFPID-0042"
]
},
{
"category": "vendor_fix",
"details": "All issues remediated in the 3.02.02 release, and higher. Update files can be found on the Schneider Electric Exchange https://ecoxpert.se.com/ --\n1. Search for \u2018relebov3.2.1\u2019\n2. Set the Filter criteria to RN or Firmware, as required.",
"product_ids": [
"CSAFPID-0040"
]
},
{
"category": "vendor_fix",
"details": "All issues remediated in the 3.02.02\nrelease, and higher. Update files can be found on the Schneider Electric Exchange https://ecoxpert.se.com/\n1. Search for \u2018relebov3.2.1\u2019\n2. Set the Filter criteria to RN or Firmware, as required",
"product_ids": [
"CSAFPID-0043"
]
},
{
"category": "vendor_fix",
"details": "The firmware is available through EcoStruxure Power Commission (EPC) software V2.18. The updated version of EPC is available here:\nhttps://www.se.com/ww/en/download/document/Ecoreach_Installer/",
"product_ids": [
"CSAFPID-0046"
]
},
{
"category": "vendor_fix",
"details": "The firmware is available through EcoStruxure Power Commission (EPC) software V2.18. The updated version of EPC is available here:\nhttps://www.se.com/ww/en/download/document/Ecoreach_Installer/",
"product_ids": [
"CSAFPID-0045"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nIf possible, this product should be replaced by Link 150 (commercial reference: EGX150) for which a patch is available in FW version 5.1.18 or greater.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0047"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nIf possible, this product should be replaced by Com\u2019X510 (commercial reference: EBX510) which is not impacted by this vulnerability.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0048"
]
},
{
"category": "vendor_fix",
"details": "PowerLogic PM5000 Model,Affected Version,Remediation/Mitigation\n\"PM5560, PM5563, PM5580\",V2.7.8 and earlier,\"A fix in V2.8.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5560_PM5563_PM5580_V2.8.3_Release.zip\u0026p_Doc_Ref=PM5560_PM5563_PM5580\"\nPM5561,V10.7.1 and earlier,\"A fix in V10.7.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5561_upgrade_10.7.3_Release.zip\u0026p_Doc_Ref=PM5561\"\nPM5650,V2.10.1 and earlier,\"A fix in V2.11.2 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5650_upgrade_V2.11.2_Release.zip\u0026p_Doc_Ref=PM5650\"\nPM5570,V3.1.0 and earlier,\"A fix in V3.1.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5570_upgrade_V3.1.3_Release.zip\u0026p_Doc_Ref=PM5570\"\nPM5660,V3.1.1 and earlier,\"A fix in V3.1.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5660_upgrade_V3.1.3_Release.zip\u0026p_Doc_Ref=PM5660\"\nPM5760,V3.1.1 and earlier,\"A fix in V3.1.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5760_upgrade_V3.1.3_Release.zip\u0026p_Doc_Ref=PM5760\"\n\"PM5320, PM5340\",V2.1.3 and earlier,\"A fix in V2.1.5 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5320_PM5340_v2.1.5_HW_vB1.zip\u0026p_Doc_Ref=PM5320_PM5340\"\nPM5341,V2.4.1 and earlier,\"A fix in V2.4.4 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5341_v2.4.4_HW_vB1.zip\u0026p_Doc_Ref=PM5341\"",
"product_ids": [
"CSAFPID-0049"
]
},
{
"category": "vendor_fix",
"details": "Firmware V2.9 of the TeSys T LTMRxxEyy Motor Controllers includes a fix for this vulnerability and is available for download here:\nhttps://download.schneider-electric.com/files?p_Archive_Name=Evo_TeSysT_Pack-13.zip\u0026p_enDocType=Firmware\u0026p_Doc_Ref=Evo_TeSysT_Pack-13",
"product_ids": [
"CSAFPID-0050"
]
},
{
"category": "mitigation",
"details": "Since the vulnerabilities are present in the TCP/IP stack, an active network connection is required to exploit them. Therefore, Schneider Electric customers can act now to mitigate the risk of attack by limiting access to their devices.\nFor devices on a local network:\n\u2022 Network Partitioning: Locate devices behind firewalls capable of deep packet inspection with rulesets limiting access with only approved protocols and functions and to only those devices and endpoints requiring access.\n\u2022 Anomalous IP traffic: Block and detect anomalous IP traffic and malformed packets. Refer to the Solution section of the CERT-Coordination Center Vulnerability Note VU#257161 for details.\n\u2022 Disable DHCP on the NMC and configure it to use a static IP address.\n\u2022 To avoid the use of DNS, set DNS servers to 0.0.0.0 and utilize static IP addresses for all servers the NMC will connect.\n\u2022 If DNS must be used, then normalize DNS through a secure recursive server or application layer firewall\n\u2022 Enable only secure remote access methods. Disable any insecure protocols.\nFor devices that must communicate via the Internet:\n\u2022 Minimize network exposure for embedded and critical devices, keeping exposure to the minimum necessary, and ensuring that devices are not accessible from the Internet unless absolutely essential.\nIf network access is not required:\n\u2022 Remove the Ethernet cable from the affected device.\nAdditional mitigations:\n\u2022 Access Controls: Install physical and logical controls so no unauthorized personnel or device can access your systems, components, peripheral equipment, and networks.\nFor more details and assistance on how to protect your installation, please contact your local Schneider Electric Industrial Cybersecurity Services organization, which is fully aware of this situation and can support you through the process.",
"product_ids": [
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2020-11898",
"notes": [
{
"category": "details",
"text": "Additional details on these specific vulnerabilities can be found on the ICS-CERT Advisory at https://www.us-cert.gov/ics/advisories/ICSA-20-168-01."
}
],
"product_status": {
"fixed": [
"CSAFPID-0003",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0013",
"CSAFPID-0015",
"CSAFPID-0017",
"CSAFPID-0025",
"CSAFPID-0053",
"CSAFPID-0054",
"CSAFPID-0056",
"CSAFPID-0057"
],
"known_affected": [
"CSAFPID-0002",
"CSAFPID-0004",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0014",
"CSAFPID-0016",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0052",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0050"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V3.2IE25 and above.\nFor product release prior to V3.2IE25, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V3.3IE33 and above.\nFor product release prior to V3.3IE33, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0004"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V3.3IE26 and above.\nFor product release prior V3.3IE26, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0006"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V1.6IE01 and above. For product release prior to V1.6IE01, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0008"
]
},
{
"category": "vendor_fix",
"details": "Telepace Studio must be used to update the SCADAPack 32 RTU firmware to version 2.25 or newer.\nDownload and install Telepace Studio 5.4.2 or newer from https://shop.exchange.se.com/en-US/apps/55670",
"product_ids": [
"CSAFPID-0010"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in firmware version V2.2.1.1 available for download below:\nhttps://www.se.com/ww/en/download/document/TM3BC_EIP_2_2_1_1/",
"product_ids": [
"CSAFPID-0012"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in firmware version V2.1.1.1 available for download below:\nhttps://www.se.com/ww/en/download/document/TM3BC_MBSL_2_1_1_1/",
"product_ids": [
"CSAFPID-0014"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in firmware version V2.1.1.1 available for download below:\nhttps://www.se.com/ww/en/download/document/TM3BC_CO_2_1_1_1/",
"product_ids": [
"CSAFPID-0016"
]
},
{
"category": "no_fix_planned",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0018"
]
},
{
"category": "no_fix_planned",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0019"
]
},
{
"category": "none_available",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0052"
]
},
{
"category": "no_fix_planned",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0020"
]
},
{
"category": "mitigation",
"details": "This offer is not affected by CVE-2020-11897, CVE-2020-11899, CVE-2020-11900, CVE-2020-11902, CVE-2020-11903, CVE-2020-11905, CVE-2020-11908, CVE-2020-11913.\nFor other CVEs, the CVSS score is evaluated as Medium in the product context.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0021"
]
},
{
"category": "mitigation",
"details": "This offer is not affected by CVE-2020-11897, CVE-2020-11899, CVE-2020-11900, CVE-2020-11902, CVE-2020-11903, CVE-2020-11905, CVE-2020-11908, CVE-2020-11913.\nFor other CVEs, the CVSS score is evaluated as Medium in the product context.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0022"
]
},
{
"category": "vendor_fix",
"details": "A fix is available in product releases V1.15IE25 and above.\nFor product release prior V1.15IE25, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0023"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases\nSV:02.05, PV:03, RL:03 and above.\nFor product release prior to SV:02.05, PV:03, RL:03, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for\nmore information on upgrading to SV:02.05.",
"product_ids": [
"CSAFPID-0025"
]
},
{
"category": "mitigation",
"details": "The ACE850 ethernet module for SEPAM protection relays is a product designed to be operated on a secure network.\nTo minimize the risk from both Ripple 20 and the network-accessible functions of the relay we recommend that concerned customers:\n- Enable the IP-based filtering capability in the ACE850\n- Place strong, active controls on the network hosting the ACE850\n- Consider moving to a newer relay such as the Easergy series if product-level access protections are required\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0026"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization Offer.\nIf possible, this product should be replaced by PowerTagLink-C (commercial reference A9XELC10 for which a patch is available from version 1.7.5 or greater.\nFor specific applications not supported by PowerTag Link C (pulse metering, Acti9 RCA, Acti9 iPF+SD 24), apply the mitigation detailed in the Recommended Mitigation section.",
"product_ids": [
"CSAFPID-0027"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nIf possible, this product should be replaced by Smartlink SIB (commercial reference: A9XMZA08) for which a patch is available in FW version 2.18 or greater.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0028"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Acti9 PowerTag Link C which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0029"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nCustomers should immediately apply the mitigations detailed in the Recommended Mitigations section below to reduce the risk of exploit.\nCustomers should also consider upgrading to EcoStruxure Building Operation which is not impacted by this vulnerability.",
"product_ids": [
"CSAFPID-0030"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Wiser Energy IP module by Schneider Electric which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0031"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Wiser Energy IP module by Clipsal which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0032"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Gateway Connector by Elko which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0033"
]
},
{
"category": "vendor_fix",
"details": "Customers should update firmware using EcoStruxure Power Commission (EPC) installer V7.0 available here: https://www.se.com/ww/en/product-range-download/64482-acti9-powertag-link/?selected-nodeid=12492093362#/software-firmware-tab",
"product_ids": [
"CSAFPID-0034"
]
},
{
"category": "vendor_fix",
"details": "Customers should update firmware using EcoStruxure Power Commission (EPC) installer V7.0 available here: https://www.se.com/ww/en/product-range-download/64482-acti9-powertag-link/?selected-nodeid=12492093362#/software-firmware-tab",
"product_ids": [
"CSAFPID-0036",
"CSAFPID-0037"
]
},
{
"category": "vendor_fix",
"details": "A fix is available in V5.1.18: https://www.se.com/ww/en/product-range-download/63423-link150/?selected-node-id=12366756685 - /software-firmware-tab",
"product_ids": [
"CSAFPID-0038"
]
},
{
"category": "vendor_fix",
"details": "The firmware is available through EcoStruxure Power Commission (EPC) software V2.18. The updated version of EPC is available here:\nhttps://www.se.com/ww/en/download/document/Ecoreach_Installer/",
"product_ids": [
"CSAFPID-0042"
]
},
{
"category": "vendor_fix",
"details": "All issues remediated in the 3.02.02 release, and higher. Update files can be found on the Schneider Electric Exchange https://ecoxpert.se.com/ --\n1. Search for \u2018relebov3.2.1\u2019\n2. Set the Filter criteria to RN or Firmware, as required.",
"product_ids": [
"CSAFPID-0040"
]
},
{
"category": "vendor_fix",
"details": "All issues remediated in the 3.02.02\nrelease, and higher. Update files can be found on the Schneider Electric Exchange https://ecoxpert.se.com/\n1. Search for \u2018relebov3.2.1\u2019\n2. Set the Filter criteria to RN or Firmware, as required",
"product_ids": [
"CSAFPID-0043"
]
},
{
"category": "vendor_fix",
"details": "The firmware is available through EcoStruxure Power Commission (EPC) software V2.18. The updated version of EPC is available here:\nhttps://www.se.com/ww/en/download/document/Ecoreach_Installer/",
"product_ids": [
"CSAFPID-0046"
]
},
{
"category": "vendor_fix",
"details": "The firmware is available through EcoStruxure Power Commission (EPC) software V2.18. The updated version of EPC is available here:\nhttps://www.se.com/ww/en/download/document/Ecoreach_Installer/",
"product_ids": [
"CSAFPID-0045"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nIf possible, this product should be replaced by Link 150 (commercial reference: EGX150) for which a patch is available in FW version 5.1.18 or greater.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0047"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nIf possible, this product should be replaced by Com\u2019X510 (commercial reference: EBX510) which is not impacted by this vulnerability.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0048"
]
},
{
"category": "vendor_fix",
"details": "PowerLogic PM5000 Model,Affected Version,Remediation/Mitigation\n\"PM5560, PM5563, PM5580\",V2.7.8 and earlier,\"A fix in V2.8.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5560_PM5563_PM5580_V2.8.3_Release.zip\u0026p_Doc_Ref=PM5560_PM5563_PM5580\"\nPM5561,V10.7.1 and earlier,\"A fix in V10.7.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5561_upgrade_10.7.3_Release.zip\u0026p_Doc_Ref=PM5561\"\nPM5650,V2.10.1 and earlier,\"A fix in V2.11.2 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5650_upgrade_V2.11.2_Release.zip\u0026p_Doc_Ref=PM5650\"\nPM5570,V3.1.0 and earlier,\"A fix in V3.1.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5570_upgrade_V3.1.3_Release.zip\u0026p_Doc_Ref=PM5570\"\nPM5660,V3.1.1 and earlier,\"A fix in V3.1.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5660_upgrade_V3.1.3_Release.zip\u0026p_Doc_Ref=PM5660\"\nPM5760,V3.1.1 and earlier,\"A fix in V3.1.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5760_upgrade_V3.1.3_Release.zip\u0026p_Doc_Ref=PM5760\"\n\"PM5320, PM5340\",V2.1.3 and earlier,\"A fix in V2.1.5 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5320_PM5340_v2.1.5_HW_vB1.zip\u0026p_Doc_Ref=PM5320_PM5340\"\nPM5341,V2.4.1 and earlier,\"A fix in V2.4.4 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5341_v2.4.4_HW_vB1.zip\u0026p_Doc_Ref=PM5341\"",
"product_ids": [
"CSAFPID-0049"
]
},
{
"category": "vendor_fix",
"details": "Firmware V2.9 of the TeSys T LTMRxxEyy Motor Controllers includes a fix for this vulnerability and is available for download here:\nhttps://download.schneider-electric.com/files?p_Archive_Name=Evo_TeSysT_Pack-13.zip\u0026p_enDocType=Firmware\u0026p_Doc_Ref=Evo_TeSysT_Pack-13",
"product_ids": [
"CSAFPID-0050"
]
},
{
"category": "mitigation",
"details": "Since the vulnerabilities are present in the TCP/IP stack, an active network connection is required to exploit them. Therefore, Schneider Electric customers can act now to mitigate the risk of attack by limiting access to their devices.\nFor devices on a local network:\n\u2022 Network Partitioning: Locate devices behind firewalls capable of deep packet inspection with rulesets limiting access with only approved protocols and functions and to only those devices and endpoints requiring access.\n\u2022 Anomalous IP traffic: Block and detect anomalous IP traffic and malformed packets. Refer to the Solution section of the CERT-Coordination Center Vulnerability Note VU#257161 for details.\n\u2022 Disable DHCP on the NMC and configure it to use a static IP address.\n\u2022 To avoid the use of DNS, set DNS servers to 0.0.0.0 and utilize static IP addresses for all servers the NMC will connect.\n\u2022 If DNS must be used, then normalize DNS through a secure recursive server or application layer firewall\n\u2022 Enable only secure remote access methods. Disable any insecure protocols.\nFor devices that must communicate via the Internet:\n\u2022 Minimize network exposure for embedded and critical devices, keeping exposure to the minimum necessary, and ensuring that devices are not accessible from the Internet unless absolutely essential.\nIf network access is not required:\n\u2022 Remove the Ethernet cable from the affected device.\nAdditional mitigations:\n\u2022 Access Controls: Install physical and logical controls so no unauthorized personnel or device can access your systems, components, peripheral equipment, and networks.\nFor more details and assistance on how to protect your installation, please contact your local Schneider Electric Industrial Cybersecurity Services organization, which is fully aware of this situation and can support you through the process.",
"product_ids": [
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2020-11899",
"notes": [
{
"category": "details",
"text": "Additional details on these specific vulnerabilities can be found on the ICS-CERT Advisory at https://www.us-cert.gov/ics/advisories/ICSA-20-168-01."
}
],
"product_status": {
"fixed": [
"CSAFPID-0003",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0013",
"CSAFPID-0015",
"CSAFPID-0017",
"CSAFPID-0025",
"CSAFPID-0053",
"CSAFPID-0054",
"CSAFPID-0056",
"CSAFPID-0057"
],
"known_affected": [
"CSAFPID-0002",
"CSAFPID-0004",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0014",
"CSAFPID-0016",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0052",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0050"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V3.2IE25 and above.\nFor product release prior to V3.2IE25, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V3.3IE33 and above.\nFor product release prior to V3.3IE33, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0004"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V3.3IE26 and above.\nFor product release prior V3.3IE26, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0006"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V1.6IE01 and above. For product release prior to V1.6IE01, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0008"
]
},
{
"category": "vendor_fix",
"details": "Telepace Studio must be used to update the SCADAPack 32 RTU firmware to version 2.25 or newer.\nDownload and install Telepace Studio 5.4.2 or newer from https://shop.exchange.se.com/en-US/apps/55670",
"product_ids": [
"CSAFPID-0010"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in firmware version V2.2.1.1 available for download below:\nhttps://www.se.com/ww/en/download/document/TM3BC_EIP_2_2_1_1/",
"product_ids": [
"CSAFPID-0012"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in firmware version V2.1.1.1 available for download below:\nhttps://www.se.com/ww/en/download/document/TM3BC_MBSL_2_1_1_1/",
"product_ids": [
"CSAFPID-0014"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in firmware version V2.1.1.1 available for download below:\nhttps://www.se.com/ww/en/download/document/TM3BC_CO_2_1_1_1/",
"product_ids": [
"CSAFPID-0016"
]
},
{
"category": "no_fix_planned",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0018"
]
},
{
"category": "no_fix_planned",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0019"
]
},
{
"category": "none_available",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0052"
]
},
{
"category": "no_fix_planned",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0020"
]
},
{
"category": "vendor_fix",
"details": "A fix is available in product releases V1.15IE25 and above.\nFor product release prior V1.15IE25, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0023"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases\nSV:02.05, PV:03, RL:03 and above.\nFor product release prior to SV:02.05, PV:03, RL:03, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for\nmore information on upgrading to SV:02.05.",
"product_ids": [
"CSAFPID-0025"
]
},
{
"category": "mitigation",
"details": "The ACE850 ethernet module for SEPAM protection relays is a product designed to be operated on a secure network.\nTo minimize the risk from both Ripple 20 and the network-accessible functions of the relay we recommend that concerned customers:\n- Enable the IP-based filtering capability in the ACE850\n- Place strong, active controls on the network hosting the ACE850\n- Consider moving to a newer relay such as the Easergy series if product-level access protections are required\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0026"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization Offer.\nIf possible, this product should be replaced by PowerTagLink-C (commercial reference A9XELC10 for which a patch is available from version 1.7.5 or greater.\nFor specific applications not supported by PowerTag Link C (pulse metering, Acti9 RCA, Acti9 iPF+SD 24), apply the mitigation detailed in the Recommended Mitigation section.",
"product_ids": [
"CSAFPID-0027"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nIf possible, this product should be replaced by Smartlink SIB (commercial reference: A9XMZA08) for which a patch is available in FW version 2.18 or greater.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0028"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Acti9 PowerTag Link C which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0029"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nCustomers should immediately apply the mitigations detailed in the Recommended Mitigations section below to reduce the risk of exploit.\nCustomers should also consider upgrading to EcoStruxure Building Operation which is not impacted by this vulnerability.",
"product_ids": [
"CSAFPID-0030"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Wiser Energy IP module by Schneider Electric which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0031"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Wiser Energy IP module by Clipsal which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0032"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Gateway Connector by Elko which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0033"
]
},
{
"category": "vendor_fix",
"details": "Customers should update firmware using EcoStruxure Power Commission (EPC) installer V7.0 available here: https://www.se.com/ww/en/product-range-download/64482-acti9-powertag-link/?selected-nodeid=12492093362#/software-firmware-tab",
"product_ids": [
"CSAFPID-0034"
]
},
{
"category": "vendor_fix",
"details": "Customers should update firmware using EcoStruxure Power Commission (EPC) installer V7.0 available here: https://www.se.com/ww/en/product-range-download/64482-acti9-powertag-link/?selected-nodeid=12492093362#/software-firmware-tab",
"product_ids": [
"CSAFPID-0036",
"CSAFPID-0037"
]
},
{
"category": "vendor_fix",
"details": "A fix is available in V5.1.18: https://www.se.com/ww/en/product-range-download/63423-link150/?selected-node-id=12366756685 - /software-firmware-tab",
"product_ids": [
"CSAFPID-0038"
]
},
{
"category": "vendor_fix",
"details": "The firmware is available through EcoStruxure Power Commission (EPC) software V2.18. The updated version of EPC is available here:\nhttps://www.se.com/ww/en/download/document/Ecoreach_Installer/",
"product_ids": [
"CSAFPID-0042"
]
},
{
"category": "vendor_fix",
"details": "All issues remediated in the 3.02.02 release, and higher. Update files can be found on the Schneider Electric Exchange https://ecoxpert.se.com/ --\n1. Search for \u2018relebov3.2.1\u2019\n2. Set the Filter criteria to RN or Firmware, as required.",
"product_ids": [
"CSAFPID-0040"
]
},
{
"category": "vendor_fix",
"details": "All issues remediated in the 3.02.02\nrelease, and higher. Update files can be found on the Schneider Electric Exchange https://ecoxpert.se.com/\n1. Search for \u2018relebov3.2.1\u2019\n2. Set the Filter criteria to RN or Firmware, as required",
"product_ids": [
"CSAFPID-0043"
]
},
{
"category": "vendor_fix",
"details": "The firmware is available through EcoStruxure Power Commission (EPC) software V2.18. The updated version of EPC is available here:\nhttps://www.se.com/ww/en/download/document/Ecoreach_Installer/",
"product_ids": [
"CSAFPID-0046"
]
},
{
"category": "vendor_fix",
"details": "The firmware is available through EcoStruxure Power Commission (EPC) software V2.18. The updated version of EPC is available here:\nhttps://www.se.com/ww/en/download/document/Ecoreach_Installer/",
"product_ids": [
"CSAFPID-0045"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nIf possible, this product should be replaced by Link 150 (commercial reference: EGX150) for which a patch is available in FW version 5.1.18 or greater.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0047"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nIf possible, this product should be replaced by Com\u2019X510 (commercial reference: EBX510) which is not impacted by this vulnerability.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0048"
]
},
{
"category": "vendor_fix",
"details": "PowerLogic PM5000 Model,Affected Version,Remediation/Mitigation\n\"PM5560, PM5563, PM5580\",V2.7.8 and earlier,\"A fix in V2.8.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5560_PM5563_PM5580_V2.8.3_Release.zip\u0026p_Doc_Ref=PM5560_PM5563_PM5580\"\nPM5561,V10.7.1 and earlier,\"A fix in V10.7.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5561_upgrade_10.7.3_Release.zip\u0026p_Doc_Ref=PM5561\"\nPM5650,V2.10.1 and earlier,\"A fix in V2.11.2 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5650_upgrade_V2.11.2_Release.zip\u0026p_Doc_Ref=PM5650\"\nPM5570,V3.1.0 and earlier,\"A fix in V3.1.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5570_upgrade_V3.1.3_Release.zip\u0026p_Doc_Ref=PM5570\"\nPM5660,V3.1.1 and earlier,\"A fix in V3.1.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5660_upgrade_V3.1.3_Release.zip\u0026p_Doc_Ref=PM5660\"\nPM5760,V3.1.1 and earlier,\"A fix in V3.1.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5760_upgrade_V3.1.3_Release.zip\u0026p_Doc_Ref=PM5760\"\n\"PM5320, PM5340\",V2.1.3 and earlier,\"A fix in V2.1.5 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5320_PM5340_v2.1.5_HW_vB1.zip\u0026p_Doc_Ref=PM5320_PM5340\"\nPM5341,V2.4.1 and earlier,\"A fix in V2.4.4 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5341_v2.4.4_HW_vB1.zip\u0026p_Doc_Ref=PM5341\"",
"product_ids": [
"CSAFPID-0049"
]
},
{
"category": "vendor_fix",
"details": "Firmware V2.9 of the TeSys T LTMRxxEyy Motor Controllers includes a fix for this vulnerability and is available for download here:\nhttps://download.schneider-electric.com/files?p_Archive_Name=Evo_TeSysT_Pack-13.zip\u0026p_enDocType=Firmware\u0026p_Doc_Ref=Evo_TeSysT_Pack-13",
"product_ids": [
"CSAFPID-0050"
]
},
{
"category": "mitigation",
"details": "Since the vulnerabilities are present in the TCP/IP stack, an active network connection is required to exploit them. Therefore, Schneider Electric customers can act now to mitigate the risk of attack by limiting access to their devices.\nFor devices on a local network:\n\u2022 Network Partitioning: Locate devices behind firewalls capable of deep packet inspection with rulesets limiting access with only approved protocols and functions and to only those devices and endpoints requiring access.\n\u2022 Anomalous IP traffic: Block and detect anomalous IP traffic and malformed packets. Refer to the Solution section of the CERT-Coordination Center Vulnerability Note VU#257161 for details.\n\u2022 Disable DHCP on the NMC and configure it to use a static IP address.\n\u2022 To avoid the use of DNS, set DNS servers to 0.0.0.0 and utilize static IP addresses for all servers the NMC will connect.\n\u2022 If DNS must be used, then normalize DNS through a secure recursive server or application layer firewall\n\u2022 Enable only secure remote access methods. Disable any insecure protocols.\nFor devices that must communicate via the Internet:\n\u2022 Minimize network exposure for embedded and critical devices, keeping exposure to the minimum necessary, and ensuring that devices are not accessible from the Internet unless absolutely essential.\nIf network access is not required:\n\u2022 Remove the Ethernet cable from the affected device.\nAdditional mitigations:\n\u2022 Access Controls: Install physical and logical controls so no unauthorized personnel or device can access your systems, components, peripheral equipment, and networks.\nFor more details and assistance on how to protect your installation, please contact your local Schneider Electric Industrial Cybersecurity Services organization, which is fully aware of this situation and can support you through the process.",
"product_ids": [
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2020-11900",
"notes": [
{
"category": "details",
"text": "Additional details on these specific vulnerabilities can be found on the ICS-CERT Advisory at https://www.us-cert.gov/ics/advisories/ICSA-20-168-01."
}
],
"product_status": {
"fixed": [
"CSAFPID-0003",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0013",
"CSAFPID-0015",
"CSAFPID-0017",
"CSAFPID-0025",
"CSAFPID-0053",
"CSAFPID-0054",
"CSAFPID-0056",
"CSAFPID-0057"
],
"known_affected": [
"CSAFPID-0002",
"CSAFPID-0004",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0014",
"CSAFPID-0016",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0052",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0050"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V3.2IE25 and above.\nFor product release prior to V3.2IE25, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V3.3IE33 and above.\nFor product release prior to V3.3IE33, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0004"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V3.3IE26 and above.\nFor product release prior V3.3IE26, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0006"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V1.6IE01 and above. For product release prior to V1.6IE01, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0008"
]
},
{
"category": "vendor_fix",
"details": "Telepace Studio must be used to update the SCADAPack 32 RTU firmware to version 2.25 or newer.\nDownload and install Telepace Studio 5.4.2 or newer from https://shop.exchange.se.com/en-US/apps/55670",
"product_ids": [
"CSAFPID-0010"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in firmware version V2.2.1.1 available for download below:\nhttps://www.se.com/ww/en/download/document/TM3BC_EIP_2_2_1_1/",
"product_ids": [
"CSAFPID-0012"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in firmware version V2.1.1.1 available for download below:\nhttps://www.se.com/ww/en/download/document/TM3BC_MBSL_2_1_1_1/",
"product_ids": [
"CSAFPID-0014"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in firmware version V2.1.1.1 available for download below:\nhttps://www.se.com/ww/en/download/document/TM3BC_CO_2_1_1_1/",
"product_ids": [
"CSAFPID-0016"
]
},
{
"category": "no_fix_planned",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0018"
]
},
{
"category": "no_fix_planned",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0019"
]
},
{
"category": "none_available",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0052"
]
},
{
"category": "no_fix_planned",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0020"
]
},
{
"category": "vendor_fix",
"details": "A fix is available in product releases V1.15IE25 and above.\nFor product release prior V1.15IE25, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0023"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases\nSV:02.05, PV:03, RL:03 and above.\nFor product release prior to SV:02.05, PV:03, RL:03, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for\nmore information on upgrading to SV:02.05.",
"product_ids": [
"CSAFPID-0025"
]
},
{
"category": "mitigation",
"details": "The ACE850 ethernet module for SEPAM protection relays is a product designed to be operated on a secure network.\nTo minimize the risk from both Ripple 20 and the network-accessible functions of the relay we recommend that concerned customers:\n- Enable the IP-based filtering capability in the ACE850\n- Place strong, active controls on the network hosting the ACE850\n- Consider moving to a newer relay such as the Easergy series if product-level access protections are required\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0026"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization Offer.\nIf possible, this product should be replaced by PowerTagLink-C (commercial reference A9XELC10 for which a patch is available from version 1.7.5 or greater.\nFor specific applications not supported by PowerTag Link C (pulse metering, Acti9 RCA, Acti9 iPF+SD 24), apply the mitigation detailed in the Recommended Mitigation section.",
"product_ids": [
"CSAFPID-0027"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nIf possible, this product should be replaced by Smartlink SIB (commercial reference: A9XMZA08) for which a patch is available in FW version 2.18 or greater.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0028"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Acti9 PowerTag Link C which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0029"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nCustomers should immediately apply the mitigations detailed in the Recommended Mitigations section below to reduce the risk of exploit.\nCustomers should also consider upgrading to EcoStruxure Building Operation which is not impacted by this vulnerability.",
"product_ids": [
"CSAFPID-0030"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Wiser Energy IP module by Schneider Electric which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0031"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Wiser Energy IP module by Clipsal which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0032"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Gateway Connector by Elko which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0033"
]
},
{
"category": "vendor_fix",
"details": "Customers should update firmware using EcoStruxure Power Commission (EPC) installer V7.0 available here: https://www.se.com/ww/en/product-range-download/64482-acti9-powertag-link/?selected-nodeid=12492093362#/software-firmware-tab",
"product_ids": [
"CSAFPID-0034"
]
},
{
"category": "vendor_fix",
"details": "Customers should update firmware using EcoStruxure Power Commission (EPC) installer V7.0 available here: https://www.se.com/ww/en/product-range-download/64482-acti9-powertag-link/?selected-nodeid=12492093362#/software-firmware-tab",
"product_ids": [
"CSAFPID-0036",
"CSAFPID-0037"
]
},
{
"category": "vendor_fix",
"details": "A fix is available in V5.1.18: https://www.se.com/ww/en/product-range-download/63423-link150/?selected-node-id=12366756685 - /software-firmware-tab",
"product_ids": [
"CSAFPID-0038"
]
},
{
"category": "vendor_fix",
"details": "The firmware is available through EcoStruxure Power Commission (EPC) software V2.18. The updated version of EPC is available here:\nhttps://www.se.com/ww/en/download/document/Ecoreach_Installer/",
"product_ids": [
"CSAFPID-0042"
]
},
{
"category": "vendor_fix",
"details": "All issues remediated in the 3.02.02 release, and higher. Update files can be found on the Schneider Electric Exchange https://ecoxpert.se.com/ --\n1. Search for \u2018relebov3.2.1\u2019\n2. Set the Filter criteria to RN or Firmware, as required.",
"product_ids": [
"CSAFPID-0040"
]
},
{
"category": "vendor_fix",
"details": "All issues remediated in the 3.02.02\nrelease, and higher. Update files can be found on the Schneider Electric Exchange https://ecoxpert.se.com/\n1. Search for \u2018relebov3.2.1\u2019\n2. Set the Filter criteria to RN or Firmware, as required",
"product_ids": [
"CSAFPID-0043"
]
},
{
"category": "vendor_fix",
"details": "The firmware is available through EcoStruxure Power Commission (EPC) software V2.18. The updated version of EPC is available here:\nhttps://www.se.com/ww/en/download/document/Ecoreach_Installer/",
"product_ids": [
"CSAFPID-0046"
]
},
{
"category": "vendor_fix",
"details": "The firmware is available through EcoStruxure Power Commission (EPC) software V2.18. The updated version of EPC is available here:\nhttps://www.se.com/ww/en/download/document/Ecoreach_Installer/",
"product_ids": [
"CSAFPID-0045"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nIf possible, this product should be replaced by Link 150 (commercial reference: EGX150) for which a patch is available in FW version 5.1.18 or greater.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0047"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nIf possible, this product should be replaced by Com\u2019X510 (commercial reference: EBX510) which is not impacted by this vulnerability.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0048"
]
},
{
"category": "vendor_fix",
"details": "PowerLogic PM5000 Model,Affected Version,Remediation/Mitigation\n\"PM5560, PM5563, PM5580\",V2.7.8 and earlier,\"A fix in V2.8.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5560_PM5563_PM5580_V2.8.3_Release.zip\u0026p_Doc_Ref=PM5560_PM5563_PM5580\"\nPM5561,V10.7.1 and earlier,\"A fix in V10.7.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5561_upgrade_10.7.3_Release.zip\u0026p_Doc_Ref=PM5561\"\nPM5650,V2.10.1 and earlier,\"A fix in V2.11.2 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5650_upgrade_V2.11.2_Release.zip\u0026p_Doc_Ref=PM5650\"\nPM5570,V3.1.0 and earlier,\"A fix in V3.1.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5570_upgrade_V3.1.3_Release.zip\u0026p_Doc_Ref=PM5570\"\nPM5660,V3.1.1 and earlier,\"A fix in V3.1.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5660_upgrade_V3.1.3_Release.zip\u0026p_Doc_Ref=PM5660\"\nPM5760,V3.1.1 and earlier,\"A fix in V3.1.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5760_upgrade_V3.1.3_Release.zip\u0026p_Doc_Ref=PM5760\"\n\"PM5320, PM5340\",V2.1.3 and earlier,\"A fix in V2.1.5 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5320_PM5340_v2.1.5_HW_vB1.zip\u0026p_Doc_Ref=PM5320_PM5340\"\nPM5341,V2.4.1 and earlier,\"A fix in V2.4.4 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5341_v2.4.4_HW_vB1.zip\u0026p_Doc_Ref=PM5341\"",
"product_ids": [
"CSAFPID-0049"
]
},
{
"category": "vendor_fix",
"details": "Firmware V2.9 of the TeSys T LTMRxxEyy Motor Controllers includes a fix for this vulnerability and is available for download here:\nhttps://download.schneider-electric.com/files?p_Archive_Name=Evo_TeSysT_Pack-13.zip\u0026p_enDocType=Firmware\u0026p_Doc_Ref=Evo_TeSysT_Pack-13",
"product_ids": [
"CSAFPID-0050"
]
},
{
"category": "mitigation",
"details": "Since the vulnerabilities are present in the TCP/IP stack, an active network connection is required to exploit them. Therefore, Schneider Electric customers can act now to mitigate the risk of attack by limiting access to their devices.\nFor devices on a local network:\n\u2022 Network Partitioning: Locate devices behind firewalls capable of deep packet inspection with rulesets limiting access with only approved protocols and functions and to only those devices and endpoints requiring access.\n\u2022 Anomalous IP traffic: Block and detect anomalous IP traffic and malformed packets. Refer to the Solution section of the CERT-Coordination Center Vulnerability Note VU#257161 for details.\n\u2022 Disable DHCP on the NMC and configure it to use a static IP address.\n\u2022 To avoid the use of DNS, set DNS servers to 0.0.0.0 and utilize static IP addresses for all servers the NMC will connect.\n\u2022 If DNS must be used, then normalize DNS through a secure recursive server or application layer firewall\n\u2022 Enable only secure remote access methods. Disable any insecure protocols.\nFor devices that must communicate via the Internet:\n\u2022 Minimize network exposure for embedded and critical devices, keeping exposure to the minimum necessary, and ensuring that devices are not accessible from the Internet unless absolutely essential.\nIf network access is not required:\n\u2022 Remove the Ethernet cable from the affected device.\nAdditional mitigations:\n\u2022 Access Controls: Install physical and logical controls so no unauthorized personnel or device can access your systems, components, peripheral equipment, and networks.\nFor more details and assistance on how to protect your installation, please contact your local Schneider Electric Industrial Cybersecurity Services organization, which is fully aware of this situation and can support you through the process.",
"product_ids": [
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2020-11901",
"notes": [
{
"category": "details",
"text": "Additional details on these specific vulnerabilities can be found on the ICS-CERT Advisory at https://www.us-cert.gov/ics/advisories/ICSA-20-168-01."
}
],
"product_status": {
"fixed": [
"CSAFPID-0003",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0013",
"CSAFPID-0015",
"CSAFPID-0017",
"CSAFPID-0025",
"CSAFPID-0053",
"CSAFPID-0054",
"CSAFPID-0056",
"CSAFPID-0057"
],
"known_affected": [
"CSAFPID-0002",
"CSAFPID-0004",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0014",
"CSAFPID-0016",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0052",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0050"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V3.2IE25 and above.\nFor product release prior to V3.2IE25, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V3.3IE33 and above.\nFor product release prior to V3.3IE33, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0004"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V3.3IE26 and above.\nFor product release prior V3.3IE26, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0006"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V1.6IE01 and above. For product release prior to V1.6IE01, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0008"
]
},
{
"category": "vendor_fix",
"details": "Telepace Studio must be used to update the SCADAPack 32 RTU firmware to version 2.25 or newer.\nDownload and install Telepace Studio 5.4.2 or newer from https://shop.exchange.se.com/en-US/apps/55670",
"product_ids": [
"CSAFPID-0010"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in firmware version V2.2.1.1 available for download below:\nhttps://www.se.com/ww/en/download/document/TM3BC_EIP_2_2_1_1/",
"product_ids": [
"CSAFPID-0012"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in firmware version V2.1.1.1 available for download below:\nhttps://www.se.com/ww/en/download/document/TM3BC_MBSL_2_1_1_1/",
"product_ids": [
"CSAFPID-0014"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in firmware version V2.1.1.1 available for download below:\nhttps://www.se.com/ww/en/download/document/TM3BC_CO_2_1_1_1/",
"product_ids": [
"CSAFPID-0016"
]
},
{
"category": "no_fix_planned",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0018"
]
},
{
"category": "no_fix_planned",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0019"
]
},
{
"category": "none_available",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0052"
]
},
{
"category": "no_fix_planned",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0020"
]
},
{
"category": "mitigation",
"details": "This offer is not affected by CVE-2020-11897, CVE-2020-11899, CVE-2020-11900, CVE-2020-11902, CVE-2020-11903, CVE-2020-11905, CVE-2020-11908, CVE-2020-11913.\nFor other CVEs, the CVSS score is evaluated as Medium in the product context.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0021"
]
},
{
"category": "mitigation",
"details": "This offer is not affected by CVE-2020-11897, CVE-2020-11899, CVE-2020-11900, CVE-2020-11902, CVE-2020-11903, CVE-2020-11905, CVE-2020-11908, CVE-2020-11913.\nFor other CVEs, the CVSS score is evaluated as Medium in the product context.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0022"
]
},
{
"category": "vendor_fix",
"details": "A fix is available in product releases V1.15IE25 and above.\nFor product release prior V1.15IE25, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0023"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases\nSV:02.05, PV:03, RL:03 and above.\nFor product release prior to SV:02.05, PV:03, RL:03, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for\nmore information on upgrading to SV:02.05.",
"product_ids": [
"CSAFPID-0025"
]
},
{
"category": "mitigation",
"details": "The ACE850 ethernet module for SEPAM protection relays is a product designed to be operated on a secure network.\nTo minimize the risk from both Ripple 20 and the network-accessible functions of the relay we recommend that concerned customers:\n- Enable the IP-based filtering capability in the ACE850\n- Place strong, active controls on the network hosting the ACE850\n- Consider moving to a newer relay such as the Easergy series if product-level access protections are required\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0026"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization Offer.\nIf possible, this product should be replaced by PowerTagLink-C (commercial reference A9XELC10 for which a patch is available from version 1.7.5 or greater.\nFor specific applications not supported by PowerTag Link C (pulse metering, Acti9 RCA, Acti9 iPF+SD 24), apply the mitigation detailed in the Recommended Mitigation section.",
"product_ids": [
"CSAFPID-0027"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nIf possible, this product should be replaced by Smartlink SIB (commercial reference: A9XMZA08) for which a patch is available in FW version 2.18 or greater.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0028"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Acti9 PowerTag Link C which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0029"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nCustomers should immediately apply the mitigations detailed in the Recommended Mitigations section below to reduce the risk of exploit.\nCustomers should also consider upgrading to EcoStruxure Building Operation which is not impacted by this vulnerability.",
"product_ids": [
"CSAFPID-0030"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Wiser Energy IP module by Schneider Electric which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0031"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Wiser Energy IP module by Clipsal which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0032"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Gateway Connector by Elko which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0033"
]
},
{
"category": "vendor_fix",
"details": "Customers should update firmware using EcoStruxure Power Commission (EPC) installer V7.0 available here: https://www.se.com/ww/en/product-range-download/64482-acti9-powertag-link/?selected-nodeid=12492093362#/software-firmware-tab",
"product_ids": [
"CSAFPID-0034"
]
},
{
"category": "vendor_fix",
"details": "Customers should update firmware using EcoStruxure Power Commission (EPC) installer V7.0 available here: https://www.se.com/ww/en/product-range-download/64482-acti9-powertag-link/?selected-nodeid=12492093362#/software-firmware-tab",
"product_ids": [
"CSAFPID-0036",
"CSAFPID-0037"
]
},
{
"category": "vendor_fix",
"details": "A fix is available in V5.1.18: https://www.se.com/ww/en/product-range-download/63423-link150/?selected-node-id=12366756685 - /software-firmware-tab",
"product_ids": [
"CSAFPID-0038"
]
},
{
"category": "vendor_fix",
"details": "The firmware is available through EcoStruxure Power Commission (EPC) software V2.18. The updated version of EPC is available here:\nhttps://www.se.com/ww/en/download/document/Ecoreach_Installer/",
"product_ids": [
"CSAFPID-0042"
]
},
{
"category": "vendor_fix",
"details": "All issues remediated in the 3.02.02 release, and higher. Update files can be found on the Schneider Electric Exchange https://ecoxpert.se.com/ --\n1. Search for \u2018relebov3.2.1\u2019\n2. Set the Filter criteria to RN or Firmware, as required.",
"product_ids": [
"CSAFPID-0040"
]
},
{
"category": "vendor_fix",
"details": "All issues remediated in the 3.02.02\nrelease, and higher. Update files can be found on the Schneider Electric Exchange https://ecoxpert.se.com/\n1. Search for \u2018relebov3.2.1\u2019\n2. Set the Filter criteria to RN or Firmware, as required",
"product_ids": [
"CSAFPID-0043"
]
},
{
"category": "vendor_fix",
"details": "The firmware is available through EcoStruxure Power Commission (EPC) software V2.18. The updated version of EPC is available here:\nhttps://www.se.com/ww/en/download/document/Ecoreach_Installer/",
"product_ids": [
"CSAFPID-0046"
]
},
{
"category": "vendor_fix",
"details": "The firmware is available through EcoStruxure Power Commission (EPC) software V2.18. The updated version of EPC is available here:\nhttps://www.se.com/ww/en/download/document/Ecoreach_Installer/",
"product_ids": [
"CSAFPID-0045"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nIf possible, this product should be replaced by Link 150 (commercial reference: EGX150) for which a patch is available in FW version 5.1.18 or greater.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0047"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nIf possible, this product should be replaced by Com\u2019X510 (commercial reference: EBX510) which is not impacted by this vulnerability.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0048"
]
},
{
"category": "vendor_fix",
"details": "PowerLogic PM5000 Model,Affected Version,Remediation/Mitigation\n\"PM5560, PM5563, PM5580\",V2.7.8 and earlier,\"A fix in V2.8.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5560_PM5563_PM5580_V2.8.3_Release.zip\u0026p_Doc_Ref=PM5560_PM5563_PM5580\"\nPM5561,V10.7.1 and earlier,\"A fix in V10.7.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5561_upgrade_10.7.3_Release.zip\u0026p_Doc_Ref=PM5561\"\nPM5650,V2.10.1 and earlier,\"A fix in V2.11.2 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5650_upgrade_V2.11.2_Release.zip\u0026p_Doc_Ref=PM5650\"\nPM5570,V3.1.0 and earlier,\"A fix in V3.1.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5570_upgrade_V3.1.3_Release.zip\u0026p_Doc_Ref=PM5570\"\nPM5660,V3.1.1 and earlier,\"A fix in V3.1.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5660_upgrade_V3.1.3_Release.zip\u0026p_Doc_Ref=PM5660\"\nPM5760,V3.1.1 and earlier,\"A fix in V3.1.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5760_upgrade_V3.1.3_Release.zip\u0026p_Doc_Ref=PM5760\"\n\"PM5320, PM5340\",V2.1.3 and earlier,\"A fix in V2.1.5 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5320_PM5340_v2.1.5_HW_vB1.zip\u0026p_Doc_Ref=PM5320_PM5340\"\nPM5341,V2.4.1 and earlier,\"A fix in V2.4.4 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5341_v2.4.4_HW_vB1.zip\u0026p_Doc_Ref=PM5341\"",
"product_ids": [
"CSAFPID-0049"
]
},
{
"category": "vendor_fix",
"details": "Firmware V2.9 of the TeSys T LTMRxxEyy Motor Controllers includes a fix for this vulnerability and is available for download here:\nhttps://download.schneider-electric.com/files?p_Archive_Name=Evo_TeSysT_Pack-13.zip\u0026p_enDocType=Firmware\u0026p_Doc_Ref=Evo_TeSysT_Pack-13",
"product_ids": [
"CSAFPID-0050"
]
},
{
"category": "mitigation",
"details": "Since the vulnerabilities are present in the TCP/IP stack, an active network connection is required to exploit them. Therefore, Schneider Electric customers can act now to mitigate the risk of attack by limiting access to their devices.\nFor devices on a local network:\n\u2022 Network Partitioning: Locate devices behind firewalls capable of deep packet inspection with rulesets limiting access with only approved protocols and functions and to only those devices and endpoints requiring access.\n\u2022 Anomalous IP traffic: Block and detect anomalous IP traffic and malformed packets. Refer to the Solution section of the CERT-Coordination Center Vulnerability Note VU#257161 for details.\n\u2022 Disable DHCP on the NMC and configure it to use a static IP address.\n\u2022 To avoid the use of DNS, set DNS servers to 0.0.0.0 and utilize static IP addresses for all servers the NMC will connect.\n\u2022 If DNS must be used, then normalize DNS through a secure recursive server or application layer firewall\n\u2022 Enable only secure remote access methods. Disable any insecure protocols.\nFor devices that must communicate via the Internet:\n\u2022 Minimize network exposure for embedded and critical devices, keeping exposure to the minimum necessary, and ensuring that devices are not accessible from the Internet unless absolutely essential.\nIf network access is not required:\n\u2022 Remove the Ethernet cable from the affected device.\nAdditional mitigations:\n\u2022 Access Controls: Install physical and logical controls so no unauthorized personnel or device can access your systems, components, peripheral equipment, and networks.\nFor more details and assistance on how to protect your installation, please contact your local Schneider Electric Industrial Cybersecurity Services organization, which is fully aware of this situation and can support you through the process.",
"product_ids": [
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2020-11902",
"notes": [
{
"category": "details",
"text": "Additional details on these specific vulnerabilities can be found on the ICS-CERT Advisory at https://www.us-cert.gov/ics/advisories/ICSA-20-168-01."
}
],
"product_status": {
"fixed": [
"CSAFPID-0003",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0013",
"CSAFPID-0015",
"CSAFPID-0017",
"CSAFPID-0025",
"CSAFPID-0053",
"CSAFPID-0054",
"CSAFPID-0056",
"CSAFPID-0057"
],
"known_affected": [
"CSAFPID-0002",
"CSAFPID-0004",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0014",
"CSAFPID-0016",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0052",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0050"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V3.2IE25 and above.\nFor product release prior to V3.2IE25, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V3.3IE33 and above.\nFor product release prior to V3.3IE33, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0004"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V3.3IE26 and above.\nFor product release prior V3.3IE26, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0006"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V1.6IE01 and above. For product release prior to V1.6IE01, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0008"
]
},
{
"category": "vendor_fix",
"details": "Telepace Studio must be used to update the SCADAPack 32 RTU firmware to version 2.25 or newer.\nDownload and install Telepace Studio 5.4.2 or newer from https://shop.exchange.se.com/en-US/apps/55670",
"product_ids": [
"CSAFPID-0010"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in firmware version V2.2.1.1 available for download below:\nhttps://www.se.com/ww/en/download/document/TM3BC_EIP_2_2_1_1/",
"product_ids": [
"CSAFPID-0012"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in firmware version V2.1.1.1 available for download below:\nhttps://www.se.com/ww/en/download/document/TM3BC_MBSL_2_1_1_1/",
"product_ids": [
"CSAFPID-0014"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in firmware version V2.1.1.1 available for download below:\nhttps://www.se.com/ww/en/download/document/TM3BC_CO_2_1_1_1/",
"product_ids": [
"CSAFPID-0016"
]
},
{
"category": "no_fix_planned",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0018"
]
},
{
"category": "no_fix_planned",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0019"
]
},
{
"category": "none_available",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0052"
]
},
{
"category": "no_fix_planned",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0020"
]
},
{
"category": "vendor_fix",
"details": "A fix is available in product releases V1.15IE25 and above.\nFor product release prior V1.15IE25, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0023"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases\nSV:02.05, PV:03, RL:03 and above.\nFor product release prior to SV:02.05, PV:03, RL:03, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for\nmore information on upgrading to SV:02.05.",
"product_ids": [
"CSAFPID-0025"
]
},
{
"category": "mitigation",
"details": "The ACE850 ethernet module for SEPAM protection relays is a product designed to be operated on a secure network.\nTo minimize the risk from both Ripple 20 and the network-accessible functions of the relay we recommend that concerned customers:\n- Enable the IP-based filtering capability in the ACE850\n- Place strong, active controls on the network hosting the ACE850\n- Consider moving to a newer relay such as the Easergy series if product-level access protections are required\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0026"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization Offer.\nIf possible, this product should be replaced by PowerTagLink-C (commercial reference A9XELC10 for which a patch is available from version 1.7.5 or greater.\nFor specific applications not supported by PowerTag Link C (pulse metering, Acti9 RCA, Acti9 iPF+SD 24), apply the mitigation detailed in the Recommended Mitigation section.",
"product_ids": [
"CSAFPID-0027"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nIf possible, this product should be replaced by Smartlink SIB (commercial reference: A9XMZA08) for which a patch is available in FW version 2.18 or greater.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0028"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Acti9 PowerTag Link C which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0029"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nCustomers should immediately apply the mitigations detailed in the Recommended Mitigations section below to reduce the risk of exploit.\nCustomers should also consider upgrading to EcoStruxure Building Operation which is not impacted by this vulnerability.",
"product_ids": [
"CSAFPID-0030"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Wiser Energy IP module by Schneider Electric which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0031"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Wiser Energy IP module by Clipsal which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0032"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Gateway Connector by Elko which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0033"
]
},
{
"category": "vendor_fix",
"details": "Customers should update firmware using EcoStruxure Power Commission (EPC) installer V7.0 available here: https://www.se.com/ww/en/product-range-download/64482-acti9-powertag-link/?selected-nodeid=12492093362#/software-firmware-tab",
"product_ids": [
"CSAFPID-0034"
]
},
{
"category": "vendor_fix",
"details": "Customers should update firmware using EcoStruxure Power Commission (EPC) installer V7.0 available here: https://www.se.com/ww/en/product-range-download/64482-acti9-powertag-link/?selected-nodeid=12492093362#/software-firmware-tab",
"product_ids": [
"CSAFPID-0036",
"CSAFPID-0037"
]
},
{
"category": "vendor_fix",
"details": "A fix is available in V5.1.18: https://www.se.com/ww/en/product-range-download/63423-link150/?selected-node-id=12366756685 - /software-firmware-tab",
"product_ids": [
"CSAFPID-0038"
]
},
{
"category": "vendor_fix",
"details": "The firmware is available through EcoStruxure Power Commission (EPC) software V2.18. The updated version of EPC is available here:\nhttps://www.se.com/ww/en/download/document/Ecoreach_Installer/",
"product_ids": [
"CSAFPID-0042"
]
},
{
"category": "vendor_fix",
"details": "All issues remediated in the 3.02.02 release, and higher. Update files can be found on the Schneider Electric Exchange https://ecoxpert.se.com/ --\n1. Search for \u2018relebov3.2.1\u2019\n2. Set the Filter criteria to RN or Firmware, as required.",
"product_ids": [
"CSAFPID-0040"
]
},
{
"category": "vendor_fix",
"details": "All issues remediated in the 3.02.02\nrelease, and higher. Update files can be found on the Schneider Electric Exchange https://ecoxpert.se.com/\n1. Search for \u2018relebov3.2.1\u2019\n2. Set the Filter criteria to RN or Firmware, as required",
"product_ids": [
"CSAFPID-0043"
]
},
{
"category": "vendor_fix",
"details": "The firmware is available through EcoStruxure Power Commission (EPC) software V2.18. The updated version of EPC is available here:\nhttps://www.se.com/ww/en/download/document/Ecoreach_Installer/",
"product_ids": [
"CSAFPID-0046"
]
},
{
"category": "vendor_fix",
"details": "The firmware is available through EcoStruxure Power Commission (EPC) software V2.18. The updated version of EPC is available here:\nhttps://www.se.com/ww/en/download/document/Ecoreach_Installer/",
"product_ids": [
"CSAFPID-0045"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nIf possible, this product should be replaced by Link 150 (commercial reference: EGX150) for which a patch is available in FW version 5.1.18 or greater.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0047"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nIf possible, this product should be replaced by Com\u2019X510 (commercial reference: EBX510) which is not impacted by this vulnerability.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0048"
]
},
{
"category": "vendor_fix",
"details": "PowerLogic PM5000 Model,Affected Version,Remediation/Mitigation\n\"PM5560, PM5563, PM5580\",V2.7.8 and earlier,\"A fix in V2.8.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5560_PM5563_PM5580_V2.8.3_Release.zip\u0026p_Doc_Ref=PM5560_PM5563_PM5580\"\nPM5561,V10.7.1 and earlier,\"A fix in V10.7.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5561_upgrade_10.7.3_Release.zip\u0026p_Doc_Ref=PM5561\"\nPM5650,V2.10.1 and earlier,\"A fix in V2.11.2 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5650_upgrade_V2.11.2_Release.zip\u0026p_Doc_Ref=PM5650\"\nPM5570,V3.1.0 and earlier,\"A fix in V3.1.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5570_upgrade_V3.1.3_Release.zip\u0026p_Doc_Ref=PM5570\"\nPM5660,V3.1.1 and earlier,\"A fix in V3.1.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5660_upgrade_V3.1.3_Release.zip\u0026p_Doc_Ref=PM5660\"\nPM5760,V3.1.1 and earlier,\"A fix in V3.1.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5760_upgrade_V3.1.3_Release.zip\u0026p_Doc_Ref=PM5760\"\n\"PM5320, PM5340\",V2.1.3 and earlier,\"A fix in V2.1.5 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5320_PM5340_v2.1.5_HW_vB1.zip\u0026p_Doc_Ref=PM5320_PM5340\"\nPM5341,V2.4.1 and earlier,\"A fix in V2.4.4 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5341_v2.4.4_HW_vB1.zip\u0026p_Doc_Ref=PM5341\"",
"product_ids": [
"CSAFPID-0049"
]
},
{
"category": "vendor_fix",
"details": "Firmware V2.9 of the TeSys T LTMRxxEyy Motor Controllers includes a fix for this vulnerability and is available for download here:\nhttps://download.schneider-electric.com/files?p_Archive_Name=Evo_TeSysT_Pack-13.zip\u0026p_enDocType=Firmware\u0026p_Doc_Ref=Evo_TeSysT_Pack-13",
"product_ids": [
"CSAFPID-0050"
]
},
{
"category": "mitigation",
"details": "Since the vulnerabilities are present in the TCP/IP stack, an active network connection is required to exploit them. Therefore, Schneider Electric customers can act now to mitigate the risk of attack by limiting access to their devices.\nFor devices on a local network:\n\u2022 Network Partitioning: Locate devices behind firewalls capable of deep packet inspection with rulesets limiting access with only approved protocols and functions and to only those devices and endpoints requiring access.\n\u2022 Anomalous IP traffic: Block and detect anomalous IP traffic and malformed packets. Refer to the Solution section of the CERT-Coordination Center Vulnerability Note VU#257161 for details.\n\u2022 Disable DHCP on the NMC and configure it to use a static IP address.\n\u2022 To avoid the use of DNS, set DNS servers to 0.0.0.0 and utilize static IP addresses for all servers the NMC will connect.\n\u2022 If DNS must be used, then normalize DNS through a secure recursive server or application layer firewall\n\u2022 Enable only secure remote access methods. Disable any insecure protocols.\nFor devices that must communicate via the Internet:\n\u2022 Minimize network exposure for embedded and critical devices, keeping exposure to the minimum necessary, and ensuring that devices are not accessible from the Internet unless absolutely essential.\nIf network access is not required:\n\u2022 Remove the Ethernet cable from the affected device.\nAdditional mitigations:\n\u2022 Access Controls: Install physical and logical controls so no unauthorized personnel or device can access your systems, components, peripheral equipment, and networks.\nFor more details and assistance on how to protect your installation, please contact your local Schneider Electric Industrial Cybersecurity Services organization, which is fully aware of this situation and can support you through the process.",
"product_ids": [
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2020-11903",
"notes": [
{
"category": "details",
"text": "Additional details on these specific vulnerabilities can be found on the ICS-CERT Advisory at https://www.us-cert.gov/ics/advisories/ICSA-20-168-01."
}
],
"product_status": {
"fixed": [
"CSAFPID-0003",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0013",
"CSAFPID-0015",
"CSAFPID-0017",
"CSAFPID-0025",
"CSAFPID-0053",
"CSAFPID-0054",
"CSAFPID-0056",
"CSAFPID-0057"
],
"known_affected": [
"CSAFPID-0002",
"CSAFPID-0004",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0014",
"CSAFPID-0016",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0052",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0050"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V3.2IE25 and above.\nFor product release prior to V3.2IE25, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V3.3IE33 and above.\nFor product release prior to V3.3IE33, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0004"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V3.3IE26 and above.\nFor product release prior V3.3IE26, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0006"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V1.6IE01 and above. For product release prior to V1.6IE01, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0008"
]
},
{
"category": "vendor_fix",
"details": "Telepace Studio must be used to update the SCADAPack 32 RTU firmware to version 2.25 or newer.\nDownload and install Telepace Studio 5.4.2 or newer from https://shop.exchange.se.com/en-US/apps/55670",
"product_ids": [
"CSAFPID-0010"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in firmware version V2.2.1.1 available for download below:\nhttps://www.se.com/ww/en/download/document/TM3BC_EIP_2_2_1_1/",
"product_ids": [
"CSAFPID-0012"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in firmware version V2.1.1.1 available for download below:\nhttps://www.se.com/ww/en/download/document/TM3BC_MBSL_2_1_1_1/",
"product_ids": [
"CSAFPID-0014"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in firmware version V2.1.1.1 available for download below:\nhttps://www.se.com/ww/en/download/document/TM3BC_CO_2_1_1_1/",
"product_ids": [
"CSAFPID-0016"
]
},
{
"category": "no_fix_planned",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0018"
]
},
{
"category": "no_fix_planned",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0019"
]
},
{
"category": "none_available",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0052"
]
},
{
"category": "no_fix_planned",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0020"
]
},
{
"category": "vendor_fix",
"details": "A fix is available in product releases V1.15IE25 and above.\nFor product release prior V1.15IE25, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0023"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases\nSV:02.05, PV:03, RL:03 and above.\nFor product release prior to SV:02.05, PV:03, RL:03, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for\nmore information on upgrading to SV:02.05.",
"product_ids": [
"CSAFPID-0025"
]
},
{
"category": "mitigation",
"details": "The ACE850 ethernet module for SEPAM protection relays is a product designed to be operated on a secure network.\nTo minimize the risk from both Ripple 20 and the network-accessible functions of the relay we recommend that concerned customers:\n- Enable the IP-based filtering capability in the ACE850\n- Place strong, active controls on the network hosting the ACE850\n- Consider moving to a newer relay such as the Easergy series if product-level access protections are required\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0026"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization Offer.\nIf possible, this product should be replaced by PowerTagLink-C (commercial reference A9XELC10 for which a patch is available from version 1.7.5 or greater.\nFor specific applications not supported by PowerTag Link C (pulse metering, Acti9 RCA, Acti9 iPF+SD 24), apply the mitigation detailed in the Recommended Mitigation section.",
"product_ids": [
"CSAFPID-0027"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nIf possible, this product should be replaced by Smartlink SIB (commercial reference: A9XMZA08) for which a patch is available in FW version 2.18 or greater.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0028"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Acti9 PowerTag Link C which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0029"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nCustomers should immediately apply the mitigations detailed in the Recommended Mitigations section below to reduce the risk of exploit.\nCustomers should also consider upgrading to EcoStruxure Building Operation which is not impacted by this vulnerability.",
"product_ids": [
"CSAFPID-0030"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Wiser Energy IP module by Schneider Electric which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0031"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Wiser Energy IP module by Clipsal which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0032"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Gateway Connector by Elko which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0033"
]
},
{
"category": "vendor_fix",
"details": "Customers should update firmware using EcoStruxure Power Commission (EPC) installer V7.0 available here: https://www.se.com/ww/en/product-range-download/64482-acti9-powertag-link/?selected-nodeid=12492093362#/software-firmware-tab",
"product_ids": [
"CSAFPID-0034"
]
},
{
"category": "vendor_fix",
"details": "Customers should update firmware using EcoStruxure Power Commission (EPC) installer V7.0 available here: https://www.se.com/ww/en/product-range-download/64482-acti9-powertag-link/?selected-nodeid=12492093362#/software-firmware-tab",
"product_ids": [
"CSAFPID-0036",
"CSAFPID-0037"
]
},
{
"category": "vendor_fix",
"details": "A fix is available in V5.1.18: https://www.se.com/ww/en/product-range-download/63423-link150/?selected-node-id=12366756685 - /software-firmware-tab",
"product_ids": [
"CSAFPID-0038"
]
},
{
"category": "vendor_fix",
"details": "The firmware is available through EcoStruxure Power Commission (EPC) software V2.18. The updated version of EPC is available here:\nhttps://www.se.com/ww/en/download/document/Ecoreach_Installer/",
"product_ids": [
"CSAFPID-0042"
]
},
{
"category": "vendor_fix",
"details": "All issues remediated in the 3.02.02 release, and higher. Update files can be found on the Schneider Electric Exchange https://ecoxpert.se.com/ --\n1. Search for \u2018relebov3.2.1\u2019\n2. Set the Filter criteria to RN or Firmware, as required.",
"product_ids": [
"CSAFPID-0040"
]
},
{
"category": "vendor_fix",
"details": "All issues remediated in the 3.02.02\nrelease, and higher. Update files can be found on the Schneider Electric Exchange https://ecoxpert.se.com/\n1. Search for \u2018relebov3.2.1\u2019\n2. Set the Filter criteria to RN or Firmware, as required",
"product_ids": [
"CSAFPID-0043"
]
},
{
"category": "vendor_fix",
"details": "The firmware is available through EcoStruxure Power Commission (EPC) software V2.18. The updated version of EPC is available here:\nhttps://www.se.com/ww/en/download/document/Ecoreach_Installer/",
"product_ids": [
"CSAFPID-0046"
]
},
{
"category": "vendor_fix",
"details": "The firmware is available through EcoStruxure Power Commission (EPC) software V2.18. The updated version of EPC is available here:\nhttps://www.se.com/ww/en/download/document/Ecoreach_Installer/",
"product_ids": [
"CSAFPID-0045"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nIf possible, this product should be replaced by Link 150 (commercial reference: EGX150) for which a patch is available in FW version 5.1.18 or greater.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0047"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nIf possible, this product should be replaced by Com\u2019X510 (commercial reference: EBX510) which is not impacted by this vulnerability.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0048"
]
},
{
"category": "vendor_fix",
"details": "PowerLogic PM5000 Model,Affected Version,Remediation/Mitigation\n\"PM5560, PM5563, PM5580\",V2.7.8 and earlier,\"A fix in V2.8.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5560_PM5563_PM5580_V2.8.3_Release.zip\u0026p_Doc_Ref=PM5560_PM5563_PM5580\"\nPM5561,V10.7.1 and earlier,\"A fix in V10.7.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5561_upgrade_10.7.3_Release.zip\u0026p_Doc_Ref=PM5561\"\nPM5650,V2.10.1 and earlier,\"A fix in V2.11.2 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5650_upgrade_V2.11.2_Release.zip\u0026p_Doc_Ref=PM5650\"\nPM5570,V3.1.0 and earlier,\"A fix in V3.1.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5570_upgrade_V3.1.3_Release.zip\u0026p_Doc_Ref=PM5570\"\nPM5660,V3.1.1 and earlier,\"A fix in V3.1.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5660_upgrade_V3.1.3_Release.zip\u0026p_Doc_Ref=PM5660\"\nPM5760,V3.1.1 and earlier,\"A fix in V3.1.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5760_upgrade_V3.1.3_Release.zip\u0026p_Doc_Ref=PM5760\"\n\"PM5320, PM5340\",V2.1.3 and earlier,\"A fix in V2.1.5 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5320_PM5340_v2.1.5_HW_vB1.zip\u0026p_Doc_Ref=PM5320_PM5340\"\nPM5341,V2.4.1 and earlier,\"A fix in V2.4.4 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5341_v2.4.4_HW_vB1.zip\u0026p_Doc_Ref=PM5341\"",
"product_ids": [
"CSAFPID-0049"
]
},
{
"category": "vendor_fix",
"details": "Firmware V2.9 of the TeSys T LTMRxxEyy Motor Controllers includes a fix for this vulnerability and is available for download here:\nhttps://download.schneider-electric.com/files?p_Archive_Name=Evo_TeSysT_Pack-13.zip\u0026p_enDocType=Firmware\u0026p_Doc_Ref=Evo_TeSysT_Pack-13",
"product_ids": [
"CSAFPID-0050"
]
},
{
"category": "mitigation",
"details": "Since the vulnerabilities are present in the TCP/IP stack, an active network connection is required to exploit them. Therefore, Schneider Electric customers can act now to mitigate the risk of attack by limiting access to their devices.\nFor devices on a local network:\n\u2022 Network Partitioning: Locate devices behind firewalls capable of deep packet inspection with rulesets limiting access with only approved protocols and functions and to only those devices and endpoints requiring access.\n\u2022 Anomalous IP traffic: Block and detect anomalous IP traffic and malformed packets. Refer to the Solution section of the CERT-Coordination Center Vulnerability Note VU#257161 for details.\n\u2022 Disable DHCP on the NMC and configure it to use a static IP address.\n\u2022 To avoid the use of DNS, set DNS servers to 0.0.0.0 and utilize static IP addresses for all servers the NMC will connect.\n\u2022 If DNS must be used, then normalize DNS through a secure recursive server or application layer firewall\n\u2022 Enable only secure remote access methods. Disable any insecure protocols.\nFor devices that must communicate via the Internet:\n\u2022 Minimize network exposure for embedded and critical devices, keeping exposure to the minimum necessary, and ensuring that devices are not accessible from the Internet unless absolutely essential.\nIf network access is not required:\n\u2022 Remove the Ethernet cable from the affected device.\nAdditional mitigations:\n\u2022 Access Controls: Install physical and logical controls so no unauthorized personnel or device can access your systems, components, peripheral equipment, and networks.\nFor more details and assistance on how to protect your installation, please contact your local Schneider Electric Industrial Cybersecurity Services organization, which is fully aware of this situation and can support you through the process.",
"product_ids": [
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2020-11904",
"notes": [
{
"category": "details",
"text": "Additional details on these specific vulnerabilities can be found on the ICS-CERT Advisory at https://www.us-cert.gov/ics/advisories/ICSA-20-168-01."
}
],
"product_status": {
"fixed": [
"CSAFPID-0003",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0013",
"CSAFPID-0015",
"CSAFPID-0017",
"CSAFPID-0025",
"CSAFPID-0053",
"CSAFPID-0054",
"CSAFPID-0056",
"CSAFPID-0057"
],
"known_affected": [
"CSAFPID-0002",
"CSAFPID-0004",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0014",
"CSAFPID-0016",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0052",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0050"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V3.2IE25 and above.\nFor product release prior to V3.2IE25, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V3.3IE33 and above.\nFor product release prior to V3.3IE33, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0004"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V3.3IE26 and above.\nFor product release prior V3.3IE26, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0006"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V1.6IE01 and above. For product release prior to V1.6IE01, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0008"
]
},
{
"category": "vendor_fix",
"details": "Telepace Studio must be used to update the SCADAPack 32 RTU firmware to version 2.25 or newer.\nDownload and install Telepace Studio 5.4.2 or newer from https://shop.exchange.se.com/en-US/apps/55670",
"product_ids": [
"CSAFPID-0010"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in firmware version V2.2.1.1 available for download below:\nhttps://www.se.com/ww/en/download/document/TM3BC_EIP_2_2_1_1/",
"product_ids": [
"CSAFPID-0012"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in firmware version V2.1.1.1 available for download below:\nhttps://www.se.com/ww/en/download/document/TM3BC_MBSL_2_1_1_1/",
"product_ids": [
"CSAFPID-0014"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in firmware version V2.1.1.1 available for download below:\nhttps://www.se.com/ww/en/download/document/TM3BC_CO_2_1_1_1/",
"product_ids": [
"CSAFPID-0016"
]
},
{
"category": "no_fix_planned",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0018"
]
},
{
"category": "no_fix_planned",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0019"
]
},
{
"category": "none_available",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0052"
]
},
{
"category": "no_fix_planned",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0020"
]
},
{
"category": "mitigation",
"details": "This offer is not affected by CVE-2020-11897, CVE-2020-11899, CVE-2020-11900, CVE-2020-11902, CVE-2020-11903, CVE-2020-11905, CVE-2020-11908, CVE-2020-11913.\nFor other CVEs, the CVSS score is evaluated as Medium in the product context.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0021"
]
},
{
"category": "mitigation",
"details": "This offer is not affected by CVE-2020-11897, CVE-2020-11899, CVE-2020-11900, CVE-2020-11902, CVE-2020-11903, CVE-2020-11905, CVE-2020-11908, CVE-2020-11913.\nFor other CVEs, the CVSS score is evaluated as Medium in the product context.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0022"
]
},
{
"category": "vendor_fix",
"details": "A fix is available in product releases V1.15IE25 and above.\nFor product release prior V1.15IE25, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0023"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases\nSV:02.05, PV:03, RL:03 and above.\nFor product release prior to SV:02.05, PV:03, RL:03, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for\nmore information on upgrading to SV:02.05.",
"product_ids": [
"CSAFPID-0025"
]
},
{
"category": "mitigation",
"details": "The ACE850 ethernet module for SEPAM protection relays is a product designed to be operated on a secure network.\nTo minimize the risk from both Ripple 20 and the network-accessible functions of the relay we recommend that concerned customers:\n- Enable the IP-based filtering capability in the ACE850\n- Place strong, active controls on the network hosting the ACE850\n- Consider moving to a newer relay such as the Easergy series if product-level access protections are required\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0026"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization Offer.\nIf possible, this product should be replaced by PowerTagLink-C (commercial reference A9XELC10 for which a patch is available from version 1.7.5 or greater.\nFor specific applications not supported by PowerTag Link C (pulse metering, Acti9 RCA, Acti9 iPF+SD 24), apply the mitigation detailed in the Recommended Mitigation section.",
"product_ids": [
"CSAFPID-0027"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nIf possible, this product should be replaced by Smartlink SIB (commercial reference: A9XMZA08) for which a patch is available in FW version 2.18 or greater.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0028"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Acti9 PowerTag Link C which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0029"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nCustomers should immediately apply the mitigations detailed in the Recommended Mitigations section below to reduce the risk of exploit.\nCustomers should also consider upgrading to EcoStruxure Building Operation which is not impacted by this vulnerability.",
"product_ids": [
"CSAFPID-0030"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Wiser Energy IP module by Schneider Electric which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0031"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Wiser Energy IP module by Clipsal which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0032"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Gateway Connector by Elko which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0033"
]
},
{
"category": "vendor_fix",
"details": "Customers should update firmware using EcoStruxure Power Commission (EPC) installer V7.0 available here: https://www.se.com/ww/en/product-range-download/64482-acti9-powertag-link/?selected-nodeid=12492093362#/software-firmware-tab",
"product_ids": [
"CSAFPID-0034"
]
},
{
"category": "vendor_fix",
"details": "Customers should update firmware using EcoStruxure Power Commission (EPC) installer V7.0 available here: https://www.se.com/ww/en/product-range-download/64482-acti9-powertag-link/?selected-nodeid=12492093362#/software-firmware-tab",
"product_ids": [
"CSAFPID-0036",
"CSAFPID-0037"
]
},
{
"category": "vendor_fix",
"details": "A fix is available in V5.1.18: https://www.se.com/ww/en/product-range-download/63423-link150/?selected-node-id=12366756685 - /software-firmware-tab",
"product_ids": [
"CSAFPID-0038"
]
},
{
"category": "vendor_fix",
"details": "The firmware is available through EcoStruxure Power Commission (EPC) software V2.18. The updated version of EPC is available here:\nhttps://www.se.com/ww/en/download/document/Ecoreach_Installer/",
"product_ids": [
"CSAFPID-0042"
]
},
{
"category": "vendor_fix",
"details": "All issues remediated in the 3.02.02 release, and higher. Update files can be found on the Schneider Electric Exchange https://ecoxpert.se.com/ --\n1. Search for \u2018relebov3.2.1\u2019\n2. Set the Filter criteria to RN or Firmware, as required.",
"product_ids": [
"CSAFPID-0040"
]
},
{
"category": "vendor_fix",
"details": "All issues remediated in the 3.02.02\nrelease, and higher. Update files can be found on the Schneider Electric Exchange https://ecoxpert.se.com/\n1. Search for \u2018relebov3.2.1\u2019\n2. Set the Filter criteria to RN or Firmware, as required",
"product_ids": [
"CSAFPID-0043"
]
},
{
"category": "vendor_fix",
"details": "The firmware is available through EcoStruxure Power Commission (EPC) software V2.18. The updated version of EPC is available here:\nhttps://www.se.com/ww/en/download/document/Ecoreach_Installer/",
"product_ids": [
"CSAFPID-0046"
]
},
{
"category": "vendor_fix",
"details": "The firmware is available through EcoStruxure Power Commission (EPC) software V2.18. The updated version of EPC is available here:\nhttps://www.se.com/ww/en/download/document/Ecoreach_Installer/",
"product_ids": [
"CSAFPID-0045"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nIf possible, this product should be replaced by Link 150 (commercial reference: EGX150) for which a patch is available in FW version 5.1.18 or greater.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0047"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nIf possible, this product should be replaced by Com\u2019X510 (commercial reference: EBX510) which is not impacted by this vulnerability.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0048"
]
},
{
"category": "vendor_fix",
"details": "PowerLogic PM5000 Model,Affected Version,Remediation/Mitigation\n\"PM5560, PM5563, PM5580\",V2.7.8 and earlier,\"A fix in V2.8.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5560_PM5563_PM5580_V2.8.3_Release.zip\u0026p_Doc_Ref=PM5560_PM5563_PM5580\"\nPM5561,V10.7.1 and earlier,\"A fix in V10.7.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5561_upgrade_10.7.3_Release.zip\u0026p_Doc_Ref=PM5561\"\nPM5650,V2.10.1 and earlier,\"A fix in V2.11.2 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5650_upgrade_V2.11.2_Release.zip\u0026p_Doc_Ref=PM5650\"\nPM5570,V3.1.0 and earlier,\"A fix in V3.1.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5570_upgrade_V3.1.3_Release.zip\u0026p_Doc_Ref=PM5570\"\nPM5660,V3.1.1 and earlier,\"A fix in V3.1.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5660_upgrade_V3.1.3_Release.zip\u0026p_Doc_Ref=PM5660\"\nPM5760,V3.1.1 and earlier,\"A fix in V3.1.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5760_upgrade_V3.1.3_Release.zip\u0026p_Doc_Ref=PM5760\"\n\"PM5320, PM5340\",V2.1.3 and earlier,\"A fix in V2.1.5 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5320_PM5340_v2.1.5_HW_vB1.zip\u0026p_Doc_Ref=PM5320_PM5340\"\nPM5341,V2.4.1 and earlier,\"A fix in V2.4.4 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5341_v2.4.4_HW_vB1.zip\u0026p_Doc_Ref=PM5341\"",
"product_ids": [
"CSAFPID-0049"
]
},
{
"category": "vendor_fix",
"details": "Firmware V2.9 of the TeSys T LTMRxxEyy Motor Controllers includes a fix for this vulnerability and is available for download here:\nhttps://download.schneider-electric.com/files?p_Archive_Name=Evo_TeSysT_Pack-13.zip\u0026p_enDocType=Firmware\u0026p_Doc_Ref=Evo_TeSysT_Pack-13",
"product_ids": [
"CSAFPID-0050"
]
},
{
"category": "mitigation",
"details": "Since the vulnerabilities are present in the TCP/IP stack, an active network connection is required to exploit them. Therefore, Schneider Electric customers can act now to mitigate the risk of attack by limiting access to their devices.\nFor devices on a local network:\n\u2022 Network Partitioning: Locate devices behind firewalls capable of deep packet inspection with rulesets limiting access with only approved protocols and functions and to only those devices and endpoints requiring access.\n\u2022 Anomalous IP traffic: Block and detect anomalous IP traffic and malformed packets. Refer to the Solution section of the CERT-Coordination Center Vulnerability Note VU#257161 for details.\n\u2022 Disable DHCP on the NMC and configure it to use a static IP address.\n\u2022 To avoid the use of DNS, set DNS servers to 0.0.0.0 and utilize static IP addresses for all servers the NMC will connect.\n\u2022 If DNS must be used, then normalize DNS through a secure recursive server or application layer firewall\n\u2022 Enable only secure remote access methods. Disable any insecure protocols.\nFor devices that must communicate via the Internet:\n\u2022 Minimize network exposure for embedded and critical devices, keeping exposure to the minimum necessary, and ensuring that devices are not accessible from the Internet unless absolutely essential.\nIf network access is not required:\n\u2022 Remove the Ethernet cable from the affected device.\nAdditional mitigations:\n\u2022 Access Controls: Install physical and logical controls so no unauthorized personnel or device can access your systems, components, peripheral equipment, and networks.\nFor more details and assistance on how to protect your installation, please contact your local Schneider Electric Industrial Cybersecurity Services organization, which is fully aware of this situation and can support you through the process.",
"product_ids": [
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2020-11905",
"notes": [
{
"category": "details",
"text": "Additional details on these specific vulnerabilities can be found on the ICS-CERT Advisory at https://www.us-cert.gov/ics/advisories/ICSA-20-168-01."
}
],
"product_status": {
"fixed": [
"CSAFPID-0003",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0013",
"CSAFPID-0015",
"CSAFPID-0017",
"CSAFPID-0025",
"CSAFPID-0053",
"CSAFPID-0054",
"CSAFPID-0056",
"CSAFPID-0057"
],
"known_affected": [
"CSAFPID-0002",
"CSAFPID-0004",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0014",
"CSAFPID-0016",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0052",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0050"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V3.2IE25 and above.\nFor product release prior to V3.2IE25, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V3.3IE33 and above.\nFor product release prior to V3.3IE33, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0004"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V3.3IE26 and above.\nFor product release prior V3.3IE26, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0006"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V1.6IE01 and above. For product release prior to V1.6IE01, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0008"
]
},
{
"category": "vendor_fix",
"details": "Telepace Studio must be used to update the SCADAPack 32 RTU firmware to version 2.25 or newer.\nDownload and install Telepace Studio 5.4.2 or newer from https://shop.exchange.se.com/en-US/apps/55670",
"product_ids": [
"CSAFPID-0010"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in firmware version V2.2.1.1 available for download below:\nhttps://www.se.com/ww/en/download/document/TM3BC_EIP_2_2_1_1/",
"product_ids": [
"CSAFPID-0012"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in firmware version V2.1.1.1 available for download below:\nhttps://www.se.com/ww/en/download/document/TM3BC_MBSL_2_1_1_1/",
"product_ids": [
"CSAFPID-0014"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in firmware version V2.1.1.1 available for download below:\nhttps://www.se.com/ww/en/download/document/TM3BC_CO_2_1_1_1/",
"product_ids": [
"CSAFPID-0016"
]
},
{
"category": "no_fix_planned",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0018"
]
},
{
"category": "no_fix_planned",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0019"
]
},
{
"category": "none_available",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0052"
]
},
{
"category": "no_fix_planned",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0020"
]
},
{
"category": "vendor_fix",
"details": "A fix is available in product releases V1.15IE25 and above.\nFor product release prior V1.15IE25, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0023"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases\nSV:02.05, PV:03, RL:03 and above.\nFor product release prior to SV:02.05, PV:03, RL:03, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for\nmore information on upgrading to SV:02.05.",
"product_ids": [
"CSAFPID-0025"
]
},
{
"category": "mitigation",
"details": "The ACE850 ethernet module for SEPAM protection relays is a product designed to be operated on a secure network.\nTo minimize the risk from both Ripple 20 and the network-accessible functions of the relay we recommend that concerned customers:\n- Enable the IP-based filtering capability in the ACE850\n- Place strong, active controls on the network hosting the ACE850\n- Consider moving to a newer relay such as the Easergy series if product-level access protections are required\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0026"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization Offer.\nIf possible, this product should be replaced by PowerTagLink-C (commercial reference A9XELC10 for which a patch is available from version 1.7.5 or greater.\nFor specific applications not supported by PowerTag Link C (pulse metering, Acti9 RCA, Acti9 iPF+SD 24), apply the mitigation detailed in the Recommended Mitigation section.",
"product_ids": [
"CSAFPID-0027"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nIf possible, this product should be replaced by Smartlink SIB (commercial reference: A9XMZA08) for which a patch is available in FW version 2.18 or greater.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0028"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Acti9 PowerTag Link C which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0029"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nCustomers should immediately apply the mitigations detailed in the Recommended Mitigations section below to reduce the risk of exploit.\nCustomers should also consider upgrading to EcoStruxure Building Operation which is not impacted by this vulnerability.",
"product_ids": [
"CSAFPID-0030"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Wiser Energy IP module by Schneider Electric which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0031"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Wiser Energy IP module by Clipsal which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0032"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Gateway Connector by Elko which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0033"
]
},
{
"category": "vendor_fix",
"details": "Customers should update firmware using EcoStruxure Power Commission (EPC) installer V7.0 available here: https://www.se.com/ww/en/product-range-download/64482-acti9-powertag-link/?selected-nodeid=12492093362#/software-firmware-tab",
"product_ids": [
"CSAFPID-0034"
]
},
{
"category": "vendor_fix",
"details": "Customers should update firmware using EcoStruxure Power Commission (EPC) installer V7.0 available here: https://www.se.com/ww/en/product-range-download/64482-acti9-powertag-link/?selected-nodeid=12492093362#/software-firmware-tab",
"product_ids": [
"CSAFPID-0036",
"CSAFPID-0037"
]
},
{
"category": "vendor_fix",
"details": "A fix is available in V5.1.18: https://www.se.com/ww/en/product-range-download/63423-link150/?selected-node-id=12366756685 - /software-firmware-tab",
"product_ids": [
"CSAFPID-0038"
]
},
{
"category": "vendor_fix",
"details": "The firmware is available through EcoStruxure Power Commission (EPC) software V2.18. The updated version of EPC is available here:\nhttps://www.se.com/ww/en/download/document/Ecoreach_Installer/",
"product_ids": [
"CSAFPID-0042"
]
},
{
"category": "vendor_fix",
"details": "All issues remediated in the 3.02.02 release, and higher. Update files can be found on the Schneider Electric Exchange https://ecoxpert.se.com/ --\n1. Search for \u2018relebov3.2.1\u2019\n2. Set the Filter criteria to RN or Firmware, as required.",
"product_ids": [
"CSAFPID-0040"
]
},
{
"category": "vendor_fix",
"details": "All issues remediated in the 3.02.02\nrelease, and higher. Update files can be found on the Schneider Electric Exchange https://ecoxpert.se.com/\n1. Search for \u2018relebov3.2.1\u2019\n2. Set the Filter criteria to RN or Firmware, as required",
"product_ids": [
"CSAFPID-0043"
]
},
{
"category": "vendor_fix",
"details": "The firmware is available through EcoStruxure Power Commission (EPC) software V2.18. The updated version of EPC is available here:\nhttps://www.se.com/ww/en/download/document/Ecoreach_Installer/",
"product_ids": [
"CSAFPID-0046"
]
},
{
"category": "vendor_fix",
"details": "The firmware is available through EcoStruxure Power Commission (EPC) software V2.18. The updated version of EPC is available here:\nhttps://www.se.com/ww/en/download/document/Ecoreach_Installer/",
"product_ids": [
"CSAFPID-0045"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nIf possible, this product should be replaced by Link 150 (commercial reference: EGX150) for which a patch is available in FW version 5.1.18 or greater.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0047"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nIf possible, this product should be replaced by Com\u2019X510 (commercial reference: EBX510) which is not impacted by this vulnerability.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0048"
]
},
{
"category": "vendor_fix",
"details": "PowerLogic PM5000 Model,Affected Version,Remediation/Mitigation\n\"PM5560, PM5563, PM5580\",V2.7.8 and earlier,\"A fix in V2.8.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5560_PM5563_PM5580_V2.8.3_Release.zip\u0026p_Doc_Ref=PM5560_PM5563_PM5580\"\nPM5561,V10.7.1 and earlier,\"A fix in V10.7.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5561_upgrade_10.7.3_Release.zip\u0026p_Doc_Ref=PM5561\"\nPM5650,V2.10.1 and earlier,\"A fix in V2.11.2 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5650_upgrade_V2.11.2_Release.zip\u0026p_Doc_Ref=PM5650\"\nPM5570,V3.1.0 and earlier,\"A fix in V3.1.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5570_upgrade_V3.1.3_Release.zip\u0026p_Doc_Ref=PM5570\"\nPM5660,V3.1.1 and earlier,\"A fix in V3.1.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5660_upgrade_V3.1.3_Release.zip\u0026p_Doc_Ref=PM5660\"\nPM5760,V3.1.1 and earlier,\"A fix in V3.1.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5760_upgrade_V3.1.3_Release.zip\u0026p_Doc_Ref=PM5760\"\n\"PM5320, PM5340\",V2.1.3 and earlier,\"A fix in V2.1.5 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5320_PM5340_v2.1.5_HW_vB1.zip\u0026p_Doc_Ref=PM5320_PM5340\"\nPM5341,V2.4.1 and earlier,\"A fix in V2.4.4 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5341_v2.4.4_HW_vB1.zip\u0026p_Doc_Ref=PM5341\"",
"product_ids": [
"CSAFPID-0049"
]
},
{
"category": "vendor_fix",
"details": "Firmware V2.9 of the TeSys T LTMRxxEyy Motor Controllers includes a fix for this vulnerability and is available for download here:\nhttps://download.schneider-electric.com/files?p_Archive_Name=Evo_TeSysT_Pack-13.zip\u0026p_enDocType=Firmware\u0026p_Doc_Ref=Evo_TeSysT_Pack-13",
"product_ids": [
"CSAFPID-0050"
]
},
{
"category": "mitigation",
"details": "Since the vulnerabilities are present in the TCP/IP stack, an active network connection is required to exploit them. Therefore, Schneider Electric customers can act now to mitigate the risk of attack by limiting access to their devices.\nFor devices on a local network:\n\u2022 Network Partitioning: Locate devices behind firewalls capable of deep packet inspection with rulesets limiting access with only approved protocols and functions and to only those devices and endpoints requiring access.\n\u2022 Anomalous IP traffic: Block and detect anomalous IP traffic and malformed packets. Refer to the Solution section of the CERT-Coordination Center Vulnerability Note VU#257161 for details.\n\u2022 Disable DHCP on the NMC and configure it to use a static IP address.\n\u2022 To avoid the use of DNS, set DNS servers to 0.0.0.0 and utilize static IP addresses for all servers the NMC will connect.\n\u2022 If DNS must be used, then normalize DNS through a secure recursive server or application layer firewall\n\u2022 Enable only secure remote access methods. Disable any insecure protocols.\nFor devices that must communicate via the Internet:\n\u2022 Minimize network exposure for embedded and critical devices, keeping exposure to the minimum necessary, and ensuring that devices are not accessible from the Internet unless absolutely essential.\nIf network access is not required:\n\u2022 Remove the Ethernet cable from the affected device.\nAdditional mitigations:\n\u2022 Access Controls: Install physical and logical controls so no unauthorized personnel or device can access your systems, components, peripheral equipment, and networks.\nFor more details and assistance on how to protect your installation, please contact your local Schneider Electric Industrial Cybersecurity Services organization, which is fully aware of this situation and can support you through the process.",
"product_ids": [
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2020-11906",
"notes": [
{
"category": "details",
"text": "Additional details on these specific vulnerabilities can be found on the ICS-CERT Advisory at https://www.us-cert.gov/ics/advisories/ICSA-20-168-01."
}
],
"product_status": {
"fixed": [
"CSAFPID-0003",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0013",
"CSAFPID-0015",
"CSAFPID-0017",
"CSAFPID-0025",
"CSAFPID-0053",
"CSAFPID-0054",
"CSAFPID-0056",
"CSAFPID-0057"
],
"known_affected": [
"CSAFPID-0002",
"CSAFPID-0004",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0014",
"CSAFPID-0016",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0052",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0050"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V3.2IE25 and above.\nFor product release prior to V3.2IE25, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V3.3IE33 and above.\nFor product release prior to V3.3IE33, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0004"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V3.3IE26 and above.\nFor product release prior V3.3IE26, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0006"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V1.6IE01 and above. For product release prior to V1.6IE01, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0008"
]
},
{
"category": "vendor_fix",
"details": "Telepace Studio must be used to update the SCADAPack 32 RTU firmware to version 2.25 or newer.\nDownload and install Telepace Studio 5.4.2 or newer from https://shop.exchange.se.com/en-US/apps/55670",
"product_ids": [
"CSAFPID-0010"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in firmware version V2.2.1.1 available for download below:\nhttps://www.se.com/ww/en/download/document/TM3BC_EIP_2_2_1_1/",
"product_ids": [
"CSAFPID-0012"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in firmware version V2.1.1.1 available for download below:\nhttps://www.se.com/ww/en/download/document/TM3BC_MBSL_2_1_1_1/",
"product_ids": [
"CSAFPID-0014"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in firmware version V2.1.1.1 available for download below:\nhttps://www.se.com/ww/en/download/document/TM3BC_CO_2_1_1_1/",
"product_ids": [
"CSAFPID-0016"
]
},
{
"category": "no_fix_planned",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0018"
]
},
{
"category": "no_fix_planned",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0019"
]
},
{
"category": "none_available",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0052"
]
},
{
"category": "no_fix_planned",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0020"
]
},
{
"category": "mitigation",
"details": "This offer is not affected by CVE-2020-11897, CVE-2020-11899, CVE-2020-11900, CVE-2020-11902, CVE-2020-11903, CVE-2020-11905, CVE-2020-11908, CVE-2020-11913.\nFor other CVEs, the CVSS score is evaluated as Medium in the product context.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0021"
]
},
{
"category": "mitigation",
"details": "This offer is not affected by CVE-2020-11897, CVE-2020-11899, CVE-2020-11900, CVE-2020-11902, CVE-2020-11903, CVE-2020-11905, CVE-2020-11908, CVE-2020-11913.\nFor other CVEs, the CVSS score is evaluated as Medium in the product context.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0022"
]
},
{
"category": "vendor_fix",
"details": "A fix is available in product releases V1.15IE25 and above.\nFor product release prior V1.15IE25, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0023"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases\nSV:02.05, PV:03, RL:03 and above.\nFor product release prior to SV:02.05, PV:03, RL:03, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for\nmore information on upgrading to SV:02.05.",
"product_ids": [
"CSAFPID-0025"
]
},
{
"category": "mitigation",
"details": "The ACE850 ethernet module for SEPAM protection relays is a product designed to be operated on a secure network.\nTo minimize the risk from both Ripple 20 and the network-accessible functions of the relay we recommend that concerned customers:\n- Enable the IP-based filtering capability in the ACE850\n- Place strong, active controls on the network hosting the ACE850\n- Consider moving to a newer relay such as the Easergy series if product-level access protections are required\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0026"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization Offer.\nIf possible, this product should be replaced by PowerTagLink-C (commercial reference A9XELC10 for which a patch is available from version 1.7.5 or greater.\nFor specific applications not supported by PowerTag Link C (pulse metering, Acti9 RCA, Acti9 iPF+SD 24), apply the mitigation detailed in the Recommended Mitigation section.",
"product_ids": [
"CSAFPID-0027"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nIf possible, this product should be replaced by Smartlink SIB (commercial reference: A9XMZA08) for which a patch is available in FW version 2.18 or greater.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0028"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Acti9 PowerTag Link C which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0029"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nCustomers should immediately apply the mitigations detailed in the Recommended Mitigations section below to reduce the risk of exploit.\nCustomers should also consider upgrading to EcoStruxure Building Operation which is not impacted by this vulnerability.",
"product_ids": [
"CSAFPID-0030"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Wiser Energy IP module by Schneider Electric which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0031"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Wiser Energy IP module by Clipsal which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0032"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Gateway Connector by Elko which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0033"
]
},
{
"category": "vendor_fix",
"details": "Customers should update firmware using EcoStruxure Power Commission (EPC) installer V7.0 available here: https://www.se.com/ww/en/product-range-download/64482-acti9-powertag-link/?selected-nodeid=12492093362#/software-firmware-tab",
"product_ids": [
"CSAFPID-0034"
]
},
{
"category": "vendor_fix",
"details": "Customers should update firmware using EcoStruxure Power Commission (EPC) installer V7.0 available here: https://www.se.com/ww/en/product-range-download/64482-acti9-powertag-link/?selected-nodeid=12492093362#/software-firmware-tab",
"product_ids": [
"CSAFPID-0036",
"CSAFPID-0037"
]
},
{
"category": "vendor_fix",
"details": "A fix is available in V5.1.18: https://www.se.com/ww/en/product-range-download/63423-link150/?selected-node-id=12366756685 - /software-firmware-tab",
"product_ids": [
"CSAFPID-0038"
]
},
{
"category": "vendor_fix",
"details": "The firmware is available through EcoStruxure Power Commission (EPC) software V2.18. The updated version of EPC is available here:\nhttps://www.se.com/ww/en/download/document/Ecoreach_Installer/",
"product_ids": [
"CSAFPID-0042"
]
},
{
"category": "vendor_fix",
"details": "All issues remediated in the 3.02.02 release, and higher. Update files can be found on the Schneider Electric Exchange https://ecoxpert.se.com/ --\n1. Search for \u2018relebov3.2.1\u2019\n2. Set the Filter criteria to RN or Firmware, as required.",
"product_ids": [
"CSAFPID-0040"
]
},
{
"category": "vendor_fix",
"details": "All issues remediated in the 3.02.02\nrelease, and higher. Update files can be found on the Schneider Electric Exchange https://ecoxpert.se.com/\n1. Search for \u2018relebov3.2.1\u2019\n2. Set the Filter criteria to RN or Firmware, as required",
"product_ids": [
"CSAFPID-0043"
]
},
{
"category": "vendor_fix",
"details": "The firmware is available through EcoStruxure Power Commission (EPC) software V2.18. The updated version of EPC is available here:\nhttps://www.se.com/ww/en/download/document/Ecoreach_Installer/",
"product_ids": [
"CSAFPID-0046"
]
},
{
"category": "vendor_fix",
"details": "The firmware is available through EcoStruxure Power Commission (EPC) software V2.18. The updated version of EPC is available here:\nhttps://www.se.com/ww/en/download/document/Ecoreach_Installer/",
"product_ids": [
"CSAFPID-0045"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nIf possible, this product should be replaced by Link 150 (commercial reference: EGX150) for which a patch is available in FW version 5.1.18 or greater.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0047"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nIf possible, this product should be replaced by Com\u2019X510 (commercial reference: EBX510) which is not impacted by this vulnerability.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0048"
]
},
{
"category": "vendor_fix",
"details": "PowerLogic PM5000 Model,Affected Version,Remediation/Mitigation\n\"PM5560, PM5563, PM5580\",V2.7.8 and earlier,\"A fix in V2.8.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5560_PM5563_PM5580_V2.8.3_Release.zip\u0026p_Doc_Ref=PM5560_PM5563_PM5580\"\nPM5561,V10.7.1 and earlier,\"A fix in V10.7.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5561_upgrade_10.7.3_Release.zip\u0026p_Doc_Ref=PM5561\"\nPM5650,V2.10.1 and earlier,\"A fix in V2.11.2 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5650_upgrade_V2.11.2_Release.zip\u0026p_Doc_Ref=PM5650\"\nPM5570,V3.1.0 and earlier,\"A fix in V3.1.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5570_upgrade_V3.1.3_Release.zip\u0026p_Doc_Ref=PM5570\"\nPM5660,V3.1.1 and earlier,\"A fix in V3.1.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5660_upgrade_V3.1.3_Release.zip\u0026p_Doc_Ref=PM5660\"\nPM5760,V3.1.1 and earlier,\"A fix in V3.1.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5760_upgrade_V3.1.3_Release.zip\u0026p_Doc_Ref=PM5760\"\n\"PM5320, PM5340\",V2.1.3 and earlier,\"A fix in V2.1.5 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5320_PM5340_v2.1.5_HW_vB1.zip\u0026p_Doc_Ref=PM5320_PM5340\"\nPM5341,V2.4.1 and earlier,\"A fix in V2.4.4 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5341_v2.4.4_HW_vB1.zip\u0026p_Doc_Ref=PM5341\"",
"product_ids": [
"CSAFPID-0049"
]
},
{
"category": "vendor_fix",
"details": "Firmware V2.9 of the TeSys T LTMRxxEyy Motor Controllers includes a fix for this vulnerability and is available for download here:\nhttps://download.schneider-electric.com/files?p_Archive_Name=Evo_TeSysT_Pack-13.zip\u0026p_enDocType=Firmware\u0026p_Doc_Ref=Evo_TeSysT_Pack-13",
"product_ids": [
"CSAFPID-0050"
]
},
{
"category": "mitigation",
"details": "Since the vulnerabilities are present in the TCP/IP stack, an active network connection is required to exploit them. Therefore, Schneider Electric customers can act now to mitigate the risk of attack by limiting access to their devices.\nFor devices on a local network:\n\u2022 Network Partitioning: Locate devices behind firewalls capable of deep packet inspection with rulesets limiting access with only approved protocols and functions and to only those devices and endpoints requiring access.\n\u2022 Anomalous IP traffic: Block and detect anomalous IP traffic and malformed packets. Refer to the Solution section of the CERT-Coordination Center Vulnerability Note VU#257161 for details.\n\u2022 Disable DHCP on the NMC and configure it to use a static IP address.\n\u2022 To avoid the use of DNS, set DNS servers to 0.0.0.0 and utilize static IP addresses for all servers the NMC will connect.\n\u2022 If DNS must be used, then normalize DNS through a secure recursive server or application layer firewall\n\u2022 Enable only secure remote access methods. Disable any insecure protocols.\nFor devices that must communicate via the Internet:\n\u2022 Minimize network exposure for embedded and critical devices, keeping exposure to the minimum necessary, and ensuring that devices are not accessible from the Internet unless absolutely essential.\nIf network access is not required:\n\u2022 Remove the Ethernet cable from the affected device.\nAdditional mitigations:\n\u2022 Access Controls: Install physical and logical controls so no unauthorized personnel or device can access your systems, components, peripheral equipment, and networks.\nFor more details and assistance on how to protect your installation, please contact your local Schneider Electric Industrial Cybersecurity Services organization, which is fully aware of this situation and can support you through the process.",
"product_ids": [
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2020-11907",
"notes": [
{
"category": "details",
"text": "Additional details on these specific vulnerabilities can be found on the ICS-CERT Advisory at https://www.us-cert.gov/ics/advisories/ICSA-20-168-01."
}
],
"product_status": {
"fixed": [
"CSAFPID-0003",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0013",
"CSAFPID-0015",
"CSAFPID-0017",
"CSAFPID-0025",
"CSAFPID-0053",
"CSAFPID-0054",
"CSAFPID-0056",
"CSAFPID-0057"
],
"known_affected": [
"CSAFPID-0002",
"CSAFPID-0004",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0014",
"CSAFPID-0016",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0052",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0050"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V3.2IE25 and above.\nFor product release prior to V3.2IE25, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V3.3IE33 and above.\nFor product release prior to V3.3IE33, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0004"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V3.3IE26 and above.\nFor product release prior V3.3IE26, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0006"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V1.6IE01 and above. For product release prior to V1.6IE01, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0008"
]
},
{
"category": "vendor_fix",
"details": "Telepace Studio must be used to update the SCADAPack 32 RTU firmware to version 2.25 or newer.\nDownload and install Telepace Studio 5.4.2 or newer from https://shop.exchange.se.com/en-US/apps/55670",
"product_ids": [
"CSAFPID-0010"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in firmware version V2.2.1.1 available for download below:\nhttps://www.se.com/ww/en/download/document/TM3BC_EIP_2_2_1_1/",
"product_ids": [
"CSAFPID-0012"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in firmware version V2.1.1.1 available for download below:\nhttps://www.se.com/ww/en/download/document/TM3BC_MBSL_2_1_1_1/",
"product_ids": [
"CSAFPID-0014"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in firmware version V2.1.1.1 available for download below:\nhttps://www.se.com/ww/en/download/document/TM3BC_CO_2_1_1_1/",
"product_ids": [
"CSAFPID-0016"
]
},
{
"category": "no_fix_planned",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0018"
]
},
{
"category": "no_fix_planned",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0019"
]
},
{
"category": "none_available",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0052"
]
},
{
"category": "no_fix_planned",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0020"
]
},
{
"category": "mitigation",
"details": "This offer is not affected by CVE-2020-11897, CVE-2020-11899, CVE-2020-11900, CVE-2020-11902, CVE-2020-11903, CVE-2020-11905, CVE-2020-11908, CVE-2020-11913.\nFor other CVEs, the CVSS score is evaluated as Medium in the product context.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0021"
]
},
{
"category": "mitigation",
"details": "This offer is not affected by CVE-2020-11897, CVE-2020-11899, CVE-2020-11900, CVE-2020-11902, CVE-2020-11903, CVE-2020-11905, CVE-2020-11908, CVE-2020-11913.\nFor other CVEs, the CVSS score is evaluated as Medium in the product context.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0022"
]
},
{
"category": "vendor_fix",
"details": "A fix is available in product releases V1.15IE25 and above.\nFor product release prior V1.15IE25, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0023"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases\nSV:02.05, PV:03, RL:03 and above.\nFor product release prior to SV:02.05, PV:03, RL:03, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for\nmore information on upgrading to SV:02.05.",
"product_ids": [
"CSAFPID-0025"
]
},
{
"category": "mitigation",
"details": "The ACE850 ethernet module for SEPAM protection relays is a product designed to be operated on a secure network.\nTo minimize the risk from both Ripple 20 and the network-accessible functions of the relay we recommend that concerned customers:\n- Enable the IP-based filtering capability in the ACE850\n- Place strong, active controls on the network hosting the ACE850\n- Consider moving to a newer relay such as the Easergy series if product-level access protections are required\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0026"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization Offer.\nIf possible, this product should be replaced by PowerTagLink-C (commercial reference A9XELC10 for which a patch is available from version 1.7.5 or greater.\nFor specific applications not supported by PowerTag Link C (pulse metering, Acti9 RCA, Acti9 iPF+SD 24), apply the mitigation detailed in the Recommended Mitigation section.",
"product_ids": [
"CSAFPID-0027"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nIf possible, this product should be replaced by Smartlink SIB (commercial reference: A9XMZA08) for which a patch is available in FW version 2.18 or greater.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0028"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Acti9 PowerTag Link C which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0029"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nCustomers should immediately apply the mitigations detailed in the Recommended Mitigations section below to reduce the risk of exploit.\nCustomers should also consider upgrading to EcoStruxure Building Operation which is not impacted by this vulnerability.",
"product_ids": [
"CSAFPID-0030"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Wiser Energy IP module by Schneider Electric which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0031"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Wiser Energy IP module by Clipsal which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0032"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Gateway Connector by Elko which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0033"
]
},
{
"category": "vendor_fix",
"details": "Customers should update firmware using EcoStruxure Power Commission (EPC) installer V7.0 available here: https://www.se.com/ww/en/product-range-download/64482-acti9-powertag-link/?selected-nodeid=12492093362#/software-firmware-tab",
"product_ids": [
"CSAFPID-0034"
]
},
{
"category": "vendor_fix",
"details": "Customers should update firmware using EcoStruxure Power Commission (EPC) installer V7.0 available here: https://www.se.com/ww/en/product-range-download/64482-acti9-powertag-link/?selected-nodeid=12492093362#/software-firmware-tab",
"product_ids": [
"CSAFPID-0036",
"CSAFPID-0037"
]
},
{
"category": "vendor_fix",
"details": "A fix is available in V5.1.18: https://www.se.com/ww/en/product-range-download/63423-link150/?selected-node-id=12366756685 - /software-firmware-tab",
"product_ids": [
"CSAFPID-0038"
]
},
{
"category": "vendor_fix",
"details": "The firmware is available through EcoStruxure Power Commission (EPC) software V2.18. The updated version of EPC is available here:\nhttps://www.se.com/ww/en/download/document/Ecoreach_Installer/",
"product_ids": [
"CSAFPID-0042"
]
},
{
"category": "vendor_fix",
"details": "All issues remediated in the 3.02.02 release, and higher. Update files can be found on the Schneider Electric Exchange https://ecoxpert.se.com/ --\n1. Search for \u2018relebov3.2.1\u2019\n2. Set the Filter criteria to RN or Firmware, as required.",
"product_ids": [
"CSAFPID-0040"
]
},
{
"category": "vendor_fix",
"details": "All issues remediated in the 3.02.02\nrelease, and higher. Update files can be found on the Schneider Electric Exchange https://ecoxpert.se.com/\n1. Search for \u2018relebov3.2.1\u2019\n2. Set the Filter criteria to RN or Firmware, as required",
"product_ids": [
"CSAFPID-0043"
]
},
{
"category": "vendor_fix",
"details": "The firmware is available through EcoStruxure Power Commission (EPC) software V2.18. The updated version of EPC is available here:\nhttps://www.se.com/ww/en/download/document/Ecoreach_Installer/",
"product_ids": [
"CSAFPID-0046"
]
},
{
"category": "vendor_fix",
"details": "The firmware is available through EcoStruxure Power Commission (EPC) software V2.18. The updated version of EPC is available here:\nhttps://www.se.com/ww/en/download/document/Ecoreach_Installer/",
"product_ids": [
"CSAFPID-0045"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nIf possible, this product should be replaced by Link 150 (commercial reference: EGX150) for which a patch is available in FW version 5.1.18 or greater.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0047"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nIf possible, this product should be replaced by Com\u2019X510 (commercial reference: EBX510) which is not impacted by this vulnerability.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0048"
]
},
{
"category": "vendor_fix",
"details": "PowerLogic PM5000 Model,Affected Version,Remediation/Mitigation\n\"PM5560, PM5563, PM5580\",V2.7.8 and earlier,\"A fix in V2.8.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5560_PM5563_PM5580_V2.8.3_Release.zip\u0026p_Doc_Ref=PM5560_PM5563_PM5580\"\nPM5561,V10.7.1 and earlier,\"A fix in V10.7.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5561_upgrade_10.7.3_Release.zip\u0026p_Doc_Ref=PM5561\"\nPM5650,V2.10.1 and earlier,\"A fix in V2.11.2 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5650_upgrade_V2.11.2_Release.zip\u0026p_Doc_Ref=PM5650\"\nPM5570,V3.1.0 and earlier,\"A fix in V3.1.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5570_upgrade_V3.1.3_Release.zip\u0026p_Doc_Ref=PM5570\"\nPM5660,V3.1.1 and earlier,\"A fix in V3.1.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5660_upgrade_V3.1.3_Release.zip\u0026p_Doc_Ref=PM5660\"\nPM5760,V3.1.1 and earlier,\"A fix in V3.1.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5760_upgrade_V3.1.3_Release.zip\u0026p_Doc_Ref=PM5760\"\n\"PM5320, PM5340\",V2.1.3 and earlier,\"A fix in V2.1.5 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5320_PM5340_v2.1.5_HW_vB1.zip\u0026p_Doc_Ref=PM5320_PM5340\"\nPM5341,V2.4.1 and earlier,\"A fix in V2.4.4 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5341_v2.4.4_HW_vB1.zip\u0026p_Doc_Ref=PM5341\"",
"product_ids": [
"CSAFPID-0049"
]
},
{
"category": "vendor_fix",
"details": "Firmware V2.9 of the TeSys T LTMRxxEyy Motor Controllers includes a fix for this vulnerability and is available for download here:\nhttps://download.schneider-electric.com/files?p_Archive_Name=Evo_TeSysT_Pack-13.zip\u0026p_enDocType=Firmware\u0026p_Doc_Ref=Evo_TeSysT_Pack-13",
"product_ids": [
"CSAFPID-0050"
]
},
{
"category": "mitigation",
"details": "Since the vulnerabilities are present in the TCP/IP stack, an active network connection is required to exploit them. Therefore, Schneider Electric customers can act now to mitigate the risk of attack by limiting access to their devices.\nFor devices on a local network:\n\u2022 Network Partitioning: Locate devices behind firewalls capable of deep packet inspection with rulesets limiting access with only approved protocols and functions and to only those devices and endpoints requiring access.\n\u2022 Anomalous IP traffic: Block and detect anomalous IP traffic and malformed packets. Refer to the Solution section of the CERT-Coordination Center Vulnerability Note VU#257161 for details.\n\u2022 Disable DHCP on the NMC and configure it to use a static IP address.\n\u2022 To avoid the use of DNS, set DNS servers to 0.0.0.0 and utilize static IP addresses for all servers the NMC will connect.\n\u2022 If DNS must be used, then normalize DNS through a secure recursive server or application layer firewall\n\u2022 Enable only secure remote access methods. Disable any insecure protocols.\nFor devices that must communicate via the Internet:\n\u2022 Minimize network exposure for embedded and critical devices, keeping exposure to the minimum necessary, and ensuring that devices are not accessible from the Internet unless absolutely essential.\nIf network access is not required:\n\u2022 Remove the Ethernet cable from the affected device.\nAdditional mitigations:\n\u2022 Access Controls: Install physical and logical controls so no unauthorized personnel or device can access your systems, components, peripheral equipment, and networks.\nFor more details and assistance on how to protect your installation, please contact your local Schneider Electric Industrial Cybersecurity Services organization, which is fully aware of this situation and can support you through the process.",
"product_ids": [
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2020-11908",
"notes": [
{
"category": "details",
"text": "Additional details on these specific vulnerabilities can be found on the ICS-CERT Advisory at https://www.us-cert.gov/ics/advisories/ICSA-20-168-01."
}
],
"product_status": {
"fixed": [
"CSAFPID-0003",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0013",
"CSAFPID-0015",
"CSAFPID-0017",
"CSAFPID-0025",
"CSAFPID-0053",
"CSAFPID-0054",
"CSAFPID-0056",
"CSAFPID-0057"
],
"known_affected": [
"CSAFPID-0002",
"CSAFPID-0004",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0014",
"CSAFPID-0016",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0052",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0050"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V3.2IE25 and above.\nFor product release prior to V3.2IE25, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V3.3IE33 and above.\nFor product release prior to V3.3IE33, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0004"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V3.3IE26 and above.\nFor product release prior V3.3IE26, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0006"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V1.6IE01 and above. For product release prior to V1.6IE01, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0008"
]
},
{
"category": "vendor_fix",
"details": "Telepace Studio must be used to update the SCADAPack 32 RTU firmware to version 2.25 or newer.\nDownload and install Telepace Studio 5.4.2 or newer from https://shop.exchange.se.com/en-US/apps/55670",
"product_ids": [
"CSAFPID-0010"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in firmware version V2.2.1.1 available for download below:\nhttps://www.se.com/ww/en/download/document/TM3BC_EIP_2_2_1_1/",
"product_ids": [
"CSAFPID-0012"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in firmware version V2.1.1.1 available for download below:\nhttps://www.se.com/ww/en/download/document/TM3BC_MBSL_2_1_1_1/",
"product_ids": [
"CSAFPID-0014"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in firmware version V2.1.1.1 available for download below:\nhttps://www.se.com/ww/en/download/document/TM3BC_CO_2_1_1_1/",
"product_ids": [
"CSAFPID-0016"
]
},
{
"category": "no_fix_planned",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0018"
]
},
{
"category": "no_fix_planned",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0019"
]
},
{
"category": "none_available",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0052"
]
},
{
"category": "no_fix_planned",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0020"
]
},
{
"category": "vendor_fix",
"details": "A fix is available in product releases V1.15IE25 and above.\nFor product release prior V1.15IE25, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0023"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases\nSV:02.05, PV:03, RL:03 and above.\nFor product release prior to SV:02.05, PV:03, RL:03, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for\nmore information on upgrading to SV:02.05.",
"product_ids": [
"CSAFPID-0025"
]
},
{
"category": "mitigation",
"details": "The ACE850 ethernet module for SEPAM protection relays is a product designed to be operated on a secure network.\nTo minimize the risk from both Ripple 20 and the network-accessible functions of the relay we recommend that concerned customers:\n- Enable the IP-based filtering capability in the ACE850\n- Place strong, active controls on the network hosting the ACE850\n- Consider moving to a newer relay such as the Easergy series if product-level access protections are required\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0026"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization Offer.\nIf possible, this product should be replaced by PowerTagLink-C (commercial reference A9XELC10 for which a patch is available from version 1.7.5 or greater.\nFor specific applications not supported by PowerTag Link C (pulse metering, Acti9 RCA, Acti9 iPF+SD 24), apply the mitigation detailed in the Recommended Mitigation section.",
"product_ids": [
"CSAFPID-0027"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nIf possible, this product should be replaced by Smartlink SIB (commercial reference: A9XMZA08) for which a patch is available in FW version 2.18 or greater.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0028"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Acti9 PowerTag Link C which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0029"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nCustomers should immediately apply the mitigations detailed in the Recommended Mitigations section below to reduce the risk of exploit.\nCustomers should also consider upgrading to EcoStruxure Building Operation which is not impacted by this vulnerability.",
"product_ids": [
"CSAFPID-0030"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Wiser Energy IP module by Schneider Electric which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0031"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Wiser Energy IP module by Clipsal which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0032"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Gateway Connector by Elko which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0033"
]
},
{
"category": "vendor_fix",
"details": "Customers should update firmware using EcoStruxure Power Commission (EPC) installer V7.0 available here: https://www.se.com/ww/en/product-range-download/64482-acti9-powertag-link/?selected-nodeid=12492093362#/software-firmware-tab",
"product_ids": [
"CSAFPID-0034"
]
},
{
"category": "vendor_fix",
"details": "Customers should update firmware using EcoStruxure Power Commission (EPC) installer V7.0 available here: https://www.se.com/ww/en/product-range-download/64482-acti9-powertag-link/?selected-nodeid=12492093362#/software-firmware-tab",
"product_ids": [
"CSAFPID-0036",
"CSAFPID-0037"
]
},
{
"category": "vendor_fix",
"details": "A fix is available in V5.1.18: https://www.se.com/ww/en/product-range-download/63423-link150/?selected-node-id=12366756685 - /software-firmware-tab",
"product_ids": [
"CSAFPID-0038"
]
},
{
"category": "vendor_fix",
"details": "The firmware is available through EcoStruxure Power Commission (EPC) software V2.18. The updated version of EPC is available here:\nhttps://www.se.com/ww/en/download/document/Ecoreach_Installer/",
"product_ids": [
"CSAFPID-0042"
]
},
{
"category": "vendor_fix",
"details": "All issues remediated in the 3.02.02 release, and higher. Update files can be found on the Schneider Electric Exchange https://ecoxpert.se.com/ --\n1. Search for \u2018relebov3.2.1\u2019\n2. Set the Filter criteria to RN or Firmware, as required.",
"product_ids": [
"CSAFPID-0040"
]
},
{
"category": "vendor_fix",
"details": "All issues remediated in the 3.02.02\nrelease, and higher. Update files can be found on the Schneider Electric Exchange https://ecoxpert.se.com/\n1. Search for \u2018relebov3.2.1\u2019\n2. Set the Filter criteria to RN or Firmware, as required",
"product_ids": [
"CSAFPID-0043"
]
},
{
"category": "vendor_fix",
"details": "The firmware is available through EcoStruxure Power Commission (EPC) software V2.18. The updated version of EPC is available here:\nhttps://www.se.com/ww/en/download/document/Ecoreach_Installer/",
"product_ids": [
"CSAFPID-0046"
]
},
{
"category": "vendor_fix",
"details": "The firmware is available through EcoStruxure Power Commission (EPC) software V2.18. The updated version of EPC is available here:\nhttps://www.se.com/ww/en/download/document/Ecoreach_Installer/",
"product_ids": [
"CSAFPID-0045"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nIf possible, this product should be replaced by Link 150 (commercial reference: EGX150) for which a patch is available in FW version 5.1.18 or greater.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0047"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nIf possible, this product should be replaced by Com\u2019X510 (commercial reference: EBX510) which is not impacted by this vulnerability.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0048"
]
},
{
"category": "vendor_fix",
"details": "PowerLogic PM5000 Model,Affected Version,Remediation/Mitigation\n\"PM5560, PM5563, PM5580\",V2.7.8 and earlier,\"A fix in V2.8.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5560_PM5563_PM5580_V2.8.3_Release.zip\u0026p_Doc_Ref=PM5560_PM5563_PM5580\"\nPM5561,V10.7.1 and earlier,\"A fix in V10.7.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5561_upgrade_10.7.3_Release.zip\u0026p_Doc_Ref=PM5561\"\nPM5650,V2.10.1 and earlier,\"A fix in V2.11.2 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5650_upgrade_V2.11.2_Release.zip\u0026p_Doc_Ref=PM5650\"\nPM5570,V3.1.0 and earlier,\"A fix in V3.1.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5570_upgrade_V3.1.3_Release.zip\u0026p_Doc_Ref=PM5570\"\nPM5660,V3.1.1 and earlier,\"A fix in V3.1.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5660_upgrade_V3.1.3_Release.zip\u0026p_Doc_Ref=PM5660\"\nPM5760,V3.1.1 and earlier,\"A fix in V3.1.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5760_upgrade_V3.1.3_Release.zip\u0026p_Doc_Ref=PM5760\"\n\"PM5320, PM5340\",V2.1.3 and earlier,\"A fix in V2.1.5 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5320_PM5340_v2.1.5_HW_vB1.zip\u0026p_Doc_Ref=PM5320_PM5340\"\nPM5341,V2.4.1 and earlier,\"A fix in V2.4.4 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5341_v2.4.4_HW_vB1.zip\u0026p_Doc_Ref=PM5341\"",
"product_ids": [
"CSAFPID-0049"
]
},
{
"category": "vendor_fix",
"details": "Firmware V2.9 of the TeSys T LTMRxxEyy Motor Controllers includes a fix for this vulnerability and is available for download here:\nhttps://download.schneider-electric.com/files?p_Archive_Name=Evo_TeSysT_Pack-13.zip\u0026p_enDocType=Firmware\u0026p_Doc_Ref=Evo_TeSysT_Pack-13",
"product_ids": [
"CSAFPID-0050"
]
},
{
"category": "mitigation",
"details": "Since the vulnerabilities are present in the TCP/IP stack, an active network connection is required to exploit them. Therefore, Schneider Electric customers can act now to mitigate the risk of attack by limiting access to their devices.\nFor devices on a local network:\n\u2022 Network Partitioning: Locate devices behind firewalls capable of deep packet inspection with rulesets limiting access with only approved protocols and functions and to only those devices and endpoints requiring access.\n\u2022 Anomalous IP traffic: Block and detect anomalous IP traffic and malformed packets. Refer to the Solution section of the CERT-Coordination Center Vulnerability Note VU#257161 for details.\n\u2022 Disable DHCP on the NMC and configure it to use a static IP address.\n\u2022 To avoid the use of DNS, set DNS servers to 0.0.0.0 and utilize static IP addresses for all servers the NMC will connect.\n\u2022 If DNS must be used, then normalize DNS through a secure recursive server or application layer firewall\n\u2022 Enable only secure remote access methods. Disable any insecure protocols.\nFor devices that must communicate via the Internet:\n\u2022 Minimize network exposure for embedded and critical devices, keeping exposure to the minimum necessary, and ensuring that devices are not accessible from the Internet unless absolutely essential.\nIf network access is not required:\n\u2022 Remove the Ethernet cable from the affected device.\nAdditional mitigations:\n\u2022 Access Controls: Install physical and logical controls so no unauthorized personnel or device can access your systems, components, peripheral equipment, and networks.\nFor more details and assistance on how to protect your installation, please contact your local Schneider Electric Industrial Cybersecurity Services organization, which is fully aware of this situation and can support you through the process.",
"product_ids": [
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2020-11909",
"notes": [
{
"category": "details",
"text": "Additional details on these specific vulnerabilities can be found on the ICS-CERT Advisory at https://www.us-cert.gov/ics/advisories/ICSA-20-168-01."
}
],
"product_status": {
"fixed": [
"CSAFPID-0003",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0013",
"CSAFPID-0015",
"CSAFPID-0017",
"CSAFPID-0025",
"CSAFPID-0053",
"CSAFPID-0054",
"CSAFPID-0056",
"CSAFPID-0057"
],
"known_affected": [
"CSAFPID-0002",
"CSAFPID-0004",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0014",
"CSAFPID-0016",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0052",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0050"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V3.2IE25 and above.\nFor product release prior to V3.2IE25, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V3.3IE33 and above.\nFor product release prior to V3.3IE33, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0004"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V3.3IE26 and above.\nFor product release prior V3.3IE26, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0006"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V1.6IE01 and above. For product release prior to V1.6IE01, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0008"
]
},
{
"category": "vendor_fix",
"details": "Telepace Studio must be used to update the SCADAPack 32 RTU firmware to version 2.25 or newer.\nDownload and install Telepace Studio 5.4.2 or newer from https://shop.exchange.se.com/en-US/apps/55670",
"product_ids": [
"CSAFPID-0010"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in firmware version V2.2.1.1 available for download below:\nhttps://www.se.com/ww/en/download/document/TM3BC_EIP_2_2_1_1/",
"product_ids": [
"CSAFPID-0012"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in firmware version V2.1.1.1 available for download below:\nhttps://www.se.com/ww/en/download/document/TM3BC_MBSL_2_1_1_1/",
"product_ids": [
"CSAFPID-0014"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in firmware version V2.1.1.1 available for download below:\nhttps://www.se.com/ww/en/download/document/TM3BC_CO_2_1_1_1/",
"product_ids": [
"CSAFPID-0016"
]
},
{
"category": "no_fix_planned",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0018"
]
},
{
"category": "no_fix_planned",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0019"
]
},
{
"category": "none_available",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0052"
]
},
{
"category": "no_fix_planned",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0020"
]
},
{
"category": "mitigation",
"details": "This offer is not affected by CVE-2020-11897, CVE-2020-11899, CVE-2020-11900, CVE-2020-11902, CVE-2020-11903, CVE-2020-11905, CVE-2020-11908, CVE-2020-11913.\nFor other CVEs, the CVSS score is evaluated as Medium in the product context.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0021"
]
},
{
"category": "mitigation",
"details": "This offer is not affected by CVE-2020-11897, CVE-2020-11899, CVE-2020-11900, CVE-2020-11902, CVE-2020-11903, CVE-2020-11905, CVE-2020-11908, CVE-2020-11913.\nFor other CVEs, the CVSS score is evaluated as Medium in the product context.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0022"
]
},
{
"category": "vendor_fix",
"details": "A fix is available in product releases V1.15IE25 and above.\nFor product release prior V1.15IE25, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0023"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases\nSV:02.05, PV:03, RL:03 and above.\nFor product release prior to SV:02.05, PV:03, RL:03, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for\nmore information on upgrading to SV:02.05.",
"product_ids": [
"CSAFPID-0025"
]
},
{
"category": "mitigation",
"details": "The ACE850 ethernet module for SEPAM protection relays is a product designed to be operated on a secure network.\nTo minimize the risk from both Ripple 20 and the network-accessible functions of the relay we recommend that concerned customers:\n- Enable the IP-based filtering capability in the ACE850\n- Place strong, active controls on the network hosting the ACE850\n- Consider moving to a newer relay such as the Easergy series if product-level access protections are required\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0026"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization Offer.\nIf possible, this product should be replaced by PowerTagLink-C (commercial reference A9XELC10 for which a patch is available from version 1.7.5 or greater.\nFor specific applications not supported by PowerTag Link C (pulse metering, Acti9 RCA, Acti9 iPF+SD 24), apply the mitigation detailed in the Recommended Mitigation section.",
"product_ids": [
"CSAFPID-0027"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nIf possible, this product should be replaced by Smartlink SIB (commercial reference: A9XMZA08) for which a patch is available in FW version 2.18 or greater.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0028"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Acti9 PowerTag Link C which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0029"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nCustomers should immediately apply the mitigations detailed in the Recommended Mitigations section below to reduce the risk of exploit.\nCustomers should also consider upgrading to EcoStruxure Building Operation which is not impacted by this vulnerability.",
"product_ids": [
"CSAFPID-0030"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Wiser Energy IP module by Schneider Electric which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0031"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Wiser Energy IP module by Clipsal which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0032"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Gateway Connector by Elko which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0033"
]
},
{
"category": "vendor_fix",
"details": "Customers should update firmware using EcoStruxure Power Commission (EPC) installer V7.0 available here: https://www.se.com/ww/en/product-range-download/64482-acti9-powertag-link/?selected-nodeid=12492093362#/software-firmware-tab",
"product_ids": [
"CSAFPID-0034"
]
},
{
"category": "vendor_fix",
"details": "Customers should update firmware using EcoStruxure Power Commission (EPC) installer V7.0 available here: https://www.se.com/ww/en/product-range-download/64482-acti9-powertag-link/?selected-nodeid=12492093362#/software-firmware-tab",
"product_ids": [
"CSAFPID-0036",
"CSAFPID-0037"
]
},
{
"category": "vendor_fix",
"details": "A fix is available in V5.1.18: https://www.se.com/ww/en/product-range-download/63423-link150/?selected-node-id=12366756685 - /software-firmware-tab",
"product_ids": [
"CSAFPID-0038"
]
},
{
"category": "vendor_fix",
"details": "The firmware is available through EcoStruxure Power Commission (EPC) software V2.18. The updated version of EPC is available here:\nhttps://www.se.com/ww/en/download/document/Ecoreach_Installer/",
"product_ids": [
"CSAFPID-0042"
]
},
{
"category": "vendor_fix",
"details": "All issues remediated in the 3.02.02 release, and higher. Update files can be found on the Schneider Electric Exchange https://ecoxpert.se.com/ --\n1. Search for \u2018relebov3.2.1\u2019\n2. Set the Filter criteria to RN or Firmware, as required.",
"product_ids": [
"CSAFPID-0040"
]
},
{
"category": "vendor_fix",
"details": "All issues remediated in the 3.02.02\nrelease, and higher. Update files can be found on the Schneider Electric Exchange https://ecoxpert.se.com/\n1. Search for \u2018relebov3.2.1\u2019\n2. Set the Filter criteria to RN or Firmware, as required",
"product_ids": [
"CSAFPID-0043"
]
},
{
"category": "vendor_fix",
"details": "The firmware is available through EcoStruxure Power Commission (EPC) software V2.18. The updated version of EPC is available here:\nhttps://www.se.com/ww/en/download/document/Ecoreach_Installer/",
"product_ids": [
"CSAFPID-0046"
]
},
{
"category": "vendor_fix",
"details": "The firmware is available through EcoStruxure Power Commission (EPC) software V2.18. The updated version of EPC is available here:\nhttps://www.se.com/ww/en/download/document/Ecoreach_Installer/",
"product_ids": [
"CSAFPID-0045"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nIf possible, this product should be replaced by Link 150 (commercial reference: EGX150) for which a patch is available in FW version 5.1.18 or greater.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0047"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nIf possible, this product should be replaced by Com\u2019X510 (commercial reference: EBX510) which is not impacted by this vulnerability.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0048"
]
},
{
"category": "vendor_fix",
"details": "PowerLogic PM5000 Model,Affected Version,Remediation/Mitigation\n\"PM5560, PM5563, PM5580\",V2.7.8 and earlier,\"A fix in V2.8.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5560_PM5563_PM5580_V2.8.3_Release.zip\u0026p_Doc_Ref=PM5560_PM5563_PM5580\"\nPM5561,V10.7.1 and earlier,\"A fix in V10.7.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5561_upgrade_10.7.3_Release.zip\u0026p_Doc_Ref=PM5561\"\nPM5650,V2.10.1 and earlier,\"A fix in V2.11.2 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5650_upgrade_V2.11.2_Release.zip\u0026p_Doc_Ref=PM5650\"\nPM5570,V3.1.0 and earlier,\"A fix in V3.1.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5570_upgrade_V3.1.3_Release.zip\u0026p_Doc_Ref=PM5570\"\nPM5660,V3.1.1 and earlier,\"A fix in V3.1.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5660_upgrade_V3.1.3_Release.zip\u0026p_Doc_Ref=PM5660\"\nPM5760,V3.1.1 and earlier,\"A fix in V3.1.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5760_upgrade_V3.1.3_Release.zip\u0026p_Doc_Ref=PM5760\"\n\"PM5320, PM5340\",V2.1.3 and earlier,\"A fix in V2.1.5 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5320_PM5340_v2.1.5_HW_vB1.zip\u0026p_Doc_Ref=PM5320_PM5340\"\nPM5341,V2.4.1 and earlier,\"A fix in V2.4.4 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5341_v2.4.4_HW_vB1.zip\u0026p_Doc_Ref=PM5341\"",
"product_ids": [
"CSAFPID-0049"
]
},
{
"category": "vendor_fix",
"details": "Firmware V2.9 of the TeSys T LTMRxxEyy Motor Controllers includes a fix for this vulnerability and is available for download here:\nhttps://download.schneider-electric.com/files?p_Archive_Name=Evo_TeSysT_Pack-13.zip\u0026p_enDocType=Firmware\u0026p_Doc_Ref=Evo_TeSysT_Pack-13",
"product_ids": [
"CSAFPID-0050"
]
},
{
"category": "mitigation",
"details": "Since the vulnerabilities are present in the TCP/IP stack, an active network connection is required to exploit them. Therefore, Schneider Electric customers can act now to mitigate the risk of attack by limiting access to their devices.\nFor devices on a local network:\n\u2022 Network Partitioning: Locate devices behind firewalls capable of deep packet inspection with rulesets limiting access with only approved protocols and functions and to only those devices and endpoints requiring access.\n\u2022 Anomalous IP traffic: Block and detect anomalous IP traffic and malformed packets. Refer to the Solution section of the CERT-Coordination Center Vulnerability Note VU#257161 for details.\n\u2022 Disable DHCP on the NMC and configure it to use a static IP address.\n\u2022 To avoid the use of DNS, set DNS servers to 0.0.0.0 and utilize static IP addresses for all servers the NMC will connect.\n\u2022 If DNS must be used, then normalize DNS through a secure recursive server or application layer firewall\n\u2022 Enable only secure remote access methods. Disable any insecure protocols.\nFor devices that must communicate via the Internet:\n\u2022 Minimize network exposure for embedded and critical devices, keeping exposure to the minimum necessary, and ensuring that devices are not accessible from the Internet unless absolutely essential.\nIf network access is not required:\n\u2022 Remove the Ethernet cable from the affected device.\nAdditional mitigations:\n\u2022 Access Controls: Install physical and logical controls so no unauthorized personnel or device can access your systems, components, peripheral equipment, and networks.\nFor more details and assistance on how to protect your installation, please contact your local Schneider Electric Industrial Cybersecurity Services organization, which is fully aware of this situation and can support you through the process.",
"product_ids": [
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2020-11910",
"notes": [
{
"category": "details",
"text": "Additional details on these specific vulnerabilities can be found on the ICS-CERT Advisory at https://www.us-cert.gov/ics/advisories/ICSA-20-168-01."
}
],
"product_status": {
"fixed": [
"CSAFPID-0003",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0013",
"CSAFPID-0015",
"CSAFPID-0017",
"CSAFPID-0025",
"CSAFPID-0053",
"CSAFPID-0054",
"CSAFPID-0056",
"CSAFPID-0057"
],
"known_affected": [
"CSAFPID-0002",
"CSAFPID-0004",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0014",
"CSAFPID-0016",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0052",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0050"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V3.2IE25 and above.\nFor product release prior to V3.2IE25, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V3.3IE33 and above.\nFor product release prior to V3.3IE33, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0004"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V3.3IE26 and above.\nFor product release prior V3.3IE26, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0006"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V1.6IE01 and above. For product release prior to V1.6IE01, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0008"
]
},
{
"category": "vendor_fix",
"details": "Telepace Studio must be used to update the SCADAPack 32 RTU firmware to version 2.25 or newer.\nDownload and install Telepace Studio 5.4.2 or newer from https://shop.exchange.se.com/en-US/apps/55670",
"product_ids": [
"CSAFPID-0010"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in firmware version V2.2.1.1 available for download below:\nhttps://www.se.com/ww/en/download/document/TM3BC_EIP_2_2_1_1/",
"product_ids": [
"CSAFPID-0012"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in firmware version V2.1.1.1 available for download below:\nhttps://www.se.com/ww/en/download/document/TM3BC_MBSL_2_1_1_1/",
"product_ids": [
"CSAFPID-0014"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in firmware version V2.1.1.1 available for download below:\nhttps://www.se.com/ww/en/download/document/TM3BC_CO_2_1_1_1/",
"product_ids": [
"CSAFPID-0016"
]
},
{
"category": "no_fix_planned",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0018"
]
},
{
"category": "no_fix_planned",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0019"
]
},
{
"category": "none_available",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0052"
]
},
{
"category": "no_fix_planned",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0020"
]
},
{
"category": "mitigation",
"details": "This offer is not affected by CVE-2020-11897, CVE-2020-11899, CVE-2020-11900, CVE-2020-11902, CVE-2020-11903, CVE-2020-11905, CVE-2020-11908, CVE-2020-11913.\nFor other CVEs, the CVSS score is evaluated as Medium in the product context.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0021"
]
},
{
"category": "mitigation",
"details": "This offer is not affected by CVE-2020-11897, CVE-2020-11899, CVE-2020-11900, CVE-2020-11902, CVE-2020-11903, CVE-2020-11905, CVE-2020-11908, CVE-2020-11913.\nFor other CVEs, the CVSS score is evaluated as Medium in the product context.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0022"
]
},
{
"category": "vendor_fix",
"details": "A fix is available in product releases V1.15IE25 and above.\nFor product release prior V1.15IE25, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0023"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases\nSV:02.05, PV:03, RL:03 and above.\nFor product release prior to SV:02.05, PV:03, RL:03, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for\nmore information on upgrading to SV:02.05.",
"product_ids": [
"CSAFPID-0025"
]
},
{
"category": "mitigation",
"details": "The ACE850 ethernet module for SEPAM protection relays is a product designed to be operated on a secure network.\nTo minimize the risk from both Ripple 20 and the network-accessible functions of the relay we recommend that concerned customers:\n- Enable the IP-based filtering capability in the ACE850\n- Place strong, active controls on the network hosting the ACE850\n- Consider moving to a newer relay such as the Easergy series if product-level access protections are required\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0026"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization Offer.\nIf possible, this product should be replaced by PowerTagLink-C (commercial reference A9XELC10 for which a patch is available from version 1.7.5 or greater.\nFor specific applications not supported by PowerTag Link C (pulse metering, Acti9 RCA, Acti9 iPF+SD 24), apply the mitigation detailed in the Recommended Mitigation section.",
"product_ids": [
"CSAFPID-0027"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nIf possible, this product should be replaced by Smartlink SIB (commercial reference: A9XMZA08) for which a patch is available in FW version 2.18 or greater.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0028"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Acti9 PowerTag Link C which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0029"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nCustomers should immediately apply the mitigations detailed in the Recommended Mitigations section below to reduce the risk of exploit.\nCustomers should also consider upgrading to EcoStruxure Building Operation which is not impacted by this vulnerability.",
"product_ids": [
"CSAFPID-0030"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Wiser Energy IP module by Schneider Electric which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0031"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Wiser Energy IP module by Clipsal which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0032"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Gateway Connector by Elko which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0033"
]
},
{
"category": "vendor_fix",
"details": "Customers should update firmware using EcoStruxure Power Commission (EPC) installer V7.0 available here: https://www.se.com/ww/en/product-range-download/64482-acti9-powertag-link/?selected-nodeid=12492093362#/software-firmware-tab",
"product_ids": [
"CSAFPID-0034"
]
},
{
"category": "vendor_fix",
"details": "Customers should update firmware using EcoStruxure Power Commission (EPC) installer V7.0 available here: https://www.se.com/ww/en/product-range-download/64482-acti9-powertag-link/?selected-nodeid=12492093362#/software-firmware-tab",
"product_ids": [
"CSAFPID-0036",
"CSAFPID-0037"
]
},
{
"category": "vendor_fix",
"details": "A fix is available in V5.1.18: https://www.se.com/ww/en/product-range-download/63423-link150/?selected-node-id=12366756685 - /software-firmware-tab",
"product_ids": [
"CSAFPID-0038"
]
},
{
"category": "vendor_fix",
"details": "The firmware is available through EcoStruxure Power Commission (EPC) software V2.18. The updated version of EPC is available here:\nhttps://www.se.com/ww/en/download/document/Ecoreach_Installer/",
"product_ids": [
"CSAFPID-0042"
]
},
{
"category": "vendor_fix",
"details": "All issues remediated in the 3.02.02 release, and higher. Update files can be found on the Schneider Electric Exchange https://ecoxpert.se.com/ --\n1. Search for \u2018relebov3.2.1\u2019\n2. Set the Filter criteria to RN or Firmware, as required.",
"product_ids": [
"CSAFPID-0040"
]
},
{
"category": "vendor_fix",
"details": "All issues remediated in the 3.02.02\nrelease, and higher. Update files can be found on the Schneider Electric Exchange https://ecoxpert.se.com/\n1. Search for \u2018relebov3.2.1\u2019\n2. Set the Filter criteria to RN or Firmware, as required",
"product_ids": [
"CSAFPID-0043"
]
},
{
"category": "vendor_fix",
"details": "The firmware is available through EcoStruxure Power Commission (EPC) software V2.18. The updated version of EPC is available here:\nhttps://www.se.com/ww/en/download/document/Ecoreach_Installer/",
"product_ids": [
"CSAFPID-0046"
]
},
{
"category": "vendor_fix",
"details": "The firmware is available through EcoStruxure Power Commission (EPC) software V2.18. The updated version of EPC is available here:\nhttps://www.se.com/ww/en/download/document/Ecoreach_Installer/",
"product_ids": [
"CSAFPID-0045"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nIf possible, this product should be replaced by Link 150 (commercial reference: EGX150) for which a patch is available in FW version 5.1.18 or greater.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0047"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nIf possible, this product should be replaced by Com\u2019X510 (commercial reference: EBX510) which is not impacted by this vulnerability.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0048"
]
},
{
"category": "vendor_fix",
"details": "PowerLogic PM5000 Model,Affected Version,Remediation/Mitigation\n\"PM5560, PM5563, PM5580\",V2.7.8 and earlier,\"A fix in V2.8.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5560_PM5563_PM5580_V2.8.3_Release.zip\u0026p_Doc_Ref=PM5560_PM5563_PM5580\"\nPM5561,V10.7.1 and earlier,\"A fix in V10.7.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5561_upgrade_10.7.3_Release.zip\u0026p_Doc_Ref=PM5561\"\nPM5650,V2.10.1 and earlier,\"A fix in V2.11.2 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5650_upgrade_V2.11.2_Release.zip\u0026p_Doc_Ref=PM5650\"\nPM5570,V3.1.0 and earlier,\"A fix in V3.1.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5570_upgrade_V3.1.3_Release.zip\u0026p_Doc_Ref=PM5570\"\nPM5660,V3.1.1 and earlier,\"A fix in V3.1.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5660_upgrade_V3.1.3_Release.zip\u0026p_Doc_Ref=PM5660\"\nPM5760,V3.1.1 and earlier,\"A fix in V3.1.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5760_upgrade_V3.1.3_Release.zip\u0026p_Doc_Ref=PM5760\"\n\"PM5320, PM5340\",V2.1.3 and earlier,\"A fix in V2.1.5 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5320_PM5340_v2.1.5_HW_vB1.zip\u0026p_Doc_Ref=PM5320_PM5340\"\nPM5341,V2.4.1 and earlier,\"A fix in V2.4.4 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5341_v2.4.4_HW_vB1.zip\u0026p_Doc_Ref=PM5341\"",
"product_ids": [
"CSAFPID-0049"
]
},
{
"category": "vendor_fix",
"details": "Firmware V2.9 of the TeSys T LTMRxxEyy Motor Controllers includes a fix for this vulnerability and is available for download here:\nhttps://download.schneider-electric.com/files?p_Archive_Name=Evo_TeSysT_Pack-13.zip\u0026p_enDocType=Firmware\u0026p_Doc_Ref=Evo_TeSysT_Pack-13",
"product_ids": [
"CSAFPID-0050"
]
},
{
"category": "mitigation",
"details": "Since the vulnerabilities are present in the TCP/IP stack, an active network connection is required to exploit them. Therefore, Schneider Electric customers can act now to mitigate the risk of attack by limiting access to their devices.\nFor devices on a local network:\n\u2022 Network Partitioning: Locate devices behind firewalls capable of deep packet inspection with rulesets limiting access with only approved protocols and functions and to only those devices and endpoints requiring access.\n\u2022 Anomalous IP traffic: Block and detect anomalous IP traffic and malformed packets. Refer to the Solution section of the CERT-Coordination Center Vulnerability Note VU#257161 for details.\n\u2022 Disable DHCP on the NMC and configure it to use a static IP address.\n\u2022 To avoid the use of DNS, set DNS servers to 0.0.0.0 and utilize static IP addresses for all servers the NMC will connect.\n\u2022 If DNS must be used, then normalize DNS through a secure recursive server or application layer firewall\n\u2022 Enable only secure remote access methods. Disable any insecure protocols.\nFor devices that must communicate via the Internet:\n\u2022 Minimize network exposure for embedded and critical devices, keeping exposure to the minimum necessary, and ensuring that devices are not accessible from the Internet unless absolutely essential.\nIf network access is not required:\n\u2022 Remove the Ethernet cable from the affected device.\nAdditional mitigations:\n\u2022 Access Controls: Install physical and logical controls so no unauthorized personnel or device can access your systems, components, peripheral equipment, and networks.\nFor more details and assistance on how to protect your installation, please contact your local Schneider Electric Industrial Cybersecurity Services organization, which is fully aware of this situation and can support you through the process.",
"product_ids": [
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2020-11911",
"notes": [
{
"category": "details",
"text": "Additional details on these specific vulnerabilities can be found on the ICS-CERT Advisory at https://www.us-cert.gov/ics/advisories/ICSA-20-168-01."
}
],
"product_status": {
"fixed": [
"CSAFPID-0003",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0013",
"CSAFPID-0015",
"CSAFPID-0017",
"CSAFPID-0025",
"CSAFPID-0053",
"CSAFPID-0054",
"CSAFPID-0056",
"CSAFPID-0057"
],
"known_affected": [
"CSAFPID-0002",
"CSAFPID-0004",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0014",
"CSAFPID-0016",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0052",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0050"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V3.2IE25 and above.\nFor product release prior to V3.2IE25, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V3.3IE33 and above.\nFor product release prior to V3.3IE33, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0004"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V3.3IE26 and above.\nFor product release prior V3.3IE26, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0006"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V1.6IE01 and above. For product release prior to V1.6IE01, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0008"
]
},
{
"category": "vendor_fix",
"details": "Telepace Studio must be used to update the SCADAPack 32 RTU firmware to version 2.25 or newer.\nDownload and install Telepace Studio 5.4.2 or newer from https://shop.exchange.se.com/en-US/apps/55670",
"product_ids": [
"CSAFPID-0010"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in firmware version V2.2.1.1 available for download below:\nhttps://www.se.com/ww/en/download/document/TM3BC_EIP_2_2_1_1/",
"product_ids": [
"CSAFPID-0012"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in firmware version V2.1.1.1 available for download below:\nhttps://www.se.com/ww/en/download/document/TM3BC_MBSL_2_1_1_1/",
"product_ids": [
"CSAFPID-0014"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in firmware version V2.1.1.1 available for download below:\nhttps://www.se.com/ww/en/download/document/TM3BC_CO_2_1_1_1/",
"product_ids": [
"CSAFPID-0016"
]
},
{
"category": "no_fix_planned",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0018"
]
},
{
"category": "no_fix_planned",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0019"
]
},
{
"category": "none_available",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0052"
]
},
{
"category": "no_fix_planned",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0020"
]
},
{
"category": "mitigation",
"details": "This offer is not affected by CVE-2020-11897, CVE-2020-11899, CVE-2020-11900, CVE-2020-11902, CVE-2020-11903, CVE-2020-11905, CVE-2020-11908, CVE-2020-11913.\nFor other CVEs, the CVSS score is evaluated as Medium in the product context.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0021"
]
},
{
"category": "mitigation",
"details": "This offer is not affected by CVE-2020-11897, CVE-2020-11899, CVE-2020-11900, CVE-2020-11902, CVE-2020-11903, CVE-2020-11905, CVE-2020-11908, CVE-2020-11913.\nFor other CVEs, the CVSS score is evaluated as Medium in the product context.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0022"
]
},
{
"category": "vendor_fix",
"details": "A fix is available in product releases V1.15IE25 and above.\nFor product release prior V1.15IE25, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0023"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases\nSV:02.05, PV:03, RL:03 and above.\nFor product release prior to SV:02.05, PV:03, RL:03, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for\nmore information on upgrading to SV:02.05.",
"product_ids": [
"CSAFPID-0025"
]
},
{
"category": "mitigation",
"details": "The ACE850 ethernet module for SEPAM protection relays is a product designed to be operated on a secure network.\nTo minimize the risk from both Ripple 20 and the network-accessible functions of the relay we recommend that concerned customers:\n- Enable the IP-based filtering capability in the ACE850\n- Place strong, active controls on the network hosting the ACE850\n- Consider moving to a newer relay such as the Easergy series if product-level access protections are required\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0026"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization Offer.\nIf possible, this product should be replaced by PowerTagLink-C (commercial reference A9XELC10 for which a patch is available from version 1.7.5 or greater.\nFor specific applications not supported by PowerTag Link C (pulse metering, Acti9 RCA, Acti9 iPF+SD 24), apply the mitigation detailed in the Recommended Mitigation section.",
"product_ids": [
"CSAFPID-0027"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nIf possible, this product should be replaced by Smartlink SIB (commercial reference: A9XMZA08) for which a patch is available in FW version 2.18 or greater.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0028"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Acti9 PowerTag Link C which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0029"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nCustomers should immediately apply the mitigations detailed in the Recommended Mitigations section below to reduce the risk of exploit.\nCustomers should also consider upgrading to EcoStruxure Building Operation which is not impacted by this vulnerability.",
"product_ids": [
"CSAFPID-0030"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Wiser Energy IP module by Schneider Electric which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0031"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Wiser Energy IP module by Clipsal which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0032"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Gateway Connector by Elko which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0033"
]
},
{
"category": "vendor_fix",
"details": "Customers should update firmware using EcoStruxure Power Commission (EPC) installer V7.0 available here: https://www.se.com/ww/en/product-range-download/64482-acti9-powertag-link/?selected-nodeid=12492093362#/software-firmware-tab",
"product_ids": [
"CSAFPID-0034"
]
},
{
"category": "vendor_fix",
"details": "Customers should update firmware using EcoStruxure Power Commission (EPC) installer V7.0 available here: https://www.se.com/ww/en/product-range-download/64482-acti9-powertag-link/?selected-nodeid=12492093362#/software-firmware-tab",
"product_ids": [
"CSAFPID-0036",
"CSAFPID-0037"
]
},
{
"category": "vendor_fix",
"details": "A fix is available in V5.1.18: https://www.se.com/ww/en/product-range-download/63423-link150/?selected-node-id=12366756685 - /software-firmware-tab",
"product_ids": [
"CSAFPID-0038"
]
},
{
"category": "vendor_fix",
"details": "The firmware is available through EcoStruxure Power Commission (EPC) software V2.18. The updated version of EPC is available here:\nhttps://www.se.com/ww/en/download/document/Ecoreach_Installer/",
"product_ids": [
"CSAFPID-0042"
]
},
{
"category": "vendor_fix",
"details": "All issues remediated in the 3.02.02 release, and higher. Update files can be found on the Schneider Electric Exchange https://ecoxpert.se.com/ --\n1. Search for \u2018relebov3.2.1\u2019\n2. Set the Filter criteria to RN or Firmware, as required.",
"product_ids": [
"CSAFPID-0040"
]
},
{
"category": "vendor_fix",
"details": "All issues remediated in the 3.02.02\nrelease, and higher. Update files can be found on the Schneider Electric Exchange https://ecoxpert.se.com/\n1. Search for \u2018relebov3.2.1\u2019\n2. Set the Filter criteria to RN or Firmware, as required",
"product_ids": [
"CSAFPID-0043"
]
},
{
"category": "vendor_fix",
"details": "The firmware is available through EcoStruxure Power Commission (EPC) software V2.18. The updated version of EPC is available here:\nhttps://www.se.com/ww/en/download/document/Ecoreach_Installer/",
"product_ids": [
"CSAFPID-0046"
]
},
{
"category": "vendor_fix",
"details": "The firmware is available through EcoStruxure Power Commission (EPC) software V2.18. The updated version of EPC is available here:\nhttps://www.se.com/ww/en/download/document/Ecoreach_Installer/",
"product_ids": [
"CSAFPID-0045"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nIf possible, this product should be replaced by Link 150 (commercial reference: EGX150) for which a patch is available in FW version 5.1.18 or greater.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0047"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nIf possible, this product should be replaced by Com\u2019X510 (commercial reference: EBX510) which is not impacted by this vulnerability.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0048"
]
},
{
"category": "vendor_fix",
"details": "PowerLogic PM5000 Model,Affected Version,Remediation/Mitigation\n\"PM5560, PM5563, PM5580\",V2.7.8 and earlier,\"A fix in V2.8.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5560_PM5563_PM5580_V2.8.3_Release.zip\u0026p_Doc_Ref=PM5560_PM5563_PM5580\"\nPM5561,V10.7.1 and earlier,\"A fix in V10.7.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5561_upgrade_10.7.3_Release.zip\u0026p_Doc_Ref=PM5561\"\nPM5650,V2.10.1 and earlier,\"A fix in V2.11.2 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5650_upgrade_V2.11.2_Release.zip\u0026p_Doc_Ref=PM5650\"\nPM5570,V3.1.0 and earlier,\"A fix in V3.1.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5570_upgrade_V3.1.3_Release.zip\u0026p_Doc_Ref=PM5570\"\nPM5660,V3.1.1 and earlier,\"A fix in V3.1.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5660_upgrade_V3.1.3_Release.zip\u0026p_Doc_Ref=PM5660\"\nPM5760,V3.1.1 and earlier,\"A fix in V3.1.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5760_upgrade_V3.1.3_Release.zip\u0026p_Doc_Ref=PM5760\"\n\"PM5320, PM5340\",V2.1.3 and earlier,\"A fix in V2.1.5 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5320_PM5340_v2.1.5_HW_vB1.zip\u0026p_Doc_Ref=PM5320_PM5340\"\nPM5341,V2.4.1 and earlier,\"A fix in V2.4.4 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5341_v2.4.4_HW_vB1.zip\u0026p_Doc_Ref=PM5341\"",
"product_ids": [
"CSAFPID-0049"
]
},
{
"category": "vendor_fix",
"details": "Firmware V2.9 of the TeSys T LTMRxxEyy Motor Controllers includes a fix for this vulnerability and is available for download here:\nhttps://download.schneider-electric.com/files?p_Archive_Name=Evo_TeSysT_Pack-13.zip\u0026p_enDocType=Firmware\u0026p_Doc_Ref=Evo_TeSysT_Pack-13",
"product_ids": [
"CSAFPID-0050"
]
},
{
"category": "mitigation",
"details": "Since the vulnerabilities are present in the TCP/IP stack, an active network connection is required to exploit them. Therefore, Schneider Electric customers can act now to mitigate the risk of attack by limiting access to their devices.\nFor devices on a local network:\n\u2022 Network Partitioning: Locate devices behind firewalls capable of deep packet inspection with rulesets limiting access with only approved protocols and functions and to only those devices and endpoints requiring access.\n\u2022 Anomalous IP traffic: Block and detect anomalous IP traffic and malformed packets. Refer to the Solution section of the CERT-Coordination Center Vulnerability Note VU#257161 for details.\n\u2022 Disable DHCP on the NMC and configure it to use a static IP address.\n\u2022 To avoid the use of DNS, set DNS servers to 0.0.0.0 and utilize static IP addresses for all servers the NMC will connect.\n\u2022 If DNS must be used, then normalize DNS through a secure recursive server or application layer firewall\n\u2022 Enable only secure remote access methods. Disable any insecure protocols.\nFor devices that must communicate via the Internet:\n\u2022 Minimize network exposure for embedded and critical devices, keeping exposure to the minimum necessary, and ensuring that devices are not accessible from the Internet unless absolutely essential.\nIf network access is not required:\n\u2022 Remove the Ethernet cable from the affected device.\nAdditional mitigations:\n\u2022 Access Controls: Install physical and logical controls so no unauthorized personnel or device can access your systems, components, peripheral equipment, and networks.\nFor more details and assistance on how to protect your installation, please contact your local Schneider Electric Industrial Cybersecurity Services organization, which is fully aware of this situation and can support you through the process.",
"product_ids": [
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2020-11912",
"notes": [
{
"category": "details",
"text": "Additional details on these specific vulnerabilities can be found on the ICS-CERT Advisory at https://www.us-cert.gov/ics/advisories/ICSA-20-168-01."
}
],
"product_status": {
"fixed": [
"CSAFPID-0003",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0013",
"CSAFPID-0015",
"CSAFPID-0017",
"CSAFPID-0025",
"CSAFPID-0053",
"CSAFPID-0054",
"CSAFPID-0056",
"CSAFPID-0057"
],
"known_affected": [
"CSAFPID-0002",
"CSAFPID-0004",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0014",
"CSAFPID-0016",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0052",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0050"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V3.2IE25 and above.\nFor product release prior to V3.2IE25, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V3.3IE33 and above.\nFor product release prior to V3.3IE33, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0004"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V3.3IE26 and above.\nFor product release prior V3.3IE26, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0006"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V1.6IE01 and above. For product release prior to V1.6IE01, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0008"
]
},
{
"category": "vendor_fix",
"details": "Telepace Studio must be used to update the SCADAPack 32 RTU firmware to version 2.25 or newer.\nDownload and install Telepace Studio 5.4.2 or newer from https://shop.exchange.se.com/en-US/apps/55670",
"product_ids": [
"CSAFPID-0010"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in firmware version V2.2.1.1 available for download below:\nhttps://www.se.com/ww/en/download/document/TM3BC_EIP_2_2_1_1/",
"product_ids": [
"CSAFPID-0012"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in firmware version V2.1.1.1 available for download below:\nhttps://www.se.com/ww/en/download/document/TM3BC_MBSL_2_1_1_1/",
"product_ids": [
"CSAFPID-0014"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in firmware version V2.1.1.1 available for download below:\nhttps://www.se.com/ww/en/download/document/TM3BC_CO_2_1_1_1/",
"product_ids": [
"CSAFPID-0016"
]
},
{
"category": "no_fix_planned",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0018"
]
},
{
"category": "no_fix_planned",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0019"
]
},
{
"category": "none_available",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0052"
]
},
{
"category": "no_fix_planned",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0020"
]
},
{
"category": "mitigation",
"details": "This offer is not affected by CVE-2020-11897, CVE-2020-11899, CVE-2020-11900, CVE-2020-11902, CVE-2020-11903, CVE-2020-11905, CVE-2020-11908, CVE-2020-11913.\nFor other CVEs, the CVSS score is evaluated as Medium in the product context.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0021"
]
},
{
"category": "mitigation",
"details": "This offer is not affected by CVE-2020-11897, CVE-2020-11899, CVE-2020-11900, CVE-2020-11902, CVE-2020-11903, CVE-2020-11905, CVE-2020-11908, CVE-2020-11913.\nFor other CVEs, the CVSS score is evaluated as Medium in the product context.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0022"
]
},
{
"category": "vendor_fix",
"details": "A fix is available in product releases V1.15IE25 and above.\nFor product release prior V1.15IE25, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0023"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases\nSV:02.05, PV:03, RL:03 and above.\nFor product release prior to SV:02.05, PV:03, RL:03, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for\nmore information on upgrading to SV:02.05.",
"product_ids": [
"CSAFPID-0025"
]
},
{
"category": "mitigation",
"details": "The ACE850 ethernet module for SEPAM protection relays is a product designed to be operated on a secure network.\nTo minimize the risk from both Ripple 20 and the network-accessible functions of the relay we recommend that concerned customers:\n- Enable the IP-based filtering capability in the ACE850\n- Place strong, active controls on the network hosting the ACE850\n- Consider moving to a newer relay such as the Easergy series if product-level access protections are required\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0026"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization Offer.\nIf possible, this product should be replaced by PowerTagLink-C (commercial reference A9XELC10 for which a patch is available from version 1.7.5 or greater.\nFor specific applications not supported by PowerTag Link C (pulse metering, Acti9 RCA, Acti9 iPF+SD 24), apply the mitigation detailed in the Recommended Mitigation section.",
"product_ids": [
"CSAFPID-0027"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nIf possible, this product should be replaced by Smartlink SIB (commercial reference: A9XMZA08) for which a patch is available in FW version 2.18 or greater.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0028"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Acti9 PowerTag Link C which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0029"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nCustomers should immediately apply the mitigations detailed in the Recommended Mitigations section below to reduce the risk of exploit.\nCustomers should also consider upgrading to EcoStruxure Building Operation which is not impacted by this vulnerability.",
"product_ids": [
"CSAFPID-0030"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Wiser Energy IP module by Schneider Electric which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0031"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Wiser Energy IP module by Clipsal which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0032"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Gateway Connector by Elko which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0033"
]
},
{
"category": "vendor_fix",
"details": "Customers should update firmware using EcoStruxure Power Commission (EPC) installer V7.0 available here: https://www.se.com/ww/en/product-range-download/64482-acti9-powertag-link/?selected-nodeid=12492093362#/software-firmware-tab",
"product_ids": [
"CSAFPID-0034"
]
},
{
"category": "vendor_fix",
"details": "Customers should update firmware using EcoStruxure Power Commission (EPC) installer V7.0 available here: https://www.se.com/ww/en/product-range-download/64482-acti9-powertag-link/?selected-nodeid=12492093362#/software-firmware-tab",
"product_ids": [
"CSAFPID-0036",
"CSAFPID-0037"
]
},
{
"category": "vendor_fix",
"details": "A fix is available in V5.1.18: https://www.se.com/ww/en/product-range-download/63423-link150/?selected-node-id=12366756685 - /software-firmware-tab",
"product_ids": [
"CSAFPID-0038"
]
},
{
"category": "vendor_fix",
"details": "The firmware is available through EcoStruxure Power Commission (EPC) software V2.18. The updated version of EPC is available here:\nhttps://www.se.com/ww/en/download/document/Ecoreach_Installer/",
"product_ids": [
"CSAFPID-0042"
]
},
{
"category": "vendor_fix",
"details": "All issues remediated in the 3.02.02 release, and higher. Update files can be found on the Schneider Electric Exchange https://ecoxpert.se.com/ --\n1. Search for \u2018relebov3.2.1\u2019\n2. Set the Filter criteria to RN or Firmware, as required.",
"product_ids": [
"CSAFPID-0040"
]
},
{
"category": "vendor_fix",
"details": "All issues remediated in the 3.02.02\nrelease, and higher. Update files can be found on the Schneider Electric Exchange https://ecoxpert.se.com/\n1. Search for \u2018relebov3.2.1\u2019\n2. Set the Filter criteria to RN or Firmware, as required",
"product_ids": [
"CSAFPID-0043"
]
},
{
"category": "vendor_fix",
"details": "The firmware is available through EcoStruxure Power Commission (EPC) software V2.18. The updated version of EPC is available here:\nhttps://www.se.com/ww/en/download/document/Ecoreach_Installer/",
"product_ids": [
"CSAFPID-0046"
]
},
{
"category": "vendor_fix",
"details": "The firmware is available through EcoStruxure Power Commission (EPC) software V2.18. The updated version of EPC is available here:\nhttps://www.se.com/ww/en/download/document/Ecoreach_Installer/",
"product_ids": [
"CSAFPID-0045"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nIf possible, this product should be replaced by Link 150 (commercial reference: EGX150) for which a patch is available in FW version 5.1.18 or greater.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0047"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nIf possible, this product should be replaced by Com\u2019X510 (commercial reference: EBX510) which is not impacted by this vulnerability.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0048"
]
},
{
"category": "vendor_fix",
"details": "PowerLogic PM5000 Model,Affected Version,Remediation/Mitigation\n\"PM5560, PM5563, PM5580\",V2.7.8 and earlier,\"A fix in V2.8.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5560_PM5563_PM5580_V2.8.3_Release.zip\u0026p_Doc_Ref=PM5560_PM5563_PM5580\"\nPM5561,V10.7.1 and earlier,\"A fix in V10.7.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5561_upgrade_10.7.3_Release.zip\u0026p_Doc_Ref=PM5561\"\nPM5650,V2.10.1 and earlier,\"A fix in V2.11.2 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5650_upgrade_V2.11.2_Release.zip\u0026p_Doc_Ref=PM5650\"\nPM5570,V3.1.0 and earlier,\"A fix in V3.1.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5570_upgrade_V3.1.3_Release.zip\u0026p_Doc_Ref=PM5570\"\nPM5660,V3.1.1 and earlier,\"A fix in V3.1.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5660_upgrade_V3.1.3_Release.zip\u0026p_Doc_Ref=PM5660\"\nPM5760,V3.1.1 and earlier,\"A fix in V3.1.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5760_upgrade_V3.1.3_Release.zip\u0026p_Doc_Ref=PM5760\"\n\"PM5320, PM5340\",V2.1.3 and earlier,\"A fix in V2.1.5 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5320_PM5340_v2.1.5_HW_vB1.zip\u0026p_Doc_Ref=PM5320_PM5340\"\nPM5341,V2.4.1 and earlier,\"A fix in V2.4.4 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5341_v2.4.4_HW_vB1.zip\u0026p_Doc_Ref=PM5341\"",
"product_ids": [
"CSAFPID-0049"
]
},
{
"category": "vendor_fix",
"details": "Firmware V2.9 of the TeSys T LTMRxxEyy Motor Controllers includes a fix for this vulnerability and is available for download here:\nhttps://download.schneider-electric.com/files?p_Archive_Name=Evo_TeSysT_Pack-13.zip\u0026p_enDocType=Firmware\u0026p_Doc_Ref=Evo_TeSysT_Pack-13",
"product_ids": [
"CSAFPID-0050"
]
},
{
"category": "mitigation",
"details": "Since the vulnerabilities are present in the TCP/IP stack, an active network connection is required to exploit them. Therefore, Schneider Electric customers can act now to mitigate the risk of attack by limiting access to their devices.\nFor devices on a local network:\n\u2022 Network Partitioning: Locate devices behind firewalls capable of deep packet inspection with rulesets limiting access with only approved protocols and functions and to only those devices and endpoints requiring access.\n\u2022 Anomalous IP traffic: Block and detect anomalous IP traffic and malformed packets. Refer to the Solution section of the CERT-Coordination Center Vulnerability Note VU#257161 for details.\n\u2022 Disable DHCP on the NMC and configure it to use a static IP address.\n\u2022 To avoid the use of DNS, set DNS servers to 0.0.0.0 and utilize static IP addresses for all servers the NMC will connect.\n\u2022 If DNS must be used, then normalize DNS through a secure recursive server or application layer firewall\n\u2022 Enable only secure remote access methods. Disable any insecure protocols.\nFor devices that must communicate via the Internet:\n\u2022 Minimize network exposure for embedded and critical devices, keeping exposure to the minimum necessary, and ensuring that devices are not accessible from the Internet unless absolutely essential.\nIf network access is not required:\n\u2022 Remove the Ethernet cable from the affected device.\nAdditional mitigations:\n\u2022 Access Controls: Install physical and logical controls so no unauthorized personnel or device can access your systems, components, peripheral equipment, and networks.\nFor more details and assistance on how to protect your installation, please contact your local Schneider Electric Industrial Cybersecurity Services organization, which is fully aware of this situation and can support you through the process.",
"product_ids": [
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2020-11913",
"notes": [
{
"category": "details",
"text": "Additional details on these specific vulnerabilities can be found on the ICS-CERT Advisory at https://www.us-cert.gov/ics/advisories/ICSA-20-168-01."
}
],
"product_status": {
"fixed": [
"CSAFPID-0003",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0013",
"CSAFPID-0015",
"CSAFPID-0017",
"CSAFPID-0025",
"CSAFPID-0053",
"CSAFPID-0054",
"CSAFPID-0056",
"CSAFPID-0057"
],
"known_affected": [
"CSAFPID-0002",
"CSAFPID-0004",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0014",
"CSAFPID-0016",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0052",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0050"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V3.2IE25 and above.\nFor product release prior to V3.2IE25, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V3.3IE33 and above.\nFor product release prior to V3.3IE33, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0004"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V3.3IE26 and above.\nFor product release prior V3.3IE26, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0006"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V1.6IE01 and above. For product release prior to V1.6IE01, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0008"
]
},
{
"category": "vendor_fix",
"details": "Telepace Studio must be used to update the SCADAPack 32 RTU firmware to version 2.25 or newer.\nDownload and install Telepace Studio 5.4.2 or newer from https://shop.exchange.se.com/en-US/apps/55670",
"product_ids": [
"CSAFPID-0010"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in firmware version V2.2.1.1 available for download below:\nhttps://www.se.com/ww/en/download/document/TM3BC_EIP_2_2_1_1/",
"product_ids": [
"CSAFPID-0012"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in firmware version V2.1.1.1 available for download below:\nhttps://www.se.com/ww/en/download/document/TM3BC_MBSL_2_1_1_1/",
"product_ids": [
"CSAFPID-0014"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in firmware version V2.1.1.1 available for download below:\nhttps://www.se.com/ww/en/download/document/TM3BC_CO_2_1_1_1/",
"product_ids": [
"CSAFPID-0016"
]
},
{
"category": "no_fix_planned",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0018"
]
},
{
"category": "no_fix_planned",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0019"
]
},
{
"category": "none_available",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0052"
]
},
{
"category": "no_fix_planned",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0020"
]
},
{
"category": "vendor_fix",
"details": "A fix is available in product releases V1.15IE25 and above.\nFor product release prior V1.15IE25, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0023"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases\nSV:02.05, PV:03, RL:03 and above.\nFor product release prior to SV:02.05, PV:03, RL:03, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for\nmore information on upgrading to SV:02.05.",
"product_ids": [
"CSAFPID-0025"
]
},
{
"category": "mitigation",
"details": "The ACE850 ethernet module for SEPAM protection relays is a product designed to be operated on a secure network.\nTo minimize the risk from both Ripple 20 and the network-accessible functions of the relay we recommend that concerned customers:\n- Enable the IP-based filtering capability in the ACE850\n- Place strong, active controls on the network hosting the ACE850\n- Consider moving to a newer relay such as the Easergy series if product-level access protections are required\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0026"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization Offer.\nIf possible, this product should be replaced by PowerTagLink-C (commercial reference A9XELC10 for which a patch is available from version 1.7.5 or greater.\nFor specific applications not supported by PowerTag Link C (pulse metering, Acti9 RCA, Acti9 iPF+SD 24), apply the mitigation detailed in the Recommended Mitigation section.",
"product_ids": [
"CSAFPID-0027"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nIf possible, this product should be replaced by Smartlink SIB (commercial reference: A9XMZA08) for which a patch is available in FW version 2.18 or greater.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0028"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Acti9 PowerTag Link C which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0029"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nCustomers should immediately apply the mitigations detailed in the Recommended Mitigations section below to reduce the risk of exploit.\nCustomers should also consider upgrading to EcoStruxure Building Operation which is not impacted by this vulnerability.",
"product_ids": [
"CSAFPID-0030"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Wiser Energy IP module by Schneider Electric which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0031"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Wiser Energy IP module by Clipsal which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0032"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Gateway Connector by Elko which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0033"
]
},
{
"category": "vendor_fix",
"details": "Customers should update firmware using EcoStruxure Power Commission (EPC) installer V7.0 available here: https://www.se.com/ww/en/product-range-download/64482-acti9-powertag-link/?selected-nodeid=12492093362#/software-firmware-tab",
"product_ids": [
"CSAFPID-0034"
]
},
{
"category": "vendor_fix",
"details": "Customers should update firmware using EcoStruxure Power Commission (EPC) installer V7.0 available here: https://www.se.com/ww/en/product-range-download/64482-acti9-powertag-link/?selected-nodeid=12492093362#/software-firmware-tab",
"product_ids": [
"CSAFPID-0036",
"CSAFPID-0037"
]
},
{
"category": "vendor_fix",
"details": "A fix is available in V5.1.18: https://www.se.com/ww/en/product-range-download/63423-link150/?selected-node-id=12366756685 - /software-firmware-tab",
"product_ids": [
"CSAFPID-0038"
]
},
{
"category": "vendor_fix",
"details": "The firmware is available through EcoStruxure Power Commission (EPC) software V2.18. The updated version of EPC is available here:\nhttps://www.se.com/ww/en/download/document/Ecoreach_Installer/",
"product_ids": [
"CSAFPID-0042"
]
},
{
"category": "vendor_fix",
"details": "All issues remediated in the 3.02.02 release, and higher. Update files can be found on the Schneider Electric Exchange https://ecoxpert.se.com/ --\n1. Search for \u2018relebov3.2.1\u2019\n2. Set the Filter criteria to RN or Firmware, as required.",
"product_ids": [
"CSAFPID-0040"
]
},
{
"category": "vendor_fix",
"details": "All issues remediated in the 3.02.02\nrelease, and higher. Update files can be found on the Schneider Electric Exchange https://ecoxpert.se.com/\n1. Search for \u2018relebov3.2.1\u2019\n2. Set the Filter criteria to RN or Firmware, as required",
"product_ids": [
"CSAFPID-0043"
]
},
{
"category": "vendor_fix",
"details": "The firmware is available through EcoStruxure Power Commission (EPC) software V2.18. The updated version of EPC is available here:\nhttps://www.se.com/ww/en/download/document/Ecoreach_Installer/",
"product_ids": [
"CSAFPID-0046"
]
},
{
"category": "vendor_fix",
"details": "The firmware is available through EcoStruxure Power Commission (EPC) software V2.18. The updated version of EPC is available here:\nhttps://www.se.com/ww/en/download/document/Ecoreach_Installer/",
"product_ids": [
"CSAFPID-0045"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nIf possible, this product should be replaced by Link 150 (commercial reference: EGX150) for which a patch is available in FW version 5.1.18 or greater.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0047"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nIf possible, this product should be replaced by Com\u2019X510 (commercial reference: EBX510) which is not impacted by this vulnerability.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0048"
]
},
{
"category": "vendor_fix",
"details": "PowerLogic PM5000 Model,Affected Version,Remediation/Mitigation\n\"PM5560, PM5563, PM5580\",V2.7.8 and earlier,\"A fix in V2.8.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5560_PM5563_PM5580_V2.8.3_Release.zip\u0026p_Doc_Ref=PM5560_PM5563_PM5580\"\nPM5561,V10.7.1 and earlier,\"A fix in V10.7.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5561_upgrade_10.7.3_Release.zip\u0026p_Doc_Ref=PM5561\"\nPM5650,V2.10.1 and earlier,\"A fix in V2.11.2 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5650_upgrade_V2.11.2_Release.zip\u0026p_Doc_Ref=PM5650\"\nPM5570,V3.1.0 and earlier,\"A fix in V3.1.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5570_upgrade_V3.1.3_Release.zip\u0026p_Doc_Ref=PM5570\"\nPM5660,V3.1.1 and earlier,\"A fix in V3.1.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5660_upgrade_V3.1.3_Release.zip\u0026p_Doc_Ref=PM5660\"\nPM5760,V3.1.1 and earlier,\"A fix in V3.1.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5760_upgrade_V3.1.3_Release.zip\u0026p_Doc_Ref=PM5760\"\n\"PM5320, PM5340\",V2.1.3 and earlier,\"A fix in V2.1.5 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5320_PM5340_v2.1.5_HW_vB1.zip\u0026p_Doc_Ref=PM5320_PM5340\"\nPM5341,V2.4.1 and earlier,\"A fix in V2.4.4 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5341_v2.4.4_HW_vB1.zip\u0026p_Doc_Ref=PM5341\"",
"product_ids": [
"CSAFPID-0049"
]
},
{
"category": "vendor_fix",
"details": "Firmware V2.9 of the TeSys T LTMRxxEyy Motor Controllers includes a fix for this vulnerability and is available for download here:\nhttps://download.schneider-electric.com/files?p_Archive_Name=Evo_TeSysT_Pack-13.zip\u0026p_enDocType=Firmware\u0026p_Doc_Ref=Evo_TeSysT_Pack-13",
"product_ids": [
"CSAFPID-0050"
]
},
{
"category": "mitigation",
"details": "Since the vulnerabilities are present in the TCP/IP stack, an active network connection is required to exploit them. Therefore, Schneider Electric customers can act now to mitigate the risk of attack by limiting access to their devices.\nFor devices on a local network:\n\u2022 Network Partitioning: Locate devices behind firewalls capable of deep packet inspection with rulesets limiting access with only approved protocols and functions and to only those devices and endpoints requiring access.\n\u2022 Anomalous IP traffic: Block and detect anomalous IP traffic and malformed packets. Refer to the Solution section of the CERT-Coordination Center Vulnerability Note VU#257161 for details.\n\u2022 Disable DHCP on the NMC and configure it to use a static IP address.\n\u2022 To avoid the use of DNS, set DNS servers to 0.0.0.0 and utilize static IP addresses for all servers the NMC will connect.\n\u2022 If DNS must be used, then normalize DNS through a secure recursive server or application layer firewall\n\u2022 Enable only secure remote access methods. Disable any insecure protocols.\nFor devices that must communicate via the Internet:\n\u2022 Minimize network exposure for embedded and critical devices, keeping exposure to the minimum necessary, and ensuring that devices are not accessible from the Internet unless absolutely essential.\nIf network access is not required:\n\u2022 Remove the Ethernet cable from the affected device.\nAdditional mitigations:\n\u2022 Access Controls: Install physical and logical controls so no unauthorized personnel or device can access your systems, components, peripheral equipment, and networks.\nFor more details and assistance on how to protect your installation, please contact your local Schneider Electric Industrial Cybersecurity Services organization, which is fully aware of this situation and can support you through the process.",
"product_ids": [
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2020-11914",
"notes": [
{
"category": "details",
"text": "Additional details on these specific vulnerabilities can be found on the ICS-CERT Advisory at https://www.us-cert.gov/ics/advisories/ICSA-20-168-01."
}
],
"product_status": {
"fixed": [
"CSAFPID-0003",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0013",
"CSAFPID-0015",
"CSAFPID-0017",
"CSAFPID-0025",
"CSAFPID-0053",
"CSAFPID-0054",
"CSAFPID-0056",
"CSAFPID-0057"
],
"known_affected": [
"CSAFPID-0002",
"CSAFPID-0004",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0014",
"CSAFPID-0016",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0052",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0050"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V3.2IE25 and above.\nFor product release prior to V3.2IE25, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V3.3IE33 and above.\nFor product release prior to V3.3IE33, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0004"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V3.3IE26 and above.\nFor product release prior V3.3IE26, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0006"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases V1.6IE01 and above. For product release prior to V1.6IE01, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0008"
]
},
{
"category": "vendor_fix",
"details": "Telepace Studio must be used to update the SCADAPack 32 RTU firmware to version 2.25 or newer.\nDownload and install Telepace Studio 5.4.2 or newer from https://shop.exchange.se.com/en-US/apps/55670",
"product_ids": [
"CSAFPID-0010"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in firmware version V2.2.1.1 available for download below:\nhttps://www.se.com/ww/en/download/document/TM3BC_EIP_2_2_1_1/",
"product_ids": [
"CSAFPID-0012"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in firmware version V2.1.1.1 available for download below:\nhttps://www.se.com/ww/en/download/document/TM3BC_MBSL_2_1_1_1/",
"product_ids": [
"CSAFPID-0014"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in firmware version V2.1.1.1 available for download below:\nhttps://www.se.com/ww/en/download/document/TM3BC_CO_2_1_1_1/",
"product_ids": [
"CSAFPID-0016"
]
},
{
"category": "no_fix_planned",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0018"
]
},
{
"category": "no_fix_planned",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0019"
]
},
{
"category": "none_available",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0052"
]
},
{
"category": "no_fix_planned",
"details": "This is an End Of Commercialization offer that is replaced by the ALTIVAR 900 \u0026 ALTIVAR 600 ranges.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0020"
]
},
{
"category": "mitigation",
"details": "This offer is not affected by CVE-2020-11897, CVE-2020-11899, CVE-2020-11900, CVE-2020-11902, CVE-2020-11903, CVE-2020-11905, CVE-2020-11908, CVE-2020-11913.\nFor other CVEs, the CVSS score is evaluated as Medium in the product context.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0021"
]
},
{
"category": "mitigation",
"details": "This offer is not affected by CVE-2020-11897, CVE-2020-11899, CVE-2020-11900, CVE-2020-11902, CVE-2020-11903, CVE-2020-11905, CVE-2020-11908, CVE-2020-11913.\nFor other CVEs, the CVSS score is evaluated as Medium in the product context.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0022"
]
},
{
"category": "vendor_fix",
"details": "A fix is available in product releases V1.15IE25 and above.\nFor product release prior V1.15IE25, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for more information.",
"product_ids": [
"CSAFPID-0023"
]
},
{
"category": "vendor_fix",
"details": "A fix is now available in product releases\nSV:02.05, PV:03, RL:03 and above.\nFor product release prior to SV:02.05, PV:03, RL:03, apply the mitigations detailed in the Recommended Mitigations section and contact your local technical support for\nmore information on upgrading to SV:02.05.",
"product_ids": [
"CSAFPID-0025"
]
},
{
"category": "mitigation",
"details": "The ACE850 ethernet module for SEPAM protection relays is a product designed to be operated on a secure network.\nTo minimize the risk from both Ripple 20 and the network-accessible functions of the relay we recommend that concerned customers:\n- Enable the IP-based filtering capability in the ACE850\n- Place strong, active controls on the network hosting the ACE850\n- Consider moving to a newer relay such as the Easergy series if product-level access protections are required\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0026"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization Offer.\nIf possible, this product should be replaced by PowerTagLink-C (commercial reference A9XELC10 for which a patch is available from version 1.7.5 or greater.\nFor specific applications not supported by PowerTag Link C (pulse metering, Acti9 RCA, Acti9 iPF+SD 24), apply the mitigation detailed in the Recommended Mitigation section.",
"product_ids": [
"CSAFPID-0027"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nIf possible, this product should be replaced by Smartlink SIB (commercial reference: A9XMZA08) for which a patch is available in FW version 2.18 or greater.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0028"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Acti9 PowerTag Link C which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0029"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nCustomers should immediately apply the mitigations detailed in the Recommended Mitigations section below to reduce the risk of exploit.\nCustomers should also consider upgrading to EcoStruxure Building Operation which is not impacted by this vulnerability.",
"product_ids": [
"CSAFPID-0030"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Wiser Energy IP module by Schneider Electric which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0031"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Wiser Energy IP module by Clipsal which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0032"
]
},
{
"category": "vendor_fix",
"details": "Use the Schneider Electric eSetup for Electrician V6.2 mobile app, available below, to download and apply the latest firmware for Gateway Connector by Elko which contains a fix for these vulnerabilities.\nGoogle Play Store for Android devices: https://play.google.com/store/apps/details?id=com.schneiderelectric.ConfigElec\nApple App Store for Apple devices:\nhttps://apps.apple.com/au/app/esetup-for-electrician/id1087855591",
"product_ids": [
"CSAFPID-0033"
]
},
{
"category": "vendor_fix",
"details": "Customers should update firmware using EcoStruxure Power Commission (EPC) installer V7.0 available here: https://www.se.com/ww/en/product-range-download/64482-acti9-powertag-link/?selected-nodeid=12492093362#/software-firmware-tab",
"product_ids": [
"CSAFPID-0034"
]
},
{
"category": "vendor_fix",
"details": "Customers should update firmware using EcoStruxure Power Commission (EPC) installer V7.0 available here: https://www.se.com/ww/en/product-range-download/64482-acti9-powertag-link/?selected-nodeid=12492093362#/software-firmware-tab",
"product_ids": [
"CSAFPID-0036",
"CSAFPID-0037"
]
},
{
"category": "vendor_fix",
"details": "A fix is available in V5.1.18: https://www.se.com/ww/en/product-range-download/63423-link150/?selected-node-id=12366756685 - /software-firmware-tab",
"product_ids": [
"CSAFPID-0038"
]
},
{
"category": "vendor_fix",
"details": "The firmware is available through EcoStruxure Power Commission (EPC) software V2.18. The updated version of EPC is available here:\nhttps://www.se.com/ww/en/download/document/Ecoreach_Installer/",
"product_ids": [
"CSAFPID-0042"
]
},
{
"category": "vendor_fix",
"details": "All issues remediated in the 3.02.02 release, and higher. Update files can be found on the Schneider Electric Exchange https://ecoxpert.se.com/ --\n1. Search for \u2018relebov3.2.1\u2019\n2. Set the Filter criteria to RN or Firmware, as required.",
"product_ids": [
"CSAFPID-0040"
]
},
{
"category": "vendor_fix",
"details": "All issues remediated in the 3.02.02\nrelease, and higher. Update files can be found on the Schneider Electric Exchange https://ecoxpert.se.com/\n1. Search for \u2018relebov3.2.1\u2019\n2. Set the Filter criteria to RN or Firmware, as required",
"product_ids": [
"CSAFPID-0043"
]
},
{
"category": "vendor_fix",
"details": "The firmware is available through EcoStruxure Power Commission (EPC) software V2.18. The updated version of EPC is available here:\nhttps://www.se.com/ww/en/download/document/Ecoreach_Installer/",
"product_ids": [
"CSAFPID-0046"
]
},
{
"category": "vendor_fix",
"details": "The firmware is available through EcoStruxure Power Commission (EPC) software V2.18. The updated version of EPC is available here:\nhttps://www.se.com/ww/en/download/document/Ecoreach_Installer/",
"product_ids": [
"CSAFPID-0045"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nIf possible, this product should be replaced by Link 150 (commercial reference: EGX150) for which a patch is available in FW version 5.1.18 or greater.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0047"
]
},
{
"category": "no_fix_planned",
"details": "This is an End of Commercialization offer.\nIf possible, this product should be replaced by Com\u2019X510 (commercial reference: EBX510) which is not impacted by this vulnerability.\nTo reduce risk of exploitation, apply the mitigations detailed in the Recommended Mitigations section.",
"product_ids": [
"CSAFPID-0048"
]
},
{
"category": "vendor_fix",
"details": "PowerLogic PM5000 Model,Affected Version,Remediation/Mitigation\n\"PM5560, PM5563, PM5580\",V2.7.8 and earlier,\"A fix in V2.8.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5560_PM5563_PM5580_V2.8.3_Release.zip\u0026p_Doc_Ref=PM5560_PM5563_PM5580\"\nPM5561,V10.7.1 and earlier,\"A fix in V10.7.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5561_upgrade_10.7.3_Release.zip\u0026p_Doc_Ref=PM5561\"\nPM5650,V2.10.1 and earlier,\"A fix in V2.11.2 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5650_upgrade_V2.11.2_Release.zip\u0026p_Doc_Ref=PM5650\"\nPM5570,V3.1.0 and earlier,\"A fix in V3.1.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5570_upgrade_V3.1.3_Release.zip\u0026p_Doc_Ref=PM5570\"\nPM5660,V3.1.1 and earlier,\"A fix in V3.1.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5660_upgrade_V3.1.3_Release.zip\u0026p_Doc_Ref=PM5660\"\nPM5760,V3.1.1 and earlier,\"A fix in V3.1.3 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5760_upgrade_V3.1.3_Release.zip\u0026p_Doc_Ref=PM5760\"\n\"PM5320, PM5340\",V2.1.3 and earlier,\"A fix in V2.1.5 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5320_PM5340_v2.1.5_HW_vB1.zip\u0026p_Doc_Ref=PM5320_PM5340\"\nPM5341,V2.4.1 and earlier,\"A fix in V2.4.4 is now available for download:\nhttps://download.schneider-electric.com/files?p_enDocType=Firmware\u0026p_File_Name=PM5341_v2.4.4_HW_vB1.zip\u0026p_Doc_Ref=PM5341\"",
"product_ids": [
"CSAFPID-0049"
]
},
{
"category": "vendor_fix",
"details": "Firmware V2.9 of the TeSys T LTMRxxEyy Motor Controllers includes a fix for this vulnerability and is available for download here:\nhttps://download.schneider-electric.com/files?p_Archive_Name=Evo_TeSysT_Pack-13.zip\u0026p_enDocType=Firmware\u0026p_Doc_Ref=Evo_TeSysT_Pack-13",
"product_ids": [
"CSAFPID-0050"
]
},
{
"category": "mitigation",
"details": "Since the vulnerabilities are present in the TCP/IP stack, an active network connection is required to exploit them. Therefore, Schneider Electric customers can act now to mitigate the risk of attack by limiting access to their devices.\nFor devices on a local network:\n\u2022 Network Partitioning: Locate devices behind firewalls capable of deep packet inspection with rulesets limiting access with only approved protocols and functions and to only those devices and endpoints requiring access.\n\u2022 Anomalous IP traffic: Block and detect anomalous IP traffic and malformed packets. Refer to the Solution section of the CERT-Coordination Center Vulnerability Note VU#257161 for details.\n\u2022 Disable DHCP on the NMC and configure it to use a static IP address.\n\u2022 To avoid the use of DNS, set DNS servers to 0.0.0.0 and utilize static IP addresses for all servers the NMC will connect.\n\u2022 If DNS must be used, then normalize DNS through a secure recursive server or application layer firewall\n\u2022 Enable only secure remote access methods. Disable any insecure protocols.\nFor devices that must communicate via the Internet:\n\u2022 Minimize network exposure for embedded and critical devices, keeping exposure to the minimum necessary, and ensuring that devices are not accessible from the Internet unless absolutely essential.\nIf network access is not required:\n\u2022 Remove the Ethernet cable from the affected device.\nAdditional mitigations:\n\u2022 Access Controls: Install physical and logical controls so no unauthorized personnel or device can access your systems, components, peripheral equipment, and networks.\nFor more details and assistance on how to protect your installation, please contact your local Schneider Electric Industrial Cybersecurity Services organization, which is fully aware of this situation and can support you through the process.",
"product_ids": [
"CSAFPID-0002"
]
}
]
}
]
}
CVE-2020-11901
Vulnerability from csaf_se - Published: 2020-06-22 00:00 - Updated: 2021-06-30 00:00Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "We strongly recommend the following industry cybersecurity best practices.\n\nhttps://www.se.com/us/en/download/document/7EN52-0390/\n* Locate control and safety system networks and remote devices behind firewalls and isolate them from the business network.\n* Install physical controls so no unauthorized personnel can access your industrial control and safety systems, components, peripheral equipment, and networks.\n* Place all controllers in locked cabinets and never leave them in the \u201cProgram\u201d mode.\n* Never connect programming software to any network other than the network intended for that device.\n* Scan all methods of mobile data exchange with the isolated network such as CDs, USB drives, etc. before use in the terminals or any node connected to these networks.\n* Never allow mobile devices that have connected to any other network besides the intended network to connect to the safety or control networks without proper sanitation.\n* Minimize network exposure for all control system devices and systems and ensure that they are not accessible from the Internet.\n* When remote access is required, use secure methods, such as Virtual Private Networks (VPNs). Recognize that VPNs may have vulnerabilities and should be updated to the most current version available. Also, understand that VPNs are only as secure as the connected devices.\nFor more information refer to the Schneider Electric Recommended Cybersecurity Best Practices document. \n",
"title": "General Security Recommendations"
},
{
"category": "general",
"text": "This document provides an overview of the identified vulnerability or vulnerabilities and actions required to mitigate. For more details and assistance on how to protect your installation, contact your local Schneider Electric representative or Schneider Electric Industrial Cybersecurity Services: https://www.se.com/ww/en/work/solutions/cybersecurity/. These organizations will be fully aware of this situation and can support you through the process.\nFor further information related to cybersecurity in Schneider Electric\u2019s products, visit the company\u2019s cybersecurity support portal page: https://www.se.com/ww/en/work/support/cybersecurity/overview.jsp",
"title": "For More Information"
},
{
"category": "legal_disclaimer",
"text": "THIS NOTIFICATION DOCUMENT, THE INFORMATION CONTAINED HEREIN, AND ANY MATERIALS LINKED FROM IT (COLLECTIVELY, THIS \u201cNOTIFICATION\u201d) ARE INTENDED TO HELP PROVIDE AN OVERVIEW OF THE IDENTIFIED SITUATION AND SUGGESTED MITIGATION ACTIONS, REMEDIATION, FIX, AND/OR GENERAL SECURITY RECOMMENDATIONS AND IS PROVIDED ON AN \u201cAS-IS\u201d BASIS WITHOUT WARRANTY OR GUARANTEE OF ANY KIND. SCHNEIDER ELECTRIC DISCLAIMS ALL WARRANTIES RELATING TO THIS NOTIFICATION, EITHER EXPRESS OR IMPLIED, INCLUDING WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. SCHNEIDER ELECTRIC MAKES NO WARRANTY THAT THE NOTIFICATION WILL RESOLVE THE IDENTIFIED SITUATION. IN NO EVENT SHALL SCHNEIDER ELECTRIC BE LIABLE FOR ANY DAMAGES OR LOSSES WHATSOEVER IN CONNECTION WITH THIS NOTIFICATION, INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF SCHNEIDER ELECTRIC HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. YOUR USE OF THIS NOTIFICATION IS AT YOUR OWN RISK, AND YOU ARE SOLELY LIABLE FOR ANY DAMAGES TO YOUR SYSTEMS OR ASSETS OR OTHER LOSSES THAT MAY RESULT FROM YOUR USE OF THIS NOTIFICATION. SCHNEIDER ELECTRIC RESERVES THE RIGHT TO UPDATE OR CHANGE THIS NOTIFICATION AT ANY TIME AND IN ITS SOLE DISCRETION",
"title": "LEGAL DISCLAIMER"
},
{
"category": "general",
"text": "At Schneider, we believe access to energy and digital is a basic human right. We empower all to do more with less, ensuring Life Is On everywhere, for everyone, at every moment.\n\nWe provide energy and automation digital solutions for efficiency and sustainability. We combine world-leading energy technologies, real-time automation, software and services into integrated solutions for Homes, Buildings, Data Centers, Infrastructure and Industries.\n\nWe are committed to unleash the infinite possibilities of an open, global, innovative community that is passionate with our Meaningful Purpose, Inclusive and Empowered values.\n\nwww.se.com ",
"title": "About Schneider Electric"
},
{
"category": "summary",
"text": "Schneider Electric became aware of multiple vulnerabilities affecting Treck Inc.\u0027s embedded TCP/IP \r\nstack, collectively known as Ripple20, which Treck publicly disclosed on June 16, 2020. Schneider \r\nElectric is also aware of a proof of concept published by JSOF that demonstrates how one of the \r\nTreck vulnerabilities, CVE-2020-11901, can be exploited to affect a Schneider Electric APC Smart\u0002UPS device using certain Network Management Card firmware versions. \r\nOn October 12, 2020, Schneider Electric received additional information and analysis from JSOF\r\nrelated to CVE-2020-11901\u2019s impact on APC by Schneider Electric Network Management Cards and \r\nNMC embedded devices. This new analysis indicates that the information we originally received was \r\nincomplete. Therefore our original remediations are only partially effective for CVE-2020-11901. We \r\nare expediting updated remediations, which will be made available as soon as possible. In the \r\nmeantime, customers should immediately apply the mitigations included in Remediation \u0026 Mitigations\r\nsection of this document.\r\nJune 2021 Update: Added remediations for Uninterruptible Power Supply (UPS), Rack Power \r\nDistribution Units (rPDU), Battery Management, Rack Automatic Transfer Switch (ATS), Rack Air \r\nRemoval Unit (RARU) using NMC1, as well as all other remaining NMC1 applications.",
"title": "Overview"
}
],
"publisher": {
"category": "vendor",
"contact_details": "cpcert@se.com",
"name": "Schneider Electric CPCERT",
"namespace": "https://www.se.com/ww/en/work/support/cybersecurity/security-notifications.jsp"
},
"references": [
{
"category": "self",
"summary": "APC by Schneider Electric Network Management Cards (NMC) and NMC Embedded Devices - SEVD-2020-174-01 PDF Version",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2020-174-01\u0026p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=SEVD-2020-174-01_APC_by_Schneider_Electric_Network_Management_Card_Security_Notification_V2.3.pdf"
},
{
"category": "self",
"summary": "APC by Schneider Electric Network Management Cards (NMC) and NMC Embedded Devices - SEVD-2020-174-01 CSAF Version",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2020-174-01\u0026p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=sevd-2020-174-01.json"
},
{
"category": "external",
"summary": "Recommended Cybersecurity Best Practices",
"url": "https://www.se.com/us/en/download/document/7EN52-0390/"
}
],
"title": "APC by Schneider Electric Network Management Cards (NMC) and NMC Embedded Devices",
"tracking": {
"current_release_date": "2021-06-30T00:00:00.000Z",
"generator": {
"date": "2021-06-30T00:00:00Z",
"engine": {
"name": "Schneider Electric CSAF Generator",
"version": "1.2"
}
},
"id": "SEVD-2020-174-01",
"initial_release_date": "2020-06-22T00:00:00.000Z",
"revision_history": [
{
"date": "2020-06-22T00:00:00.000Z",
"number": "1.0.0",
"summary": "Original Release"
},
{
"date": "2020-06-23T00:00:00.000Z",
"number": "1.1.0",
"summary": "Updated Affected Products \u0026 Details and Vulnerability Details \r\nsections formatting for clarity (pages 2-5) "
},
{
"date": "2020-08-05T00:00:00.000Z",
"number": "1.2.0",
"summary": "Updated remediation for \u201cUninterruptible Power Supply (UPS) using \r\nNMC2\u201d (page 2)"
},
{
"date": "2020-08-06T00:00:00.000Z",
"number": "1.3.0",
"summary": "Corrected affected version(s) and enhanced Remediation/Mitigation\r\nversion details for \u201cUninterruptible Power Supply (UPS) using NMC2\u201d \r\n(page 2)"
},
{
"date": "2020-09-01T00:00:00.000Z",
"number": "1.4.0",
"summary": "Added remediation for Cooling Products using NMC2 (page 2)"
},
{
"date": "2020-10-23T00:00:00.000Z",
"number": "2.0.0",
"summary": "Updated overview section, available remediations and affected \r\nproducts tables. New information regarding CVE-2020-11901. Added \r\nremediations for \u201cAPC 3-Phase Power Distribution Products\u201d, \u201cAPC Rack Power Distribution Units (PDU)\u201d, :Rack Automatic Transfer \r\nSwitches (ATS)\u201d, \u201cEnvironmental Monitoring\u201d (page 1-6)"
},
{
"date": "2020-12-18T00:00:00.000Z",
"number": "2.1.0",
"summary": "Added remediations for Uninterruptible Power Supply (UPS) using \r\nNMC2, APC 3-Phase Power Distribution Products using NMC2, APC \r\nRack Power Distribution Units (PDU) using NMC2, Rack Automatic \r\nTransfer Switches (ATS) using NMC2, Environmental Monitoring\r\nusing NMC2, Cooling Products using NMC2 (page 2-4) "
},
{
"date": "2021-01-12T00:00:00.000Z",
"number": "2.2.0",
"summary": "Added remediations for Uninterruptible Power Supply (UPS) using \r\nNMC3 (page 2)"
},
{
"date": "2021-06-30T00:00:00.000Z",
"number": "2.3.0",
"summary": "Added remediations for Uninterruptible Power Supply (UPS), Rack \r\nPower Distribution Units (rPDU), Battery Management, Rack \r\nAutomatic Transfer Switch (ATS), Rack Air Removal Unit (RARU) \r\nusing NMC1, as well as all other remaining NMC1 applications (page \r\n2, 4-6)"
}
],
"status": "final",
"version": "2.3.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=NMC2 AOS 6.9.4",
"product": {
"name": "Schneider Electric Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9630/AP9630CH/AP9630J NMC2 AOS V6.9.4 and earlier",
"product_id": "1"
}
}
],
"category": "product_name",
"name": "Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9630/AP9630CH/AP9630J"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=NMC2 AOS 6.9.4",
"product": {
"name": "Schneider Electric Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9631/AP9631CH/AP9631J NMC2 AOS V6.9.4 and earlier",
"product_id": "2"
}
}
],
"category": "product_name",
"name": "Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9631/AP9631CH/AP9631J"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=NMC2 AOS 6.9.4",
"product": {
"name": "Schneider Electric Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9635/AP9635CH NMC2 AOS V6.9.4 and earlier",
"product_id": "3"
}
}
],
"category": "product_name",
"name": "Uninterruptible Power Supply (UPS) using NMC2 1-Phase and 3-Phase UPS models including Smart-UPS, Symmetra, and Galaxy with Network Management Card 2 (NMC2): AP9635/AP9635CH"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=Smart-UPS NMC1 3.9.2",
"product": {
"name": "Schneider Electric Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9617 (discontinued in Nov 2011) Smart-UPS NMC1 v3.9.2 and earlier",
"product_id": "4"
}
}
],
"category": "product_name",
"name": "Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9617 (discontinued in Nov 2011) "
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=Smart-UPS NMC1 3.9.2",
"product": {
"name": "Schneider Electric Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9619 (discontinued in Sep 2012) Smart-UPS NMC1 v3.9.2 and earlier",
"product_id": "5"
}
}
],
"category": "product_name",
"name": "Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9619 (discontinued in Sep 2012)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=Smart-UPS NMC1 3.9.2",
"product": {
"name": "Schneider Electric Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9618 (discontinued in Jan 2017) Smart-UPS NMC1 v3.9.2 and earlier",
"product_id": "6"
}
}
],
"category": "product_name",
"name": "Uninterruptable Power Supply (UPS) using NMC1 - SUMX AP9618 (discontinued in Jan 2017)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=Smart-UPS NMC1 3.9.2",
"product": {
"name": "Schneider Electric Uninterruptable Power Supply (UPS) using NMC1 - SUMX Smart-UPS models embedded with NMC1 Smart-UPS NMC1 v3.9.2 and earlier",
"product_id": "7"
}
}
],
"category": "product_name",
"name": "Uninterruptable Power Supply (UPS) using NMC1 - SUMX Smart-UPS models embedded with NMC1"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=NMC3 AOS 1.3.0.6",
"product": {
"name": "Schneider Electric Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9640/AP9640J NMC3 AOS V1.3.0.6 and earlier",
"product_id": "8"
}
}
],
"category": "product_name",
"name": "Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9640/AP9640J"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=NMC3 AOS 1.3.0.6",
"product": {
"name": "Schneider Electric Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9641/AP9641J NMC3 AOS V1.3.0.6 and earlier",
"product_id": "9"
}
}
],
"category": "product_name",
"name": "Uninterruptible Power Supply (UPS) using NMC3 Network Management Card 3 (NMC3) SmartSlot card models: AP9641/AP9641J"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=NMC2 AOS 6.9.4",
"product": {
"name": "Schneider Electric Battery Management Embedded NMC2 - Battery Manager - AP9922 NMC2 AOS V6.9.4 and earlier",
"product_id": "10"
}
}
],
"category": "product_name",
"name": "Battery Management Embedded NMC2 - Battery Manager - AP9922"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=NMC2 AOS 6.9.4",
"product": {
"name": "Schneider Electric APC 3-Phase Power Distribution Products: InfraStruXure 150kVA PDU with 84 poles (X84P) NMC2 AOS V6.9.4 and earlier",
"product_id": "11"
}
}
],
"category": "product_name",
"name": "APC 3-Phase Power Distribution Products: InfraStruXure 150kVA PDU with 84 poles (X84P)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=NMC2 AOS 6.9.4",
"product": {
"name": "Schneider Electric APC 3-Phase Power Distribution Products: InfraStruXure 40 and 60 kVA PDU (XPDU) NMC2 AOS V6.9.4 and earlier",
"product_id": "12"
}
}
],
"category": "product_name",
"name": "APC 3-Phase Power Distribution Products: InfraStruXure 40 and 60 kVA PDU (XPDU)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=NMC2 AOS 6.9.4",
"product": {
"name": "Schneider Electric APC 3-Phase Power Distribution Products: Modular 150 and 175 kVA PDU NAM (XRDP) NMC2 AOS V6.9.4 and earlier",
"product_id": "13"
}
}
],
"category": "product_name",
"name": "APC 3-Phase Power Distribution Products: Modular 150 and 175 kVA PDU NAM (XRDP)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=NMC2 AOS 6.9.4",
"product": {
"name": "Schneider Electric APC 3-Phase Power Distribution Products: 400 and 500 kVA PMM (PMM) NMC2 AOS V6.9.4 and earlier",
"product_id": "14"
}
}
],
"category": "product_name",
"name": "APC 3-Phase Power Distribution Products: 400 and 500 kVA PMM (PMM)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=NMC2 AOS 6.9.4",
"product": {
"name": "Schneider Electric APC 3-Phase Power Distribution Products: Modular PDU/RPP (XRDP2G) NMC2 AOS V6.9.4 and earlier",
"product_id": "15"
}
}
],
"category": "product_name",
"name": "APC 3-Phase Power Distribution Products: Modular PDU/RPP (XRDP2G)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=NMC2 AOS 6.9.4",
"product": {
"name": "Schneider Electric APC Rack Power Distribution Units (rPDU) Embedded NMC2: 2G Metered/Switched Rack PDUs with embedded NMC2 NMC2 AOS V6.9.4 and earlier",
"product_id": "16"
}
}
],
"category": "product_name",
"name": "APC Rack Power Distribution Units (rPDU) Embedded NMC2: 2G Metered/Switched Rack PDUs with embedded NMC2"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=NMC2 AOS 6.9.4",
"product": {
"name": "Schneider Electric APC Rack Power Distribution Units (rPDU) Embedded NMC2: AP84XX, AP86XX, AP88XX, AP89XX NMC2 AOS V6.9.4 and earlier",
"product_id": "17"
}
}
],
"category": "product_name",
"name": "APC Rack Power Distribution Units (rPDU) Embedded NMC2: AP84XX, AP86XX, AP88XX, AP89XX"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=NMC1 AOS 3.9.2",
"product": {
"name": "Schneider Electric APC Rack Power Distribution Units (rPDU) Embedded NMC1: Metered/Switched Rack PDUs with embedded NMC1 - AP78XX, AP79XX NMC1 AOS V3.9.2 and earlier",
"product_id": "18"
}
}
],
"category": "product_name",
"name": "APC Rack Power Distribution Units (rPDU) Embedded NMC1: Metered/Switched Rack PDUs with embedded NMC1 - AP78XX, AP79XX"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=NMC2 AOS 6.8.8",
"product": {
"name": "Schneider Electric Rack Automatic Transfer Switches (ATS) Embedded NMC2: - Rack Automatic Transfer Switches - AP44XX NMC2 AOS V6.8.8 and earlier",
"product_id": "19"
}
}
],
"category": "product_name",
"name": "Rack Automatic Transfer Switches (ATS) Embedded NMC2: - Rack Automatic Transfer Switches - AP44XX"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=NMC1 AOS 3.9.2",
"product": {
"name": "Schneider Electric Rack Automatic Transfer Switches (ATS) Embedded NMC1: - Rack Automatic Transfer Switches - AP77XX NMC1 AOS v3.9.2 and earlier",
"product_id": "20"
}
}
],
"category": "product_name",
"name": "Rack Automatic Transfer Switches (ATS) Embedded NMC1: - Rack Automatic Transfer Switches - AP77XX"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=NMC2 AOS 6.8.8",
"product": {
"name": "Schneider Electric Environmental Monitoring Environmental Monitoring Unit with embedded NMC2 - NetBotz NBRK0250 NMC2 AOS V6.8.8 and earlier",
"product_id": "21"
}
}
],
"category": "product_name",
"name": "Environmental Monitoring Environmental Monitoring Unit with embedded NMC2 - NetBotz NBRK0250"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=NMC2 AOS 6.9.4",
"product": {
"name": "Schneider Electric Cooling Products Embedded NMC2 \u0026 Touchscreen Displays: InRow NMC2 AOS V6.9.4 and earlier",
"product_id": "22"
}
}
],
"category": "product_name",
"name": "Cooling Products Embedded NMC2 \u0026 Touchscreen Displays: InRow"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=NMC2 AOS 6.9.4",
"product": {
"name": "Schneider Electric Cooling Products Embedded NMC2 \u0026 Touchscreen Displays: Uniflair Cooling Devices NMC2 AOS V6.9.4 and earlier",
"product_id": "23"
}
}
],
"category": "product_name",
"name": "Cooling Products Embedded NMC2 \u0026 Touchscreen Displays: Uniflair Cooling Devices"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=NMC1 AOS 3.9.2",
"product": {
"name": "Schneider Electric Cooling Products Embedded NMC1 - Rack Air Removal Unit SX (RARU) NMC1 AOS V3.9.2 and earlier",
"product_id": "24"
}
}
],
"category": "product_name",
"name": "Cooling Products Embedded NMC1 - Rack Air Removal Unit SX (RARU)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=NMC1 AOS 3.9.2",
"product": {
"name": "Schneider Electric NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9617 (discontinued in Nov 2011) NMC1 AOS V3.9.2 and earlier",
"product_id": "25"
}
}
],
"category": "product_name",
"name": "NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9617 (discontinued in Nov 2011)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=NMC1 AOS 3.9.2",
"product": {
"name": "Schneider Electric NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9619 (discontinued in Sep 2012) NMC1 AOS V3.9.2 and earlier",
"product_id": "26"
}
}
],
"category": "product_name",
"name": "NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9619 (discontinued in Sep 2012)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=NMC1 AOS 3.9.2",
"product": {
"name": "Schneider Electric NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9618 (discontinued in Jan 2017) NMC1 AOS V3.9.2 and earlier",
"product_id": "27"
}
}
],
"category": "product_name",
"name": "NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - AP9618 (discontinued in Jan 2017)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=NMC1 AOS 3.9.2",
"product": {
"name": "Schneider Electric NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - Audio/Video Network Management Enabled products S20BLK, G50NETB2, G50NETB-20A2 NMC1 AOS V3.9.2 and earlier",
"product_id": "28"
}
}
],
"category": "product_name",
"name": "NMC1 Products Symmetra UPS Network Management Card 1 (NMC1) SmartSlot Models: - Audio/Video Network Management Enabled products S20BLK, G50NETB2, G50NETB-20A2"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=NMC1 AOS 3.9.2",
"product": {
"name": "Schneider Electric Battery Management - Battery Management System - AP9920B1 NMC1 AOS V3.9.2 and earlier",
"product_id": "29"
}
}
],
"category": "product_name",
"name": "Battery Management - Battery Management System - AP9920B1"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=NMC1 AOS 3.9.2",
"product": {
"name": "Schneider Electric Battery Management - Battery Management System - AP9921X NMC1 AOS V3.9.2 and earlier",
"product_id": "30"
}
}
],
"category": "product_name",
"name": "Battery Management - Battery Management System - AP9921X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=NMC1 AOS 3.9.2",
"product": {
"name": "Schneider Electric Environmental Monitoring AP9319 AP9320 AP9340 AP9360 AP9361 NetBotz NBRK0200 NMC1 AOS V3.9.2 and earlier",
"product_id": "31"
}
}
],
"category": "product_name",
"name": "Environmental Monitoring AP9319 AP9320 AP9340 AP9360 AP9361 NetBotz NBRK0200"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=NMC1 AOS 3.9.2",
"product": {
"name": "Schneider Electric Cooling Products - NetworkAir NMC1 AOS V3.9.2 and earlier",
"product_id": "32"
}
}
],
"category": "product_name",
"name": "Cooling Products - NetworkAir"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=NMC1 AOS 3.9.2",
"product": {
"name": "Schneider Electric Cooling Products - InRow NMC1 AOS V3.9.2 and earlier",
"product_id": "33"
}
}
],
"category": "product_name",
"name": "Cooling Products - InRow"
},
{
"branches": [
{
"category": "product_version_range",
"name": "6.9.2|6.9.4",
"product": {
"name": "Schneider Electric NMC2 AOS V6.9.2/6.9.4",
"product_id": "34"
}
}
],
"category": "product_name",
"name": "NMC2 AOS"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=6.9.6",
"product": {
"name": "Schneider Electric NMC2 AOS V6.9.6 or later",
"product_id": "35"
}
}
],
"category": "product_name",
"name": "NMC2 AOS"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=3.9.4",
"product": {
"name": "Schneider Electric NMC2 AOS V3.9.4 or later",
"product_id": "36"
}
}
],
"category": "product_name",
"name": "NMC2 AOS"
},
{
"branches": [
{
"category": "product_version",
"name": "1.3.3.1",
"product": {
"name": "Schneider Electric NMC3 AOS V1.3.3.1",
"product_id": "37"
}
}
],
"category": "product_name",
"name": "NMC3 AOS "
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=1.4",
"product": {
"name": "Schneider Electric NMC3 AOS V1.4 or later",
"product_id": "38"
}
}
],
"category": "product_name",
"name": "NMC3 AOS "
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=3.9.4",
"product": {
"name": "Schneider Electric NMC1 AOS V3.9.4 or later",
"product_id": "39"
}
}
],
"category": "product_name",
"name": "NMC1 AOS"
}
],
"category": "vendor",
"name": "Schneider Electric"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-11901",
"notes": [
{
"category": "description",
"text": "Network Management Card Family - Network Management Card 1 (NMC1), Network Management Card 2 (NMC2), Network Management Card 3 (NMC3)",
"title": "CVE Description"
}
],
"product_status": {
"fixed": [
"35",
"36",
"38",
"39"
],
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platforms. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOS V6.9.6 or \r\nlater. \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"1",
"2",
"3"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for the SUMX application \r\nrunning on the NMC1 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOS V3.9.4 or \r\nlater. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"4",
"5",
"6",
"7"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC3 platforms. \r\nCustomers are urged to upgrade to \r\napplications using NMC3 AOS V1.4 or \r\nlater.\r\nNote: AOS V1.3.3.1 addressed 14 of \r\nthe 15 CVEs. NMC3 AOS V1.4 \r\naddresses CVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"8",
"9"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"10"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"11",
"12",
"13",
"14",
"15"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"16",
"17"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC1 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC1 AOSV3.9.4 or \r\nlater\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"18"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC1 and NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOSV6.9.6 or \r\nlater or NMC1 AOSv3.9.4 or later\r\n \r\nNote: NMC2 AOS V6.9.2/6.9.4 \r\naddressed 14 of the 15 CVEs. AOS \r\nV6.9.6 addresses CVE-2020-11901.\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"19",
"20"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"21"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"22",
"23"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for RARU NMC1 \r\napplication \r\nCustomers are urged to upgrade to \r\napplications using NMC1 AOSV3.9.4 or \r\nlater\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"24"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "These are End of Commercialization \r\noffers.\r\nTo reduce risk of exploitation, apply \r\nthe mitigations detailed in the \r\nRecommended Mitigations section.\r\nContact your local support team for \r\nfurther assistance in upgrading to \r\nNMC2 or NMC3 platforms. ",
"product_ids": [
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/support/contact-us/"
},
{
"category": "mitigation",
"details": "Schneider Electric is implementing remediations which will be made available as soon as possible. In \r\nthe meantime, we recommend that our customers protect their installations from the cyber risks \r\nassociated with the Treck vulnerabilities by immediately taking these mitigating actions: \r\nFor devices on a local network: \r\n Network Partitioning: Locate devices behind firewalls capable of deep packet inspection with \r\nrulesets limiting access with only approved protocols and functions and to only those devices \r\nand endpoints requiring access. \r\n\u2022 Anomalous IP traffic: Block and detect anomalous IP traffic and malformed packets. Refer to \r\nthe Solution section of the CERT-Coordination Center Vulnerability Note VU#257161 https://kb.cert.org/vuls/id/257161 for \r\ndetails.\r\n\u2022 Disable DHCP on the NMC and configure it to use a static IP address.\r\n\u2022 To avoid the use of DNS, set DNS servers to 0.0.0.0 and utilize static IP addresses for all \r\nservers the NMC will connect. \r\n\u2022 If DNS must be used then normalize DNS through a secure recursive server or application \r\nlayer firewall\r\n\u2022 Enable only secure remote access methods. Disable any insecure protocols. \r\nFor devices that must communicate via the Internet: \r\n\u2022 Minimize network exposure for embedded and critical devices, keeping exposure to the \r\nminimum necessary, and ensuring that devices are not accessible from the Internet unless \r\nabsolutely essential.\r\n\u2022 Ensure communications to devices are via the EcoStruxure IT Gateway. The EcoStruxure IT \r\nplatform https://ecostruxureit.com/what-is-ecostruxure-it/ is security hardened with a mandatory two-factor authentication and high encryption \r\nstandards. Device data is securely transported to the EcoStruxure IT platform using the \r\nEcoStruxure IT Gateway, which uses an outbound connection to minimize risk to your \r\nenvironment.\r\nIf network access is not required: \r\n\u2022 Remove the Ethernet cable from the SmartSlot NMC, or the embedded NMC Ethernet port if \r\nan embedded NMC is present. \r\nAdditional mitigations: \r\n\u2022 Access Controls: Install physical and logical controls, so that no unauthorized personnel or \r\ndevice can access your systems, components, peripheral equipment, and networks. ",
"product_ids": [
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33"
],
"restart_required": {
"category": "none"
},
"url": "https://kb.cert.org/vuls/id/257161"
}
],
"title": "CVE-2020-11901"
},
{
"cve": "CVE-2020-11902",
"notes": [
{
"category": "description",
"text": "Network Management Card Family - Network Management Card 2 (NMC2), Network Management Card 3 (NMC3)",
"title": "CVE Description"
}
],
"product_status": {
"fixed": [
"34",
"35",
"36",
"37",
"38"
],
"known_affected": [
"1",
"2",
"3",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"19",
"21",
"22",
"23"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platforms. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOS V6.9.6 or \r\nlater. \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"1",
"2",
"3"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC3 platforms. \r\nCustomers are urged to upgrade to \r\napplications using NMC3 AOS V1.4 or \r\nlater.\r\nNote: AOS V1.3.3.1 addressed 14 of \r\nthe 15 CVEs. NMC3 AOS V1.4 \r\naddresses CVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"8",
"9"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"10"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"11",
"12",
"13",
"14",
"15"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"16",
"17"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC1 and NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOSV6.9.6 or \r\nlater or NMC1 AOSv3.9.4 or later\r\n \r\nNote: NMC2 AOS V6.9.2/6.9.4 \r\naddressed 14 of the 15 CVEs. AOS \r\nV6.9.6 addresses CVE-2020-11901.\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"19"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"21"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"22",
"23"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
}
],
"title": "CVE-2020-11902"
},
{
"cve": "CVE-2020-11903",
"notes": [
{
"category": "description",
"text": "Network Management Card Family - Network Management Card 1 (NMC1)",
"title": "CVE Description"
}
],
"product_status": {
"fixed": [
"39"
],
"known_affected": [
"4",
"5",
"6",
"7",
"18",
"20",
"24",
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for the SUMX application \r\nrunning on the NMC1 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOS V3.9.4 or \r\nlater. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"4",
"5",
"6",
"7"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC1 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC1 AOSV3.9.4 or \r\nlater\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"18"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC1 and NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOSV6.9.6 or \r\nlater or NMC1 AOSv3.9.4 or later\r\n \r\nNote: NMC2 AOS V6.9.2/6.9.4 \r\naddressed 14 of the 15 CVEs. AOS \r\nV6.9.6 addresses CVE-2020-11901.\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"20"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for RARU NMC1 \r\napplication \r\nCustomers are urged to upgrade to \r\napplications using NMC1 AOSV3.9.4 or \r\nlater\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"24"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "These are End of Commercialization \r\noffers.\r\nTo reduce risk of exploitation, apply \r\nthe mitigations detailed in the \r\nRecommended Mitigations section.\r\nContact your local support team for \r\nfurther assistance in upgrading to \r\nNMC2 or NMC3 platforms. ",
"product_ids": [
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/support/contact-us/"
},
{
"category": "mitigation",
"details": "Schneider Electric is implementing remediations which will be made available as soon as possible. In \r\nthe meantime, we recommend that our customers protect their installations from the cyber risks \r\nassociated with the Treck vulnerabilities by immediately taking these mitigating actions: \r\nFor devices on a local network: \r\n Network Partitioning: Locate devices behind firewalls capable of deep packet inspection with \r\nrulesets limiting access with only approved protocols and functions and to only those devices \r\nand endpoints requiring access. \r\n\u2022 Anomalous IP traffic: Block and detect anomalous IP traffic and malformed packets. Refer to \r\nthe Solution section of the CERT-Coordination Center Vulnerability Note VU#257161 https://kb.cert.org/vuls/id/257161 for \r\ndetails.\r\n\u2022 Disable DHCP on the NMC and configure it to use a static IP address.\r\n\u2022 To avoid the use of DNS, set DNS servers to 0.0.0.0 and utilize static IP addresses for all \r\nservers the NMC will connect. \r\n\u2022 If DNS must be used then normalize DNS through a secure recursive server or application \r\nlayer firewall\r\n\u2022 Enable only secure remote access methods. Disable any insecure protocols. \r\nFor devices that must communicate via the Internet: \r\n\u2022 Minimize network exposure for embedded and critical devices, keeping exposure to the \r\nminimum necessary, and ensuring that devices are not accessible from the Internet unless \r\nabsolutely essential.\r\n\u2022 Ensure communications to devices are via the EcoStruxure IT Gateway. The EcoStruxure IT \r\nplatform https://ecostruxureit.com/what-is-ecostruxure-it/ is security hardened with a mandatory two-factor authentication and high encryption \r\nstandards. Device data is securely transported to the EcoStruxure IT platform using the \r\nEcoStruxure IT Gateway, which uses an outbound connection to minimize risk to your \r\nenvironment.\r\nIf network access is not required: \r\n\u2022 Remove the Ethernet cable from the SmartSlot NMC, or the embedded NMC Ethernet port if \r\nan embedded NMC is present. \r\nAdditional mitigations: \r\n\u2022 Access Controls: Install physical and logical controls, so that no unauthorized personnel or \r\ndevice can access your systems, components, peripheral equipment, and networks. ",
"product_ids": [
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33"
],
"restart_required": {
"category": "none"
},
"url": "https://kb.cert.org/vuls/id/257161"
}
],
"title": "CVE-2020-11903"
},
{
"cve": "CVE-2020-11904",
"notes": [
{
"category": "description",
"text": "Network Management Card Family - Network Management Card 1 (NMC1), Network Management Card 2 (NMC2), Network Management Card 3 (NMC3)",
"title": "CVE Description"
}
],
"product_status": {
"fixed": [
"34",
"35",
"36",
"38",
"39"
],
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platforms. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOS V6.9.6 or \r\nlater. \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"1",
"2",
"3"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for the SUMX application \r\nrunning on the NMC1 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOS V3.9.4 or \r\nlater. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"4",
"5",
"6",
"7"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC3 platforms. \r\nCustomers are urged to upgrade to \r\napplications using NMC3 AOS V1.4 or \r\nlater.\r\nNote: AOS V1.3.3.1 addressed 14 of \r\nthe 15 CVEs. NMC3 AOS V1.4 \r\naddresses CVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"8",
"9"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"10"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"11",
"12",
"13",
"14",
"15"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"16",
"17"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC1 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC1 AOSV3.9.4 or \r\nlater\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"18"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC1 and NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOSV6.9.6 or \r\nlater or NMC1 AOSv3.9.4 or later\r\n \r\nNote: NMC2 AOS V6.9.2/6.9.4 \r\naddressed 14 of the 15 CVEs. AOS \r\nV6.9.6 addresses CVE-2020-11901.\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"19",
"20"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"21"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"22",
"23"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for RARU NMC1 \r\napplication \r\nCustomers are urged to upgrade to \r\napplications using NMC1 AOSV3.9.4 or \r\nlater\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"24"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "These are End of Commercialization \r\noffers.\r\nTo reduce risk of exploitation, apply \r\nthe mitigations detailed in the \r\nRecommended Mitigations section.\r\nContact your local support team for \r\nfurther assistance in upgrading to \r\nNMC2 or NMC3 platforms. ",
"product_ids": [
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/support/contact-us/"
},
{
"category": "mitigation",
"details": "Schneider Electric is implementing remediations which will be made available as soon as possible. In \r\nthe meantime, we recommend that our customers protect their installations from the cyber risks \r\nassociated with the Treck vulnerabilities by immediately taking these mitigating actions: \r\nFor devices on a local network: \r\n Network Partitioning: Locate devices behind firewalls capable of deep packet inspection with \r\nrulesets limiting access with only approved protocols and functions and to only those devices \r\nand endpoints requiring access. \r\n\u2022 Anomalous IP traffic: Block and detect anomalous IP traffic and malformed packets. Refer to \r\nthe Solution section of the CERT-Coordination Center Vulnerability Note VU#257161 https://kb.cert.org/vuls/id/257161 for \r\ndetails.\r\n\u2022 Disable DHCP on the NMC and configure it to use a static IP address.\r\n\u2022 To avoid the use of DNS, set DNS servers to 0.0.0.0 and utilize static IP addresses for all \r\nservers the NMC will connect. \r\n\u2022 If DNS must be used then normalize DNS through a secure recursive server or application \r\nlayer firewall\r\n\u2022 Enable only secure remote access methods. Disable any insecure protocols. \r\nFor devices that must communicate via the Internet: \r\n\u2022 Minimize network exposure for embedded and critical devices, keeping exposure to the \r\nminimum necessary, and ensuring that devices are not accessible from the Internet unless \r\nabsolutely essential.\r\n\u2022 Ensure communications to devices are via the EcoStruxure IT Gateway. The EcoStruxure IT \r\nplatform https://ecostruxureit.com/what-is-ecostruxure-it/ is security hardened with a mandatory two-factor authentication and high encryption \r\nstandards. Device data is securely transported to the EcoStruxure IT platform using the \r\nEcoStruxure IT Gateway, which uses an outbound connection to minimize risk to your \r\nenvironment.\r\nIf network access is not required: \r\n\u2022 Remove the Ethernet cable from the SmartSlot NMC, or the embedded NMC Ethernet port if \r\nan embedded NMC is present. \r\nAdditional mitigations: \r\n\u2022 Access Controls: Install physical and logical controls, so that no unauthorized personnel or \r\ndevice can access your systems, components, peripheral equipment, and networks. ",
"product_ids": [
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33"
],
"restart_required": {
"category": "none"
},
"url": "https://kb.cert.org/vuls/id/257161"
}
],
"title": "CVE-2020-11904"
},
{
"cve": "CVE-2020-11905",
"notes": [
{
"category": "description",
"text": "Network Management Card Family - Network Management Card 1 (NMC1), Network Management Card 2 (NMC2), Network Management Card 3 (NMC3)",
"title": "CVE Description"
}
],
"product_status": {
"fixed": [
"34",
"35",
"36",
"38",
"39"
],
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platforms. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOS V6.9.6 or \r\nlater. \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"1",
"2",
"3"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for the SUMX application \r\nrunning on the NMC1 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOS V3.9.4 or \r\nlater. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"4",
"5",
"6",
"7"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC3 platforms. \r\nCustomers are urged to upgrade to \r\napplications using NMC3 AOS V1.4 or \r\nlater.\r\nNote: AOS V1.3.3.1 addressed 14 of \r\nthe 15 CVEs. NMC3 AOS V1.4 \r\naddresses CVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"8",
"9"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"10"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"11",
"12",
"13",
"14",
"15"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"16",
"17"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC1 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC1 AOSV3.9.4 or \r\nlater\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"18"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC1 and NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOSV6.9.6 or \r\nlater or NMC1 AOSv3.9.4 or later\r\n \r\nNote: NMC2 AOS V6.9.2/6.9.4 \r\naddressed 14 of the 15 CVEs. AOS \r\nV6.9.6 addresses CVE-2020-11901.\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"19",
"20"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"21"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"22",
"23"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for RARU NMC1 \r\napplication \r\nCustomers are urged to upgrade to \r\napplications using NMC1 AOSV3.9.4 or \r\nlater\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"24"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "These are End of Commercialization \r\noffers.\r\nTo reduce risk of exploitation, apply \r\nthe mitigations detailed in the \r\nRecommended Mitigations section.\r\nContact your local support team for \r\nfurther assistance in upgrading to \r\nNMC2 or NMC3 platforms. ",
"product_ids": [
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/support/contact-us/"
},
{
"category": "mitigation",
"details": "Schneider Electric is implementing remediations which will be made available as soon as possible. In \r\nthe meantime, we recommend that our customers protect their installations from the cyber risks \r\nassociated with the Treck vulnerabilities by immediately taking these mitigating actions: \r\nFor devices on a local network: \r\n Network Partitioning: Locate devices behind firewalls capable of deep packet inspection with \r\nrulesets limiting access with only approved protocols and functions and to only those devices \r\nand endpoints requiring access. \r\n\u2022 Anomalous IP traffic: Block and detect anomalous IP traffic and malformed packets. Refer to \r\nthe Solution section of the CERT-Coordination Center Vulnerability Note VU#257161 https://kb.cert.org/vuls/id/257161 for \r\ndetails.\r\n\u2022 Disable DHCP on the NMC and configure it to use a static IP address.\r\n\u2022 To avoid the use of DNS, set DNS servers to 0.0.0.0 and utilize static IP addresses for all \r\nservers the NMC will connect. \r\n\u2022 If DNS must be used then normalize DNS through a secure recursive server or application \r\nlayer firewall\r\n\u2022 Enable only secure remote access methods. Disable any insecure protocols. \r\nFor devices that must communicate via the Internet: \r\n\u2022 Minimize network exposure for embedded and critical devices, keeping exposure to the \r\nminimum necessary, and ensuring that devices are not accessible from the Internet unless \r\nabsolutely essential.\r\n\u2022 Ensure communications to devices are via the EcoStruxure IT Gateway. The EcoStruxure IT \r\nplatform https://ecostruxureit.com/what-is-ecostruxure-it/ is security hardened with a mandatory two-factor authentication and high encryption \r\nstandards. Device data is securely transported to the EcoStruxure IT platform using the \r\nEcoStruxure IT Gateway, which uses an outbound connection to minimize risk to your \r\nenvironment.\r\nIf network access is not required: \r\n\u2022 Remove the Ethernet cable from the SmartSlot NMC, or the embedded NMC Ethernet port if \r\nan embedded NMC is present. \r\nAdditional mitigations: \r\n\u2022 Access Controls: Install physical and logical controls, so that no unauthorized personnel or \r\ndevice can access your systems, components, peripheral equipment, and networks. ",
"product_ids": [
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33"
],
"restart_required": {
"category": "none"
},
"url": "https://kb.cert.org/vuls/id/257161"
}
],
"title": "CVE-2020-11905"
},
{
"cve": "CVE-2020-11906",
"notes": [
{
"category": "description",
"text": "Network Management Card Family - Network Management Card 2 (NMC2), Network Management Card 3 (NMC3)",
"title": "CVE Description"
}
],
"product_status": {
"fixed": [
"34",
"35",
"36",
"37",
"38"
],
"known_affected": [
"1",
"2",
"3",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"19",
"21",
"22",
"23"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platforms. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOS V6.9.6 or \r\nlater. \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"1",
"2",
"3"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC3 platforms. \r\nCustomers are urged to upgrade to \r\napplications using NMC3 AOS V1.4 or \r\nlater.\r\nNote: AOS V1.3.3.1 addressed 14 of \r\nthe 15 CVEs. NMC3 AOS V1.4 \r\naddresses CVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"8",
"9"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"10"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"11",
"12",
"13",
"14",
"15"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"16",
"17"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC1 and NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOSV6.9.6 or \r\nlater or NMC1 AOSv3.9.4 or later\r\n \r\nNote: NMC2 AOS V6.9.2/6.9.4 \r\naddressed 14 of the 15 CVEs. AOS \r\nV6.9.6 addresses CVE-2020-11901.\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"19"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"21"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"22",
"23"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
}
],
"title": "CVE-2020-11906"
},
{
"cve": "CVE-2020-11907",
"notes": [
{
"category": "description",
"text": "Network Management Card Family - Network Management Card 1 (NMC1), Network Management Card 2 (NMC2), Network Management Card 3 (NMC3)",
"title": "CVE Description"
}
],
"product_status": {
"fixed": [
"34",
"35",
"36",
"38",
"39"
],
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platforms. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOS V6.9.6 or \r\nlater. \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"1",
"2",
"3"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for the SUMX application \r\nrunning on the NMC1 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOS V3.9.4 or \r\nlater. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"4",
"5",
"6",
"7"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC3 platforms. \r\nCustomers are urged to upgrade to \r\napplications using NMC3 AOS V1.4 or \r\nlater.\r\nNote: AOS V1.3.3.1 addressed 14 of \r\nthe 15 CVEs. NMC3 AOS V1.4 \r\naddresses CVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"8",
"9"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"10"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"11",
"12",
"13",
"14",
"15"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"16",
"17"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC1 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC1 AOSV3.9.4 or \r\nlater\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"18"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC1 and NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOSV6.9.6 or \r\nlater or NMC1 AOSv3.9.4 or later\r\n \r\nNote: NMC2 AOS V6.9.2/6.9.4 \r\naddressed 14 of the 15 CVEs. AOS \r\nV6.9.6 addresses CVE-2020-11901.\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"19",
"20"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"21"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"22",
"23"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for RARU NMC1 \r\napplication \r\nCustomers are urged to upgrade to \r\napplications using NMC1 AOSV3.9.4 or \r\nlater\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"24"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "These are End of Commercialization \r\noffers.\r\nTo reduce risk of exploitation, apply \r\nthe mitigations detailed in the \r\nRecommended Mitigations section.\r\nContact your local support team for \r\nfurther assistance in upgrading to \r\nNMC2 or NMC3 platforms. ",
"product_ids": [
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/support/contact-us/"
},
{
"category": "mitigation",
"details": "Schneider Electric is implementing remediations which will be made available as soon as possible. In \r\nthe meantime, we recommend that our customers protect their installations from the cyber risks \r\nassociated with the Treck vulnerabilities by immediately taking these mitigating actions: \r\nFor devices on a local network: \r\n Network Partitioning: Locate devices behind firewalls capable of deep packet inspection with \r\nrulesets limiting access with only approved protocols and functions and to only those devices \r\nand endpoints requiring access. \r\n\u2022 Anomalous IP traffic: Block and detect anomalous IP traffic and malformed packets. Refer to \r\nthe Solution section of the CERT-Coordination Center Vulnerability Note VU#257161 https://kb.cert.org/vuls/id/257161 for \r\ndetails.\r\n\u2022 Disable DHCP on the NMC and configure it to use a static IP address.\r\n\u2022 To avoid the use of DNS, set DNS servers to 0.0.0.0 and utilize static IP addresses for all \r\nservers the NMC will connect. \r\n\u2022 If DNS must be used then normalize DNS through a secure recursive server or application \r\nlayer firewall\r\n\u2022 Enable only secure remote access methods. Disable any insecure protocols. \r\nFor devices that must communicate via the Internet: \r\n\u2022 Minimize network exposure for embedded and critical devices, keeping exposure to the \r\nminimum necessary, and ensuring that devices are not accessible from the Internet unless \r\nabsolutely essential.\r\n\u2022 Ensure communications to devices are via the EcoStruxure IT Gateway. The EcoStruxure IT \r\nplatform https://ecostruxureit.com/what-is-ecostruxure-it/ is security hardened with a mandatory two-factor authentication and high encryption \r\nstandards. Device data is securely transported to the EcoStruxure IT platform using the \r\nEcoStruxure IT Gateway, which uses an outbound connection to minimize risk to your \r\nenvironment.\r\nIf network access is not required: \r\n\u2022 Remove the Ethernet cable from the SmartSlot NMC, or the embedded NMC Ethernet port if \r\nan embedded NMC is present. \r\nAdditional mitigations: \r\n\u2022 Access Controls: Install physical and logical controls, so that no unauthorized personnel or \r\ndevice can access your systems, components, peripheral equipment, and networks. ",
"product_ids": [
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33"
],
"restart_required": {
"category": "none"
},
"url": "https://kb.cert.org/vuls/id/257161"
}
],
"title": "CVE-2020-11907"
},
{
"cve": "CVE-2020-11908",
"notes": [
{
"category": "description",
"text": "Network Management Card Family - Network Management Card 1 (NMC1)",
"title": "CVE Description"
}
],
"product_status": {
"fixed": [
"39"
],
"known_affected": [
"4",
"5",
"6",
"7",
"18",
"20",
"24",
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for the SUMX application \r\nrunning on the NMC1 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOS V3.9.4 or \r\nlater. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"4",
"5",
"6",
"7"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC1 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC1 AOSV3.9.4 or \r\nlater\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"18"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC1 and NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOSV6.9.6 or \r\nlater or NMC1 AOSv3.9.4 or later\r\n \r\nNote: NMC2 AOS V6.9.2/6.9.4 \r\naddressed 14 of the 15 CVEs. AOS \r\nV6.9.6 addresses CVE-2020-11901.\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"20"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for RARU NMC1 \r\napplication \r\nCustomers are urged to upgrade to \r\napplications using NMC1 AOSV3.9.4 or \r\nlater\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"24"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "These are End of Commercialization \r\noffers.\r\nTo reduce risk of exploitation, apply \r\nthe mitigations detailed in the \r\nRecommended Mitigations section.\r\nContact your local support team for \r\nfurther assistance in upgrading to \r\nNMC2 or NMC3 platforms. ",
"product_ids": [
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/support/contact-us/"
},
{
"category": "mitigation",
"details": "Schneider Electric is implementing remediations which will be made available as soon as possible. In \r\nthe meantime, we recommend that our customers protect their installations from the cyber risks \r\nassociated with the Treck vulnerabilities by immediately taking these mitigating actions: \r\nFor devices on a local network: \r\n Network Partitioning: Locate devices behind firewalls capable of deep packet inspection with \r\nrulesets limiting access with only approved protocols and functions and to only those devices \r\nand endpoints requiring access. \r\n\u2022 Anomalous IP traffic: Block and detect anomalous IP traffic and malformed packets. Refer to \r\nthe Solution section of the CERT-Coordination Center Vulnerability Note VU#257161 https://kb.cert.org/vuls/id/257161 for \r\ndetails.\r\n\u2022 Disable DHCP on the NMC and configure it to use a static IP address.\r\n\u2022 To avoid the use of DNS, set DNS servers to 0.0.0.0 and utilize static IP addresses for all \r\nservers the NMC will connect. \r\n\u2022 If DNS must be used then normalize DNS through a secure recursive server or application \r\nlayer firewall\r\n\u2022 Enable only secure remote access methods. Disable any insecure protocols. \r\nFor devices that must communicate via the Internet: \r\n\u2022 Minimize network exposure for embedded and critical devices, keeping exposure to the \r\nminimum necessary, and ensuring that devices are not accessible from the Internet unless \r\nabsolutely essential.\r\n\u2022 Ensure communications to devices are via the EcoStruxure IT Gateway. The EcoStruxure IT \r\nplatform https://ecostruxureit.com/what-is-ecostruxure-it/ is security hardened with a mandatory two-factor authentication and high encryption \r\nstandards. Device data is securely transported to the EcoStruxure IT platform using the \r\nEcoStruxure IT Gateway, which uses an outbound connection to minimize risk to your \r\nenvironment.\r\nIf network access is not required: \r\n\u2022 Remove the Ethernet cable from the SmartSlot NMC, or the embedded NMC Ethernet port if \r\nan embedded NMC is present. \r\nAdditional mitigations: \r\n\u2022 Access Controls: Install physical and logical controls, so that no unauthorized personnel or \r\ndevice can access your systems, components, peripheral equipment, and networks. ",
"product_ids": [
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33"
],
"restart_required": {
"category": "none"
},
"url": "https://kb.cert.org/vuls/id/257161"
}
],
"title": "CVE-2020-11908"
},
{
"cve": "CVE-2020-11909",
"notes": [
{
"category": "description",
"text": "Network Management Card Family - Network Management Card 1 (NMC1), Network Management Card 2 (NMC2), Network Management Card 3 (NMC3)",
"title": "CVE Description"
}
],
"product_status": {
"fixed": [
"34",
"35",
"36",
"38",
"39"
],
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platforms. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOS V6.9.6 or \r\nlater. \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"1",
"2",
"3"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for the SUMX application \r\nrunning on the NMC1 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOS V3.9.4 or \r\nlater. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"4",
"5",
"6",
"7"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC3 platforms. \r\nCustomers are urged to upgrade to \r\napplications using NMC3 AOS V1.4 or \r\nlater.\r\nNote: AOS V1.3.3.1 addressed 14 of \r\nthe 15 CVEs. NMC3 AOS V1.4 \r\naddresses CVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"8",
"9"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"10"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"11",
"12",
"13",
"14",
"15"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"16",
"17"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC1 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC1 AOSV3.9.4 or \r\nlater\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"18"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC1 and NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOSV6.9.6 or \r\nlater or NMC1 AOSv3.9.4 or later\r\n \r\nNote: NMC2 AOS V6.9.2/6.9.4 \r\naddressed 14 of the 15 CVEs. AOS \r\nV6.9.6 addresses CVE-2020-11901.\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"19",
"20"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"21"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"22",
"23"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for RARU NMC1 \r\napplication \r\nCustomers are urged to upgrade to \r\napplications using NMC1 AOSV3.9.4 or \r\nlater\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"24"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "These are End of Commercialization \r\noffers.\r\nTo reduce risk of exploitation, apply \r\nthe mitigations detailed in the \r\nRecommended Mitigations section.\r\nContact your local support team for \r\nfurther assistance in upgrading to \r\nNMC2 or NMC3 platforms. ",
"product_ids": [
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/support/contact-us/"
},
{
"category": "mitigation",
"details": "Schneider Electric is implementing remediations which will be made available as soon as possible. In \r\nthe meantime, we recommend that our customers protect their installations from the cyber risks \r\nassociated with the Treck vulnerabilities by immediately taking these mitigating actions: \r\nFor devices on a local network: \r\n Network Partitioning: Locate devices behind firewalls capable of deep packet inspection with \r\nrulesets limiting access with only approved protocols and functions and to only those devices \r\nand endpoints requiring access. \r\n\u2022 Anomalous IP traffic: Block and detect anomalous IP traffic and malformed packets. Refer to \r\nthe Solution section of the CERT-Coordination Center Vulnerability Note VU#257161 https://kb.cert.org/vuls/id/257161 for \r\ndetails.\r\n\u2022 Disable DHCP on the NMC and configure it to use a static IP address.\r\n\u2022 To avoid the use of DNS, set DNS servers to 0.0.0.0 and utilize static IP addresses for all \r\nservers the NMC will connect. \r\n\u2022 If DNS must be used then normalize DNS through a secure recursive server or application \r\nlayer firewall\r\n\u2022 Enable only secure remote access methods. Disable any insecure protocols. \r\nFor devices that must communicate via the Internet: \r\n\u2022 Minimize network exposure for embedded and critical devices, keeping exposure to the \r\nminimum necessary, and ensuring that devices are not accessible from the Internet unless \r\nabsolutely essential.\r\n\u2022 Ensure communications to devices are via the EcoStruxure IT Gateway. The EcoStruxure IT \r\nplatform https://ecostruxureit.com/what-is-ecostruxure-it/ is security hardened with a mandatory two-factor authentication and high encryption \r\nstandards. Device data is securely transported to the EcoStruxure IT platform using the \r\nEcoStruxure IT Gateway, which uses an outbound connection to minimize risk to your \r\nenvironment.\r\nIf network access is not required: \r\n\u2022 Remove the Ethernet cable from the SmartSlot NMC, or the embedded NMC Ethernet port if \r\nan embedded NMC is present. \r\nAdditional mitigations: \r\n\u2022 Access Controls: Install physical and logical controls, so that no unauthorized personnel or \r\ndevice can access your systems, components, peripheral equipment, and networks. ",
"product_ids": [
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33"
],
"restart_required": {
"category": "none"
},
"url": "https://kb.cert.org/vuls/id/257161"
}
],
"title": "CVE-2020-11909"
},
{
"cve": "CVE-2020-11910",
"notes": [
{
"category": "description",
"text": "Network Management Card Family - Network Management Card 1 (NMC1), Network Management Card 2 (NMC2), Network Management Card 3 (NMC3)",
"title": "CVE Description"
}
],
"product_status": {
"fixed": [
"34",
"35",
"36",
"38",
"39"
],
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platforms. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOS V6.9.6 or \r\nlater. \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"1",
"2",
"3"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for the SUMX application \r\nrunning on the NMC1 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOS V3.9.4 or \r\nlater. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"4",
"5",
"6",
"7"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC3 platforms. \r\nCustomers are urged to upgrade to \r\napplications using NMC3 AOS V1.4 or \r\nlater.\r\nNote: AOS V1.3.3.1 addressed 14 of \r\nthe 15 CVEs. NMC3 AOS V1.4 \r\naddresses CVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"8",
"9"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"10"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"11",
"12",
"13",
"14",
"15"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"16",
"17"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC1 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC1 AOSV3.9.4 or \r\nlater\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"18"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC1 and NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOSV6.9.6 or \r\nlater or NMC1 AOSv3.9.4 or later\r\n \r\nNote: NMC2 AOS V6.9.2/6.9.4 \r\naddressed 14 of the 15 CVEs. AOS \r\nV6.9.6 addresses CVE-2020-11901.\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"19",
"20"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"21"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"22",
"23"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for RARU NMC1 \r\napplication \r\nCustomers are urged to upgrade to \r\napplications using NMC1 AOSV3.9.4 or \r\nlater\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"24"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "These are End of Commercialization \r\noffers.\r\nTo reduce risk of exploitation, apply \r\nthe mitigations detailed in the \r\nRecommended Mitigations section.\r\nContact your local support team for \r\nfurther assistance in upgrading to \r\nNMC2 or NMC3 platforms. ",
"product_ids": [
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/support/contact-us/"
},
{
"category": "mitigation",
"details": "Schneider Electric is implementing remediations which will be made available as soon as possible. In \r\nthe meantime, we recommend that our customers protect their installations from the cyber risks \r\nassociated with the Treck vulnerabilities by immediately taking these mitigating actions: \r\nFor devices on a local network: \r\n Network Partitioning: Locate devices behind firewalls capable of deep packet inspection with \r\nrulesets limiting access with only approved protocols and functions and to only those devices \r\nand endpoints requiring access. \r\n\u2022 Anomalous IP traffic: Block and detect anomalous IP traffic and malformed packets. Refer to \r\nthe Solution section of the CERT-Coordination Center Vulnerability Note VU#257161 https://kb.cert.org/vuls/id/257161 for \r\ndetails.\r\n\u2022 Disable DHCP on the NMC and configure it to use a static IP address.\r\n\u2022 To avoid the use of DNS, set DNS servers to 0.0.0.0 and utilize static IP addresses for all \r\nservers the NMC will connect. \r\n\u2022 If DNS must be used then normalize DNS through a secure recursive server or application \r\nlayer firewall\r\n\u2022 Enable only secure remote access methods. Disable any insecure protocols. \r\nFor devices that must communicate via the Internet: \r\n\u2022 Minimize network exposure for embedded and critical devices, keeping exposure to the \r\nminimum necessary, and ensuring that devices are not accessible from the Internet unless \r\nabsolutely essential.\r\n\u2022 Ensure communications to devices are via the EcoStruxure IT Gateway. The EcoStruxure IT \r\nplatform https://ecostruxureit.com/what-is-ecostruxure-it/ is security hardened with a mandatory two-factor authentication and high encryption \r\nstandards. Device data is securely transported to the EcoStruxure IT platform using the \r\nEcoStruxure IT Gateway, which uses an outbound connection to minimize risk to your \r\nenvironment.\r\nIf network access is not required: \r\n\u2022 Remove the Ethernet cable from the SmartSlot NMC, or the embedded NMC Ethernet port if \r\nan embedded NMC is present. \r\nAdditional mitigations: \r\n\u2022 Access Controls: Install physical and logical controls, so that no unauthorized personnel or \r\ndevice can access your systems, components, peripheral equipment, and networks. ",
"product_ids": [
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33"
],
"restart_required": {
"category": "none"
},
"url": "https://kb.cert.org/vuls/id/257161"
}
],
"title": "CVE-2020-11910"
},
{
"cve": "CVE-2020-11911",
"notes": [
{
"category": "description",
"text": "Network Management Card Family - Network Management Card 1 (NMC1), Network Management Card 2 (NMC2), Network Management Card 3 (NMC3)",
"title": "CVE Description"
}
],
"product_status": {
"fixed": [
"34",
"35",
"36",
"38",
"39"
],
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platforms. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOS V6.9.6 or \r\nlater. \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"1",
"2",
"3"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for the SUMX application \r\nrunning on the NMC1 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOS V3.9.4 or \r\nlater. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"4",
"5",
"6",
"7"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC3 platforms. \r\nCustomers are urged to upgrade to \r\napplications using NMC3 AOS V1.4 or \r\nlater.\r\nNote: AOS V1.3.3.1 addressed 14 of \r\nthe 15 CVEs. NMC3 AOS V1.4 \r\naddresses CVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"8",
"9"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"10"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"11",
"12",
"13",
"14",
"15"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"16",
"17"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC1 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC1 AOSV3.9.4 or \r\nlater\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"18"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC1 and NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOSV6.9.6 or \r\nlater or NMC1 AOSv3.9.4 or later\r\n \r\nNote: NMC2 AOS V6.9.2/6.9.4 \r\naddressed 14 of the 15 CVEs. AOS \r\nV6.9.6 addresses CVE-2020-11901.\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"19",
"20"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"21"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"22",
"23"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for RARU NMC1 \r\napplication \r\nCustomers are urged to upgrade to \r\napplications using NMC1 AOSV3.9.4 or \r\nlater\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"24"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "These are End of Commercialization \r\noffers.\r\nTo reduce risk of exploitation, apply \r\nthe mitigations detailed in the \r\nRecommended Mitigations section.\r\nContact your local support team for \r\nfurther assistance in upgrading to \r\nNMC2 or NMC3 platforms. ",
"product_ids": [
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/support/contact-us/"
},
{
"category": "mitigation",
"details": "Schneider Electric is implementing remediations which will be made available as soon as possible. In \r\nthe meantime, we recommend that our customers protect their installations from the cyber risks \r\nassociated with the Treck vulnerabilities by immediately taking these mitigating actions: \r\nFor devices on a local network: \r\n Network Partitioning: Locate devices behind firewalls capable of deep packet inspection with \r\nrulesets limiting access with only approved protocols and functions and to only those devices \r\nand endpoints requiring access. \r\n\u2022 Anomalous IP traffic: Block and detect anomalous IP traffic and malformed packets. Refer to \r\nthe Solution section of the CERT-Coordination Center Vulnerability Note VU#257161 https://kb.cert.org/vuls/id/257161 for \r\ndetails.\r\n\u2022 Disable DHCP on the NMC and configure it to use a static IP address.\r\n\u2022 To avoid the use of DNS, set DNS servers to 0.0.0.0 and utilize static IP addresses for all \r\nservers the NMC will connect. \r\n\u2022 If DNS must be used then normalize DNS through a secure recursive server or application \r\nlayer firewall\r\n\u2022 Enable only secure remote access methods. Disable any insecure protocols. \r\nFor devices that must communicate via the Internet: \r\n\u2022 Minimize network exposure for embedded and critical devices, keeping exposure to the \r\nminimum necessary, and ensuring that devices are not accessible from the Internet unless \r\nabsolutely essential.\r\n\u2022 Ensure communications to devices are via the EcoStruxure IT Gateway. The EcoStruxure IT \r\nplatform https://ecostruxureit.com/what-is-ecostruxure-it/ is security hardened with a mandatory two-factor authentication and high encryption \r\nstandards. Device data is securely transported to the EcoStruxure IT platform using the \r\nEcoStruxure IT Gateway, which uses an outbound connection to minimize risk to your \r\nenvironment.\r\nIf network access is not required: \r\n\u2022 Remove the Ethernet cable from the SmartSlot NMC, or the embedded NMC Ethernet port if \r\nan embedded NMC is present. \r\nAdditional mitigations: \r\n\u2022 Access Controls: Install physical and logical controls, so that no unauthorized personnel or \r\ndevice can access your systems, components, peripheral equipment, and networks. ",
"product_ids": [
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33"
],
"restart_required": {
"category": "none"
},
"url": "https://kb.cert.org/vuls/id/257161"
}
],
"title": "CVE-2020-11911"
},
{
"cve": "CVE-2020-11912",
"notes": [
{
"category": "description",
"text": "Network Management Card Family - Network Management Card 1 (NMC1), Network Management Card 2 (NMC2), Network Management Card 3 (NMC3)",
"title": "CVE Description"
}
],
"product_status": {
"fixed": [
"34",
"35",
"36",
"38",
"39"
],
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platforms. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOS V6.9.6 or \r\nlater. \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"1",
"2",
"3"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for the SUMX application \r\nrunning on the NMC1 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOS V3.9.4 or \r\nlater. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"4",
"5",
"6",
"7"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC3 platforms. \r\nCustomers are urged to upgrade to \r\napplications using NMC3 AOS V1.4 or \r\nlater.\r\nNote: AOS V1.3.3.1 addressed 14 of \r\nthe 15 CVEs. NMC3 AOS V1.4 \r\naddresses CVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"8",
"9"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"10"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"11",
"12",
"13",
"14",
"15"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"16",
"17"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC1 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC1 AOSV3.9.4 or \r\nlater\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"18"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC1 and NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOSV6.9.6 or \r\nlater or NMC1 AOSv3.9.4 or later\r\n \r\nNote: NMC2 AOS V6.9.2/6.9.4 \r\naddressed 14 of the 15 CVEs. AOS \r\nV6.9.6 addresses CVE-2020-11901.\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"19",
"20"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"21"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"22",
"23"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for RARU NMC1 \r\napplication \r\nCustomers are urged to upgrade to \r\napplications using NMC1 AOSV3.9.4 or \r\nlater\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"24"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "These are End of Commercialization \r\noffers.\r\nTo reduce risk of exploitation, apply \r\nthe mitigations detailed in the \r\nRecommended Mitigations section.\r\nContact your local support team for \r\nfurther assistance in upgrading to \r\nNMC2 or NMC3 platforms. ",
"product_ids": [
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/support/contact-us/"
},
{
"category": "mitigation",
"details": "Schneider Electric is implementing remediations which will be made available as soon as possible. In \r\nthe meantime, we recommend that our customers protect their installations from the cyber risks \r\nassociated with the Treck vulnerabilities by immediately taking these mitigating actions: \r\nFor devices on a local network: \r\n Network Partitioning: Locate devices behind firewalls capable of deep packet inspection with \r\nrulesets limiting access with only approved protocols and functions and to only those devices \r\nand endpoints requiring access. \r\n\u2022 Anomalous IP traffic: Block and detect anomalous IP traffic and malformed packets. Refer to \r\nthe Solution section of the CERT-Coordination Center Vulnerability Note VU#257161 https://kb.cert.org/vuls/id/257161 for \r\ndetails.\r\n\u2022 Disable DHCP on the NMC and configure it to use a static IP address.\r\n\u2022 To avoid the use of DNS, set DNS servers to 0.0.0.0 and utilize static IP addresses for all \r\nservers the NMC will connect. \r\n\u2022 If DNS must be used then normalize DNS through a secure recursive server or application \r\nlayer firewall\r\n\u2022 Enable only secure remote access methods. Disable any insecure protocols. \r\nFor devices that must communicate via the Internet: \r\n\u2022 Minimize network exposure for embedded and critical devices, keeping exposure to the \r\nminimum necessary, and ensuring that devices are not accessible from the Internet unless \r\nabsolutely essential.\r\n\u2022 Ensure communications to devices are via the EcoStruxure IT Gateway. The EcoStruxure IT \r\nplatform https://ecostruxureit.com/what-is-ecostruxure-it/ is security hardened with a mandatory two-factor authentication and high encryption \r\nstandards. Device data is securely transported to the EcoStruxure IT platform using the \r\nEcoStruxure IT Gateway, which uses an outbound connection to minimize risk to your \r\nenvironment.\r\nIf network access is not required: \r\n\u2022 Remove the Ethernet cable from the SmartSlot NMC, or the embedded NMC Ethernet port if \r\nan embedded NMC is present. \r\nAdditional mitigations: \r\n\u2022 Access Controls: Install physical and logical controls, so that no unauthorized personnel or \r\ndevice can access your systems, components, peripheral equipment, and networks. ",
"product_ids": [
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33"
],
"restart_required": {
"category": "none"
},
"url": "https://kb.cert.org/vuls/id/257161"
}
],
"title": "CVE-2020-11912"
},
{
"cve": "CVE-2020-11913",
"notes": [
{
"category": "description",
"text": "Network Management Card Family - Network Management Card 2 (NMC2), Network Management Card 3 (NMC3)",
"title": "CVE Description"
}
],
"product_status": {
"fixed": [
"34",
"35",
"36",
"37",
"38"
],
"known_affected": [
"1",
"2",
"3",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"19",
"21",
"22",
"23"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platforms. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOS V6.9.6 or \r\nlater. \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"1",
"2",
"3"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC3 platforms. \r\nCustomers are urged to upgrade to \r\napplications using NMC3 AOS V1.4 or \r\nlater.\r\nNote: AOS V1.3.3.1 addressed 14 of \r\nthe 15 CVEs. NMC3 AOS V1.4 \r\naddresses CVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"8",
"9"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"10"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"11",
"12",
"13",
"14",
"15"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"16",
"17"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC1 and NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOSV6.9.6 or \r\nlater or NMC1 AOSv3.9.4 or later\r\n \r\nNote: NMC2 AOS V6.9.2/6.9.4 \r\naddressed 14 of the 15 CVEs. AOS \r\nV6.9.6 addresses CVE-2020-11901.\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"19"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"21"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"22",
"23"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
}
],
"title": "CVE-2020-11913"
},
{
"cve": "CVE-2020-11914",
"notes": [
{
"category": "description",
"text": "Network Management Card Family - Network Management Card 1 (NMC1), Network Management Card 2 (NMC2), Network Management Card 3 (NMC3)",
"title": "CVE Description"
}
],
"product_status": {
"fixed": [
"34",
"35",
"36",
"38",
"39"
],
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platforms. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOS V6.9.6 or \r\nlater. \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"1",
"2",
"3"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for the SUMX application \r\nrunning on the NMC1 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOS V3.9.4 or \r\nlater. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"4",
"5",
"6",
"7"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC3 platforms. \r\nCustomers are urged to upgrade to \r\napplications using NMC3 AOS V1.4 or \r\nlater.\r\nNote: AOS V1.3.3.1 addressed 14 of \r\nthe 15 CVEs. NMC3 AOS V1.4 \r\naddresses CVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"8",
"9"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"10"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"11",
"12",
"13",
"14",
"15"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"16",
"17"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC1 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC1 AOSV3.9.4 or \r\nlater\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"18"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC1 and NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOSV6.9.6 or \r\nlater or NMC1 AOSv3.9.4 or later\r\n \r\nNote: NMC2 AOS V6.9.2/6.9.4 \r\naddressed 14 of the 15 CVEs. AOS \r\nV6.9.6 addresses CVE-2020-11901.\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"19",
"20"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"21"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"22",
"23"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for RARU NMC1 \r\napplication \r\nCustomers are urged to upgrade to \r\napplications using NMC1 AOSV3.9.4 or \r\nlater\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"24"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "These are End of Commercialization \r\noffers.\r\nTo reduce risk of exploitation, apply \r\nthe mitigations detailed in the \r\nRecommended Mitigations section.\r\nContact your local support team for \r\nfurther assistance in upgrading to \r\nNMC2 or NMC3 platforms. ",
"product_ids": [
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/support/contact-us/"
},
{
"category": "mitigation",
"details": "Schneider Electric is implementing remediations which will be made available as soon as possible. In \r\nthe meantime, we recommend that our customers protect their installations from the cyber risks \r\nassociated with the Treck vulnerabilities by immediately taking these mitigating actions: \r\nFor devices on a local network: \r\n Network Partitioning: Locate devices behind firewalls capable of deep packet inspection with \r\nrulesets limiting access with only approved protocols and functions and to only those devices \r\nand endpoints requiring access. \r\n\u2022 Anomalous IP traffic: Block and detect anomalous IP traffic and malformed packets. Refer to \r\nthe Solution section of the CERT-Coordination Center Vulnerability Note VU#257161 https://kb.cert.org/vuls/id/257161 for \r\ndetails.\r\n\u2022 Disable DHCP on the NMC and configure it to use a static IP address.\r\n\u2022 To avoid the use of DNS, set DNS servers to 0.0.0.0 and utilize static IP addresses for all \r\nservers the NMC will connect. \r\n\u2022 If DNS must be used then normalize DNS through a secure recursive server or application \r\nlayer firewall\r\n\u2022 Enable only secure remote access methods. Disable any insecure protocols. \r\nFor devices that must communicate via the Internet: \r\n\u2022 Minimize network exposure for embedded and critical devices, keeping exposure to the \r\nminimum necessary, and ensuring that devices are not accessible from the Internet unless \r\nabsolutely essential.\r\n\u2022 Ensure communications to devices are via the EcoStruxure IT Gateway. The EcoStruxure IT \r\nplatform https://ecostruxureit.com/what-is-ecostruxure-it/ is security hardened with a mandatory two-factor authentication and high encryption \r\nstandards. Device data is securely transported to the EcoStruxure IT platform using the \r\nEcoStruxure IT Gateway, which uses an outbound connection to minimize risk to your \r\nenvironment.\r\nIf network access is not required: \r\n\u2022 Remove the Ethernet cable from the SmartSlot NMC, or the embedded NMC Ethernet port if \r\nan embedded NMC is present. \r\nAdditional mitigations: \r\n\u2022 Access Controls: Install physical and logical controls, so that no unauthorized personnel or \r\ndevice can access your systems, components, peripheral equipment, and networks. ",
"product_ids": [
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33"
],
"restart_required": {
"category": "none"
},
"url": "https://kb.cert.org/vuls/id/257161"
}
],
"title": "CVE-2020-11914"
},
{
"cve": "CVE-2020-11896",
"notes": [
{
"category": "description",
"text": "Network Management Card Family - Network Management Card 2 (NMC2), Network Management Card 3 (NMC3)",
"title": "CVE Description"
}
],
"product_status": {
"fixed": [
"34",
"35",
"36",
"37",
"38"
],
"known_affected": [
"1",
"2",
"3",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"19",
"21",
"22",
"23"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platforms. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOS V6.9.6 or \r\nlater. \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"1",
"2",
"3"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC3 platforms. \r\nCustomers are urged to upgrade to \r\napplications using NMC3 AOS V1.4 or \r\nlater.\r\nNote: AOS V1.3.3.1 addressed 14 of \r\nthe 15 CVEs. NMC3 AOS V1.4 \r\naddresses CVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"8",
"9"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"10"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"11",
"12",
"13",
"14",
"15"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"16",
"17"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC1 and NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOSV6.9.6 or \r\nlater or NMC1 AOSv3.9.4 or later\r\n \r\nNote: NMC2 AOS V6.9.2/6.9.4 \r\naddressed 14 of the 15 CVEs. AOS \r\nV6.9.6 addresses CVE-2020-11901.\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"19"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"21"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"22",
"23"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
}
],
"title": "CVE-2020-11896"
},
{
"cve": "CVE-2020-11898",
"notes": [
{
"category": "description",
"text": "Network Management Card Family - Network Management Card 2 (NMC2), Network Management Card 3 (NMC3)",
"title": "CVE Description"
}
],
"product_status": {
"fixed": [
"34",
"35",
"36",
"37",
"38"
],
"known_affected": [
"1",
"2",
"3",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"19",
"21",
"22",
"23"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platforms. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOS V6.9.6 or \r\nlater. \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"1",
"2",
"3"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC3 platforms. \r\nCustomers are urged to upgrade to \r\napplications using NMC3 AOS V1.4 or \r\nlater.\r\nNote: AOS V1.3.3.1 addressed 14 of \r\nthe 15 CVEs. NMC3 AOS V1.4 \r\naddresses CVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"8",
"9"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"10"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"11",
"12",
"13",
"14",
"15"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"16",
"17"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC1 and NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOSV6.9.6 or \r\nlater or NMC1 AOSv3.9.4 or later\r\n \r\nNote: NMC2 AOS V6.9.2/6.9.4 \r\naddressed 14 of the 15 CVEs. AOS \r\nV6.9.6 addresses CVE-2020-11901.\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"19"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"21"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"22",
"23"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
}
],
"title": "CVE-2020-11898"
},
{
"cve": "CVE-2020-11899",
"notes": [
{
"category": "description",
"text": "Network Management Card Family - Network Management Card 2 (NMC2), Network Management Card 3 (NMC3)",
"title": "CVE Description"
}
],
"product_status": {
"fixed": [
"34",
"35",
"36",
"37",
"38"
],
"known_affected": [
"1",
"2",
"3",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"19",
"21",
"22",
"23"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platforms. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOS V6.9.6 or \r\nlater. \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"1",
"2",
"3"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC3 platforms. \r\nCustomers are urged to upgrade to \r\napplications using NMC3 AOS V1.4 or \r\nlater.\r\nNote: AOS V1.3.3.1 addressed 14 of \r\nthe 15 CVEs. NMC3 AOS V1.4 \r\naddresses CVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"8",
"9"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"10"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"11",
"12",
"13",
"14",
"15"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"16",
"17"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC1 and NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using NMC2 AOSV6.9.6 or \r\nlater or NMC1 AOSv3.9.4 or later\r\n \r\nNote: NMC2 AOS V6.9.2/6.9.4 \r\naddressed 14 of the 15 CVEs. AOS \r\nV6.9.6 addresses CVE-2020-11901.\r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"19"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbeen released for applications running \r\non the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/\r\n",
"product_ids": [
"21"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
},
{
"category": "vendor_fix",
"details": "Patches for the vulnerabilities have \r\nbegun being released for applications \r\nrunning on the NMC2 platform. \r\nCustomers are urged to upgrade to \r\napplications using AOSV6.9.6 or later.\r\n \r\nNote: AOS V6.9.2/6.9.4 addressed 14 \r\nof the 15 CVEs. AOS V6.9.6 addresses \r\nCVE-2020-11901. \r\nRefer to this link for the latest \r\ninformation on application patch \r\navailability: \r\nhttps://www.apc.com/us/en/faqs/FA410359/",
"product_ids": [
"22",
"23"
],
"restart_required": {
"category": "none"
},
"url": "https://www.apc.com/us/en/faqs/FA410359/"
}
],
"title": "CVE-2020-11913"
}
]
}
WID-SEC-W-2023-0683
Vulnerability from csaf_certbund - Published: 2020-06-16 22:00 - Updated: 2023-03-19 23:00Notes
{
"document": {
"aggregate_severity": {
"text": "kritisch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Das BIOS ist die Firmware bei IBM PC kompatiblen Computern.\r\nHP Laserjet ist die Laserdrucker-Produktreihe des Herstellers Hewlett Packard.\r\nDie Server Firmware stellt die Software-Grundbetriebskomponenten f\u00fcr Mainboards bereit.\r\nFreeFlow-Druckserver ist eine Druckserveranwendung f\u00fcr Xerox-Produktionsdrucker, die Flexibilit\u00e4t, umfangreiche Workflow-Optionen und eine Farbverwaltung bietet.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Produkten, die die Treck TCP/IP-Stack-Bibliothek verwenden, ausnutzen, um beliebigen Programmcode auszuf\u00fchren oder einen Denial of Service Zustand herbeizuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- UNIX\n- Linux\n- MacOS X\n- Windows\n- BIOS/Firmware\n- Sonstiges\n- Hardware Appliance\n- Appliance",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-0683 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2020/wid-sec-w-2023-0683.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-0683 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0683"
},
{
"category": "external",
"summary": "EATON Security Bulletin ETN-SB-2020-1008 vom 2023-03-17",
"url": "https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/ETN-SB-2020-1008.pdf"
},
{
"category": "external",
"summary": "HPE Security Bulletins",
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbhf04103en_us"
},
{
"category": "external",
"summary": "Report auf Jsof-Tech.com vom 2020-06-16",
"url": "https://www.jsof-tech.com/ripple20/"
},
{
"category": "external",
"summary": "Intel Security Advisory:INTEL-SA-00295 vom 2020-06-16",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
},
{
"category": "external",
"summary": "HP Security Bulletin HPSBPI03666 rev. 1 vom 2020-06-16",
"url": "https://support.hp.com/emea_africa-en/document/c06640149"
},
{
"category": "external",
"summary": "Schneider Electric Security Bulletin SESB-2020-168-01 vom 2020-06-16",
"url": "https://www.se.com/ww/en/download/document/SESB-2020-168-01/"
},
{
"category": "external",
"summary": "ICS-Advisorys des Departments of Homeland Security vom 2020-06-16",
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-168-01"
},
{
"category": "external",
"summary": "KB-Cert Vulnerability Note VU#257161 vom 2020-06-16",
"url": "https://www.kb.cert.org/vuls/id/257161"
},
{
"category": "external",
"summary": "Xerox Security Bulletin XRX20J vom 2020-06-16",
"url": "https://security.business.xerox.com/wp-content/uploads/2020/06/cert_Security_Mini_Bulletin_XRX20J_for_B2XX.pdf"
},
{
"category": "external",
"summary": "Cisco Security Advisory CISCO-SA-TRECK-IP-STACK-JYBQ5GYC vom 2020-06-17",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC"
},
{
"category": "external",
"summary": "EMC Security Advisory SLN321836 vom 2020-06-22",
"url": "https://www.dell.com/support/article/sln321836/dell-response-to-the-ripple20-vulnerabilities?lang=en"
},
{
"category": "external",
"summary": "Aruba Product Security Advisory",
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt"
},
{
"category": "external",
"summary": "EMC Security Advisory DSA-2020-150 vom 2020-06-25",
"url": "https://www.dell.com/support/article/sln321835/dsa-2020-150-dell-client-platform-security-update-for-treck-tcp-ip-stack-vulnerabilities-in-teradici-firmware-and-remote-workstation-cards?lang=en"
},
{
"category": "external",
"summary": "Palo Alto Networks Security Advisory PAN-SA-2020-0007 vom 2020-07-08",
"url": "https://security.paloaltonetworks.com/PAN-SA-2020-0007"
},
{
"category": "external",
"summary": "HPE SECURITY BULLETIN HPESBHF04012 rev.1 vom 2020-07-13",
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbhf04012en_us"
},
{
"category": "external",
"summary": "HPE SECURITY BULLETIN HPESBHF04012 rev.2 vom 2020-08-14",
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbhf04012en_us"
},
{
"category": "external",
"summary": "HPE Security Bulletin hpesbhf04021en_us vom 2020-10-06",
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbhf04021en_us"
},
{
"category": "external",
"summary": "EMC Security Advisory DSA-2020-206 vom 2021-02-24",
"url": "https://www.dell.com/support/kbdoc/de-de/000125440/dsa-2020-206-dell-client-platform-security-update-for-treck-tcp-ip-stack-vulnerabilities-in-teradici-firmware-and-remote-workstation-cards"
}
],
"source_lang": "en-US",
"title": "Treck TCP/IP-Stack: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2023-03-19T23:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:46:53.196+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2023-0683",
"initial_release_date": "2020-06-16T22:00:00.000+00:00",
"revision_history": [
{
"date": "2020-06-16T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2020-06-17T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Cisco aufgenommen"
},
{
"date": "2020-06-21T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von EMC aufgenommen"
},
{
"date": "2020-06-23T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2020-06-24T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von EMC aufgenommen"
},
{
"date": "2020-07-08T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Informationen von Palo Alto Networks aufgenommen"
},
{
"date": "2020-07-14T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von HPE aufgenommen"
},
{
"date": "2020-08-17T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von HPE aufgenommen"
},
{
"date": "2020-10-07T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von HPE aufgenommen"
},
{
"date": "2021-02-23T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von DELL aufgenommen"
},
{
"date": "2021-03-25T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von HP aufgenommen"
},
{
"date": "2023-03-19T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von EATON aufgenommen"
}
],
"status": "final",
"version": "12"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Aruba ArubaOS",
"product": {
"name": "Aruba ArubaOS",
"product_id": "T016785",
"product_identification_helper": {
"cpe": "cpe:/o:arubanetworks:arubaos:-"
}
}
},
{
"category": "product_name",
"name": "Aruba Switch",
"product": {
"name": "Aruba Switch",
"product_id": "T016786",
"product_identification_helper": {
"cpe": "cpe:/h:arubanetworks:switch:-"
}
}
}
],
"category": "vendor",
"name": "Aruba"
},
{
"branches": [
{
"category": "product_name",
"name": "Cisco Router",
"product": {
"name": "Cisco Router",
"product_id": "T003258",
"product_identification_helper": {
"cpe": "cpe:/h:cisco:router:-"
}
}
}
],
"category": "vendor",
"name": "Cisco"
},
{
"branches": [
{
"category": "product_name",
"name": "Dell Computer",
"product": {
"name": "Dell Computer",
"product_id": "T006498",
"product_identification_helper": {
"cpe": "cpe:/o:dell:dell_computer:-"
}
}
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"category": "product_name",
"name": "Eaton UPS",
"product": {
"name": "Eaton UPS",
"product_id": "T026792",
"product_identification_helper": {
"cpe": "cpe:/h:eaton:ups:-"
}
}
}
],
"category": "vendor",
"name": "Eaton"
},
{
"branches": [
{
"category": "product_name",
"name": "HP LaserJet",
"product": {
"name": "HP LaserJet",
"product_id": "T016741",
"product_identification_helper": {
"cpe": "cpe:/h:hp:laserjet:-"
}
}
}
],
"category": "vendor",
"name": "HP"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "HPE Integrated Lights-Out 3",
"product": {
"name": "HPE Integrated Lights-Out 3",
"product_id": "T012638",
"product_identification_helper": {
"cpe": "cpe:/h:hp:integrated_lights-out:3"
}
}
},
{
"category": "product_name",
"name": "HPE Integrated Lights-Out 5",
"product": {
"name": "HPE Integrated Lights-Out 5",
"product_id": "T012756",
"product_identification_helper": {
"cpe": "cpe:/h:hp:integrated_lights-out:5"
}
}
}
],
"category": "product_name",
"name": "Integrated Lights-Out"
},
{
"category": "product_name",
"name": "HPE ProLiant",
"product": {
"name": "HPE ProLiant",
"product_id": "T009310",
"product_identification_helper": {
"cpe": "cpe:/h:hp:proliant:-"
}
}
}
],
"category": "vendor",
"name": "HPE"
},
{
"branches": [
{
"category": "product_name",
"name": "Intel BIOS",
"product": {
"name": "Intel BIOS",
"product_id": "T016742",
"product_identification_helper": {
"cpe": "cpe:/h:intel:bios:-"
}
}
},
{
"category": "product_name",
"name": "Intel Server Firmware",
"product": {
"name": "Intel Server Firmware",
"product_id": "T004050",
"product_identification_helper": {
"cpe": "cpe:/h:intel:server_firmware:-"
}
}
}
],
"category": "vendor",
"name": "Intel"
},
{
"branches": [
{
"category": "product_name",
"name": "PaloAlto Networks PAN-OS",
"product": {
"name": "PaloAlto Networks PAN-OS",
"product_id": "T012790",
"product_identification_helper": {
"cpe": "cpe:/o:paloaltonetworks:pan-os:-"
}
}
}
],
"category": "vendor",
"name": "PaloAlto Networks"
},
{
"branches": [
{
"category": "product_name",
"name": "Xerox FreeFlow Print Server",
"product": {
"name": "Xerox FreeFlow Print Server",
"product_id": "T016743",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:-"
}
}
}
],
"category": "vendor",
"name": "Xerox"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-11896",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in Produkten, die eine TCP/IP-Stack-Bibliothek des Herstellers Treck verwenden. Die Schwachstellen werden gesammelt als \"Ripple20\" bezeichnet und betreffen Produkte aus verschiedensten Sektoren. Die Schwachstellen bestehen aufgrund einer fehlerhaften Behandlung von Inkonsistenzen bei L\u00e4ngenparametern, einer unsachgem\u00e4\u00dfen Eingabevalidierung, Double Free-Fehlern, Out-of-Bounds-Lese-Fehlern, Integer-\u00dcberlaufen oder Wraparounds, einer unsachgem\u00e4\u00dfen Null-Terminierung, sowie einer unsachgem\u00e4\u00dfen Zugriffskontrolle. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren oder einen Denial of Service Zustand herzustellen."
}
],
"product_status": {
"known_affected": [
"T006498",
"T012638",
"T012756",
"T003258",
"T016743",
"T016742",
"T016786",
"T016741",
"T016785",
"T012790",
"T004050",
"T009310",
"T026792"
]
},
"release_date": "2020-06-16T22:00:00.000+00:00",
"title": "CVE-2020-11896"
},
{
"cve": "CVE-2020-11897",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in Produkten, die eine TCP/IP-Stack-Bibliothek des Herstellers Treck verwenden. Die Schwachstellen werden gesammelt als \"Ripple20\" bezeichnet und betreffen Produkte aus verschiedensten Sektoren. Die Schwachstellen bestehen aufgrund einer fehlerhaften Behandlung von Inkonsistenzen bei L\u00e4ngenparametern, einer unsachgem\u00e4\u00dfen Eingabevalidierung, Double Free-Fehlern, Out-of-Bounds-Lese-Fehlern, Integer-\u00dcberlaufen oder Wraparounds, einer unsachgem\u00e4\u00dfen Null-Terminierung, sowie einer unsachgem\u00e4\u00dfen Zugriffskontrolle. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren oder einen Denial of Service Zustand herzustellen."
}
],
"product_status": {
"known_affected": [
"T006498",
"T012638",
"T012756",
"T003258",
"T016743",
"T016742",
"T016786",
"T016741",
"T016785",
"T012790",
"T004050",
"T009310",
"T026792"
]
},
"release_date": "2020-06-16T22:00:00.000+00:00",
"title": "CVE-2020-11897"
},
{
"cve": "CVE-2020-11898",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in Produkten, die eine TCP/IP-Stack-Bibliothek des Herstellers Treck verwenden. Die Schwachstellen werden gesammelt als \"Ripple20\" bezeichnet und betreffen Produkte aus verschiedensten Sektoren. Die Schwachstellen bestehen aufgrund einer fehlerhaften Behandlung von Inkonsistenzen bei L\u00e4ngenparametern, einer unsachgem\u00e4\u00dfen Eingabevalidierung, Double Free-Fehlern, Out-of-Bounds-Lese-Fehlern, Integer-\u00dcberlaufen oder Wraparounds, einer unsachgem\u00e4\u00dfen Null-Terminierung, sowie einer unsachgem\u00e4\u00dfen Zugriffskontrolle. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren oder einen Denial of Service Zustand herzustellen."
}
],
"product_status": {
"known_affected": [
"T006498",
"T012638",
"T012756",
"T003258",
"T016743",
"T016742",
"T016786",
"T016741",
"T016785",
"T012790",
"T004050",
"T009310",
"T026792"
]
},
"release_date": "2020-06-16T22:00:00.000+00:00",
"title": "CVE-2020-11898"
},
{
"cve": "CVE-2020-11899",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in Produkten, die eine TCP/IP-Stack-Bibliothek des Herstellers Treck verwenden. Die Schwachstellen werden gesammelt als \"Ripple20\" bezeichnet und betreffen Produkte aus verschiedensten Sektoren. Die Schwachstellen bestehen aufgrund einer fehlerhaften Behandlung von Inkonsistenzen bei L\u00e4ngenparametern, einer unsachgem\u00e4\u00dfen Eingabevalidierung, Double Free-Fehlern, Out-of-Bounds-Lese-Fehlern, Integer-\u00dcberlaufen oder Wraparounds, einer unsachgem\u00e4\u00dfen Null-Terminierung, sowie einer unsachgem\u00e4\u00dfen Zugriffskontrolle. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren oder einen Denial of Service Zustand herzustellen."
}
],
"product_status": {
"known_affected": [
"T006498",
"T012638",
"T012756",
"T003258",
"T016743",
"T016742",
"T016786",
"T016741",
"T016785",
"T012790",
"T004050",
"T009310",
"T026792"
]
},
"release_date": "2020-06-16T22:00:00.000+00:00",
"title": "CVE-2020-11899"
},
{
"cve": "CVE-2020-11900",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in Produkten, die eine TCP/IP-Stack-Bibliothek des Herstellers Treck verwenden. Die Schwachstellen werden gesammelt als \"Ripple20\" bezeichnet und betreffen Produkte aus verschiedensten Sektoren. Die Schwachstellen bestehen aufgrund einer fehlerhaften Behandlung von Inkonsistenzen bei L\u00e4ngenparametern, einer unsachgem\u00e4\u00dfen Eingabevalidierung, Double Free-Fehlern, Out-of-Bounds-Lese-Fehlern, Integer-\u00dcberlaufen oder Wraparounds, einer unsachgem\u00e4\u00dfen Null-Terminierung, sowie einer unsachgem\u00e4\u00dfen Zugriffskontrolle. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren oder einen Denial of Service Zustand herzustellen."
}
],
"product_status": {
"known_affected": [
"T006498",
"T012638",
"T012756",
"T003258",
"T016743",
"T016742",
"T016786",
"T016741",
"T016785",
"T012790",
"T004050",
"T009310",
"T026792"
]
},
"release_date": "2020-06-16T22:00:00.000+00:00",
"title": "CVE-2020-11900"
},
{
"cve": "CVE-2020-11901",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in Produkten, die eine TCP/IP-Stack-Bibliothek des Herstellers Treck verwenden. Die Schwachstellen werden gesammelt als \"Ripple20\" bezeichnet und betreffen Produkte aus verschiedensten Sektoren. Die Schwachstellen bestehen aufgrund einer fehlerhaften Behandlung von Inkonsistenzen bei L\u00e4ngenparametern, einer unsachgem\u00e4\u00dfen Eingabevalidierung, Double Free-Fehlern, Out-of-Bounds-Lese-Fehlern, Integer-\u00dcberlaufen oder Wraparounds, einer unsachgem\u00e4\u00dfen Null-Terminierung, sowie einer unsachgem\u00e4\u00dfen Zugriffskontrolle. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren oder einen Denial of Service Zustand herzustellen."
}
],
"product_status": {
"known_affected": [
"T006498",
"T012638",
"T012756",
"T003258",
"T016743",
"T016742",
"T016786",
"T016741",
"T016785",
"T012790",
"T004050",
"T009310",
"T026792"
]
},
"release_date": "2020-06-16T22:00:00.000+00:00",
"title": "CVE-2020-11901"
},
{
"cve": "CVE-2020-11902",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in Produkten, die eine TCP/IP-Stack-Bibliothek des Herstellers Treck verwenden. Die Schwachstellen werden gesammelt als \"Ripple20\" bezeichnet und betreffen Produkte aus verschiedensten Sektoren. Die Schwachstellen bestehen aufgrund einer fehlerhaften Behandlung von Inkonsistenzen bei L\u00e4ngenparametern, einer unsachgem\u00e4\u00dfen Eingabevalidierung, Double Free-Fehlern, Out-of-Bounds-Lese-Fehlern, Integer-\u00dcberlaufen oder Wraparounds, einer unsachgem\u00e4\u00dfen Null-Terminierung, sowie einer unsachgem\u00e4\u00dfen Zugriffskontrolle. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren oder einen Denial of Service Zustand herzustellen."
}
],
"product_status": {
"known_affected": [
"T006498",
"T012638",
"T012756",
"T003258",
"T016743",
"T016742",
"T016786",
"T016741",
"T016785",
"T012790",
"T004050",
"T009310",
"T026792"
]
},
"release_date": "2020-06-16T22:00:00.000+00:00",
"title": "CVE-2020-11902"
},
{
"cve": "CVE-2020-11903",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in Produkten, die eine TCP/IP-Stack-Bibliothek des Herstellers Treck verwenden. Die Schwachstellen werden gesammelt als \"Ripple20\" bezeichnet und betreffen Produkte aus verschiedensten Sektoren. Die Schwachstellen bestehen aufgrund einer fehlerhaften Behandlung von Inkonsistenzen bei L\u00e4ngenparametern, einer unsachgem\u00e4\u00dfen Eingabevalidierung, Double Free-Fehlern, Out-of-Bounds-Lese-Fehlern, Integer-\u00dcberlaufen oder Wraparounds, einer unsachgem\u00e4\u00dfen Null-Terminierung, sowie einer unsachgem\u00e4\u00dfen Zugriffskontrolle. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren oder einen Denial of Service Zustand herzustellen."
}
],
"product_status": {
"known_affected": [
"T006498",
"T012638",
"T012756",
"T003258",
"T016743",
"T016742",
"T016786",
"T016741",
"T016785",
"T012790",
"T004050",
"T009310",
"T026792"
]
},
"release_date": "2020-06-16T22:00:00.000+00:00",
"title": "CVE-2020-11903"
},
{
"cve": "CVE-2020-11904",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in Produkten, die eine TCP/IP-Stack-Bibliothek des Herstellers Treck verwenden. Die Schwachstellen werden gesammelt als \"Ripple20\" bezeichnet und betreffen Produkte aus verschiedensten Sektoren. Die Schwachstellen bestehen aufgrund einer fehlerhaften Behandlung von Inkonsistenzen bei L\u00e4ngenparametern, einer unsachgem\u00e4\u00dfen Eingabevalidierung, Double Free-Fehlern, Out-of-Bounds-Lese-Fehlern, Integer-\u00dcberlaufen oder Wraparounds, einer unsachgem\u00e4\u00dfen Null-Terminierung, sowie einer unsachgem\u00e4\u00dfen Zugriffskontrolle. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren oder einen Denial of Service Zustand herzustellen."
}
],
"product_status": {
"known_affected": [
"T006498",
"T012638",
"T012756",
"T003258",
"T016743",
"T016742",
"T016786",
"T016741",
"T016785",
"T012790",
"T004050",
"T009310",
"T026792"
]
},
"release_date": "2020-06-16T22:00:00.000+00:00",
"title": "CVE-2020-11904"
},
{
"cve": "CVE-2020-11905",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in Produkten, die eine TCP/IP-Stack-Bibliothek des Herstellers Treck verwenden. Die Schwachstellen werden gesammelt als \"Ripple20\" bezeichnet und betreffen Produkte aus verschiedensten Sektoren. Die Schwachstellen bestehen aufgrund einer fehlerhaften Behandlung von Inkonsistenzen bei L\u00e4ngenparametern, einer unsachgem\u00e4\u00dfen Eingabevalidierung, Double Free-Fehlern, Out-of-Bounds-Lese-Fehlern, Integer-\u00dcberlaufen oder Wraparounds, einer unsachgem\u00e4\u00dfen Null-Terminierung, sowie einer unsachgem\u00e4\u00dfen Zugriffskontrolle. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren oder einen Denial of Service Zustand herzustellen."
}
],
"product_status": {
"known_affected": [
"T006498",
"T012638",
"T012756",
"T003258",
"T016743",
"T016742",
"T016786",
"T016741",
"T016785",
"T012790",
"T004050",
"T009310",
"T026792"
]
},
"release_date": "2020-06-16T22:00:00.000+00:00",
"title": "CVE-2020-11905"
},
{
"cve": "CVE-2020-11906",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in Produkten, die eine TCP/IP-Stack-Bibliothek des Herstellers Treck verwenden. Die Schwachstellen werden gesammelt als \"Ripple20\" bezeichnet und betreffen Produkte aus verschiedensten Sektoren. Die Schwachstellen bestehen aufgrund einer fehlerhaften Behandlung von Inkonsistenzen bei L\u00e4ngenparametern, einer unsachgem\u00e4\u00dfen Eingabevalidierung, Double Free-Fehlern, Out-of-Bounds-Lese-Fehlern, Integer-\u00dcberlaufen oder Wraparounds, einer unsachgem\u00e4\u00dfen Null-Terminierung, sowie einer unsachgem\u00e4\u00dfen Zugriffskontrolle. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren oder einen Denial of Service Zustand herzustellen."
}
],
"product_status": {
"known_affected": [
"T006498",
"T012638",
"T012756",
"T003258",
"T016743",
"T016742",
"T016786",
"T016741",
"T016785",
"T012790",
"T004050",
"T009310",
"T026792"
]
},
"release_date": "2020-06-16T22:00:00.000+00:00",
"title": "CVE-2020-11906"
},
{
"cve": "CVE-2020-11907",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in Produkten, die eine TCP/IP-Stack-Bibliothek des Herstellers Treck verwenden. Die Schwachstellen werden gesammelt als \"Ripple20\" bezeichnet und betreffen Produkte aus verschiedensten Sektoren. Die Schwachstellen bestehen aufgrund einer fehlerhaften Behandlung von Inkonsistenzen bei L\u00e4ngenparametern, einer unsachgem\u00e4\u00dfen Eingabevalidierung, Double Free-Fehlern, Out-of-Bounds-Lese-Fehlern, Integer-\u00dcberlaufen oder Wraparounds, einer unsachgem\u00e4\u00dfen Null-Terminierung, sowie einer unsachgem\u00e4\u00dfen Zugriffskontrolle. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren oder einen Denial of Service Zustand herzustellen."
}
],
"product_status": {
"known_affected": [
"T006498",
"T012638",
"T012756",
"T003258",
"T016743",
"T016742",
"T016786",
"T016741",
"T016785",
"T012790",
"T004050",
"T009310",
"T026792"
]
},
"release_date": "2020-06-16T22:00:00.000+00:00",
"title": "CVE-2020-11907"
},
{
"cve": "CVE-2020-11908",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in Produkten, die eine TCP/IP-Stack-Bibliothek des Herstellers Treck verwenden. Die Schwachstellen werden gesammelt als \"Ripple20\" bezeichnet und betreffen Produkte aus verschiedensten Sektoren. Die Schwachstellen bestehen aufgrund einer fehlerhaften Behandlung von Inkonsistenzen bei L\u00e4ngenparametern, einer unsachgem\u00e4\u00dfen Eingabevalidierung, Double Free-Fehlern, Out-of-Bounds-Lese-Fehlern, Integer-\u00dcberlaufen oder Wraparounds, einer unsachgem\u00e4\u00dfen Null-Terminierung, sowie einer unsachgem\u00e4\u00dfen Zugriffskontrolle. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren oder einen Denial of Service Zustand herzustellen."
}
],
"product_status": {
"known_affected": [
"T006498",
"T012638",
"T012756",
"T003258",
"T016743",
"T016742",
"T016786",
"T016741",
"T016785",
"T012790",
"T004050",
"T009310",
"T026792"
]
},
"release_date": "2020-06-16T22:00:00.000+00:00",
"title": "CVE-2020-11908"
},
{
"cve": "CVE-2020-11909",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in Produkten, die eine TCP/IP-Stack-Bibliothek des Herstellers Treck verwenden. Die Schwachstellen werden gesammelt als \"Ripple20\" bezeichnet und betreffen Produkte aus verschiedensten Sektoren. Die Schwachstellen bestehen aufgrund einer fehlerhaften Behandlung von Inkonsistenzen bei L\u00e4ngenparametern, einer unsachgem\u00e4\u00dfen Eingabevalidierung, Double Free-Fehlern, Out-of-Bounds-Lese-Fehlern, Integer-\u00dcberlaufen oder Wraparounds, einer unsachgem\u00e4\u00dfen Null-Terminierung, sowie einer unsachgem\u00e4\u00dfen Zugriffskontrolle. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren oder einen Denial of Service Zustand herzustellen."
}
],
"product_status": {
"known_affected": [
"T006498",
"T012638",
"T012756",
"T003258",
"T016743",
"T016742",
"T016786",
"T016741",
"T016785",
"T012790",
"T004050",
"T009310",
"T026792"
]
},
"release_date": "2020-06-16T22:00:00.000+00:00",
"title": "CVE-2020-11909"
},
{
"cve": "CVE-2020-11910",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in Produkten, die eine TCP/IP-Stack-Bibliothek des Herstellers Treck verwenden. Die Schwachstellen werden gesammelt als \"Ripple20\" bezeichnet und betreffen Produkte aus verschiedensten Sektoren. Die Schwachstellen bestehen aufgrund einer fehlerhaften Behandlung von Inkonsistenzen bei L\u00e4ngenparametern, einer unsachgem\u00e4\u00dfen Eingabevalidierung, Double Free-Fehlern, Out-of-Bounds-Lese-Fehlern, Integer-\u00dcberlaufen oder Wraparounds, einer unsachgem\u00e4\u00dfen Null-Terminierung, sowie einer unsachgem\u00e4\u00dfen Zugriffskontrolle. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren oder einen Denial of Service Zustand herzustellen."
}
],
"product_status": {
"known_affected": [
"T006498",
"T012638",
"T012756",
"T003258",
"T016743",
"T016742",
"T016786",
"T016741",
"T016785",
"T012790",
"T004050",
"T009310",
"T026792"
]
},
"release_date": "2020-06-16T22:00:00.000+00:00",
"title": "CVE-2020-11910"
},
{
"cve": "CVE-2020-11911",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in Produkten, die eine TCP/IP-Stack-Bibliothek des Herstellers Treck verwenden. Die Schwachstellen werden gesammelt als \"Ripple20\" bezeichnet und betreffen Produkte aus verschiedensten Sektoren. Die Schwachstellen bestehen aufgrund einer fehlerhaften Behandlung von Inkonsistenzen bei L\u00e4ngenparametern, einer unsachgem\u00e4\u00dfen Eingabevalidierung, Double Free-Fehlern, Out-of-Bounds-Lese-Fehlern, Integer-\u00dcberlaufen oder Wraparounds, einer unsachgem\u00e4\u00dfen Null-Terminierung, sowie einer unsachgem\u00e4\u00dfen Zugriffskontrolle. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren oder einen Denial of Service Zustand herzustellen."
}
],
"product_status": {
"known_affected": [
"T006498",
"T012638",
"T012756",
"T003258",
"T016743",
"T016742",
"T016786",
"T016741",
"T016785",
"T012790",
"T004050",
"T009310",
"T026792"
]
},
"release_date": "2020-06-16T22:00:00.000+00:00",
"title": "CVE-2020-11911"
},
{
"cve": "CVE-2020-11912",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in Produkten, die eine TCP/IP-Stack-Bibliothek des Herstellers Treck verwenden. Die Schwachstellen werden gesammelt als \"Ripple20\" bezeichnet und betreffen Produkte aus verschiedensten Sektoren. Die Schwachstellen bestehen aufgrund einer fehlerhaften Behandlung von Inkonsistenzen bei L\u00e4ngenparametern, einer unsachgem\u00e4\u00dfen Eingabevalidierung, Double Free-Fehlern, Out-of-Bounds-Lese-Fehlern, Integer-\u00dcberlaufen oder Wraparounds, einer unsachgem\u00e4\u00dfen Null-Terminierung, sowie einer unsachgem\u00e4\u00dfen Zugriffskontrolle. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren oder einen Denial of Service Zustand herzustellen."
}
],
"product_status": {
"known_affected": [
"T006498",
"T012638",
"T012756",
"T003258",
"T016743",
"T016742",
"T016786",
"T016741",
"T016785",
"T012790",
"T004050",
"T009310",
"T026792"
]
},
"release_date": "2020-06-16T22:00:00.000+00:00",
"title": "CVE-2020-11912"
},
{
"cve": "CVE-2020-11913",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in Produkten, die eine TCP/IP-Stack-Bibliothek des Herstellers Treck verwenden. Die Schwachstellen werden gesammelt als \"Ripple20\" bezeichnet und betreffen Produkte aus verschiedensten Sektoren. Die Schwachstellen bestehen aufgrund einer fehlerhaften Behandlung von Inkonsistenzen bei L\u00e4ngenparametern, einer unsachgem\u00e4\u00dfen Eingabevalidierung, Double Free-Fehlern, Out-of-Bounds-Lese-Fehlern, Integer-\u00dcberlaufen oder Wraparounds, einer unsachgem\u00e4\u00dfen Null-Terminierung, sowie einer unsachgem\u00e4\u00dfen Zugriffskontrolle. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren oder einen Denial of Service Zustand herzustellen."
}
],
"product_status": {
"known_affected": [
"T006498",
"T012638",
"T012756",
"T003258",
"T016743",
"T016742",
"T016786",
"T016741",
"T016785",
"T012790",
"T004050",
"T009310",
"T026792"
]
},
"release_date": "2020-06-16T22:00:00.000+00:00",
"title": "CVE-2020-11913"
},
{
"cve": "CVE-2020-11914",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in Produkten, die eine TCP/IP-Stack-Bibliothek des Herstellers Treck verwenden. Die Schwachstellen werden gesammelt als \"Ripple20\" bezeichnet und betreffen Produkte aus verschiedensten Sektoren. Die Schwachstellen bestehen aufgrund einer fehlerhaften Behandlung von Inkonsistenzen bei L\u00e4ngenparametern, einer unsachgem\u00e4\u00dfen Eingabevalidierung, Double Free-Fehlern, Out-of-Bounds-Lese-Fehlern, Integer-\u00dcberlaufen oder Wraparounds, einer unsachgem\u00e4\u00dfen Null-Terminierung, sowie einer unsachgem\u00e4\u00dfen Zugriffskontrolle. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren oder einen Denial of Service Zustand herzustellen."
}
],
"product_status": {
"known_affected": [
"T006498",
"T012638",
"T012756",
"T003258",
"T016743",
"T016742",
"T016786",
"T016741",
"T016785",
"T012790",
"T004050",
"T009310",
"T026792"
]
},
"release_date": "2020-06-16T22:00:00.000+00:00",
"title": "CVE-2020-11914"
}
]
}
GSD-2020-11901
Vulnerability from gsd - Updated: 2023-12-13 01:22{
"GSD": {
"alias": "CVE-2020-11901",
"description": "The Treck TCP/IP stack before 6.0.1.66 allows Remote Code execution via a single invalid DNS response.",
"id": "GSD-2020-11901",
"references": [
"https://www.suse.com/security/cve/CVE-2020-11901.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2020-11901"
],
"details": "The Treck TCP/IP stack before 6.0.1.66 allows Remote Code execution via a single invalid DNS response.",
"id": "GSD-2020-11901",
"modified": "2023-12-13T01:22:08.302336Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2020-11901",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Treck TCP/IP stack before 6.0.1.66 allows Remote Code execution via a single invalid DNS response."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.kb.cert.org/vuls/id/257161/",
"refsource": "MISC",
"url": "https://www.kb.cert.org/vuls/id/257161/"
},
{
"name": "https://www.treck.com",
"refsource": "MISC",
"url": "https://www.treck.com"
},
{
"name": "https://jsof-tech.com/vulnerability-disclosure-policy/",
"refsource": "MISC",
"url": "https://jsof-tech.com/vulnerability-disclosure-policy/"
},
{
"name": "VU#257161",
"refsource": "CERT-VN",
"url": "https://www.kb.cert.org/vuls/id/257161"
},
{
"name": "https://www.jsof-tech.com/ripple20/",
"refsource": "MISC",
"url": "https://www.jsof-tech.com/ripple20/"
},
{
"name": "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC"
},
{
"name": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
"refsource": "CONFIRM",
"url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt"
},
{
"name": "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
"refsource": "MISC",
"url": "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:treck:tcp\\/ip:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "6.0.1.66",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2020-11901"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "The Treck TCP/IP stack before 6.0.1.66 allows Remote Code execution via a single invalid DNS response."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-125"
},
{
"lang": "en",
"value": "CWE-787"
},
{
"lang": "en",
"value": "CWE-330"
},
{
"lang": "en",
"value": "CWE-131"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.treck.com",
"refsource": "MISC",
"tags": [
"Product",
"Vendor Advisory"
],
"url": "https://www.treck.com"
},
{
"name": "https://jsof-tech.com/vulnerability-disclosure-policy/",
"refsource": "MISC",
"tags": [
"Third Party Advisory"
],
"url": "https://jsof-tech.com/vulnerability-disclosure-policy/"
},
{
"name": "https://www.jsof-tech.com/ripple20/",
"refsource": "MISC",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://www.jsof-tech.com/ripple20/"
},
{
"name": "https://www.kb.cert.org/vuls/id/257161/",
"refsource": "MISC",
"tags": [
"Mitigation",
"Third Party Advisory",
"US Government Resource"
],
"url": "https://www.kb.cert.org/vuls/id/257161/"
},
{
"name": "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
"refsource": "CISCO",
"tags": [
"Third Party Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC"
},
{
"name": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt"
},
{
"name": "VU#257161",
"refsource": "CERT-VN",
"tags": [],
"url": "https://www.kb.cert.org/vuls/id/257161"
},
{
"name": "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
"refsource": "MISC",
"tags": [],
"url": "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 6.0
}
},
"lastModifiedDate": "2021-07-21T11:39Z",
"publishedDate": "2020-06-17T11:15Z"
}
}
}
FKIE_CVE-2020-11901
Vulnerability from fkie_nvd - Published: 2020-06-17 11:15 - Updated: 2024-11-21 04:58{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:treck:tcp\\/ip:*:*:*:*:*:*:*:*",
"matchCriteriaId": "51F9D0DF-D9F0-4183-AC07-C799EFFE36C8",
"versionEndExcluding": "6.0.1.66",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Treck TCP/IP stack before 6.0.1.66 allows Remote Code execution via a single invalid DNS response."
},
{
"lang": "es",
"value": "La pila Treck TCP/IP versiones anteriores a 6.0.1.66, permite Una ejecuci\u00f3n de C\u00f3digo Remota por medio de una respuesta DNS no v\u00e1lida \u00fanica"
}
],
"id": "CVE-2020-11901",
"lastModified": "2024-11-21T04:58:51.653",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 6.0,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2020-06-17T11:15:10.350",
"references": [
{
"source": "cve@mitre.org",
"url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://jsof-tech.com/vulnerability-disclosure-policy/"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC"
},
{
"source": "cve@mitre.org",
"url": "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://www.jsof-tech.com/ripple20/"
},
{
"source": "cve@mitre.org",
"url": "https://www.kb.cert.org/vuls/id/257161"
},
{
"source": "cve@mitre.org",
"tags": [
"Mitigation",
"Third Party Advisory",
"US Government Resource"
],
"url": "https://www.kb.cert.org/vuls/id/257161/"
},
{
"source": "cve@mitre.org",
"tags": [
"Product",
"Vendor Advisory"
],
"url": "https://www.treck.com"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://jsof-tech.com/vulnerability-disclosure-policy/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://www.jsof-tech.com/ripple20/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.kb.cert.org/vuls/id/257161"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Third Party Advisory",
"US Government Resource"
],
"url": "https://www.kb.cert.org/vuls/id/257161/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product",
"Vendor Advisory"
],
"url": "https://www.treck.com"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-125"
},
{
"lang": "en",
"value": "CWE-131"
},
{
"lang": "en",
"value": "CWE-330"
},
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
ICSA-20-168-01
Vulnerability from csaf_cisa - Published: 2020-06-16 06:00 - Updated: 2024-09-19 06:00Notes
{
"document": {
"acknowledgments": [
{
"names": [
"Shlomi Oberman",
"Moshe Kol"
],
"organization": "JSOF",
"summary": "reporting these vulnerabilities to CERT/CC"
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "summary",
"text": "Successful exploitation of these vulnerabilities may allow remote code execution or exposure of sensitive information.",
"title": "Risk evaluation"
},
{
"category": "other",
"text": "Energy, Critical Manufacturing, Information Technology, Healthcare and Public Health, Transportation Systems",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "United States",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities, such as:",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolating them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as virtual private networks (VPNs). Recognize VPNs may have vulnerabilities, should be updated to the most recent version available, and are only as secure as the connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "No known public exploitation specifically targeting these vulnerabilities has been reported to CISA at this time. This vulnerability has a high attack complexity.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "ICS Advisory ICSA-20-168-01 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2020/icsa-20-168-01.json"
},
{
"category": "self",
"summary": "ICSA Advisory ICSA-20-168-01 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-20-168-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/sites/default/files/publications/emailscams0905.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ncas/tips/ST04-014"
}
],
"title": "Treck TCP/IP (Update I)",
"tracking": {
"current_release_date": "2024-09-19T06:00:00.000000Z",
"generator": {
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-20-168-01",
"initial_release_date": "2020-06-16T06:00:00.000000Z",
"revision_history": [
{
"date": "2020-06-16T06:00:00.000000Z",
"legacy_version": "Initial",
"number": "1",
"summary": "Initial Publication"
},
{
"date": "2020-06-18T06:00:00.000000Z",
"legacy_version": "Update A",
"number": "2",
"summary": "Update A - ICSA-20-168-01 Treck TCP-IP Stack (Update A)"
},
{
"date": "2020-06-30T06:00:00.000000Z",
"legacy_version": "Update B",
"number": "3",
"summary": "Update B - ICSA-20-168-01 Treck TCP/IP Stack (Update B)"
},
{
"date": "2020-07-07T06:00:00.000000Z",
"legacy_version": "Update C",
"number": "4",
"summary": "Update C - ICSA-20-168-01 Treck TCP-IP Stack (Update C)"
},
{
"date": "2020-07-14T06:00:00.000000Z",
"legacy_version": "Update D",
"number": "5",
"summary": "Update D - ICSA-20-168-01 Treck TCP/IP Stack (Update D)"
},
{
"date": "2020-07-21T06:00:00.000000Z",
"legacy_version": "Update E",
"number": "6",
"summary": "Update E - ICSA-20-168-01 Treck TCP/IP Stack (Update E)"
},
{
"date": "2020-08-04T06:00:00.000000Z",
"legacy_version": "Update F",
"number": "7",
"summary": "Update F - ICSA-20-168-01 Treck TCP-IP Stack (Update F)"
},
{
"date": "2020-08-20T06:00:00.000000Z",
"legacy_version": "Update G",
"number": "8",
"summary": "Update G - ICSA-20-168-01 Treck TCP/IP Stack (Update G)"
},
{
"date": "2022-03-17T06:00:00.000000Z",
"legacy_version": "Update H",
"number": "9",
"summary": "Update H - ICSA-20-168-01 Treck TCP/IP Stack (Update H)"
},
{
"date": "2024-09-19T06:00:00.000000Z",
"legacy_version": "Update I",
"number": "10",
"summary": "Update I - Included IDEC Corporation."
}
],
"status": "final",
"version": "10"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "IPv4",
"product": {
"name": "Treck Inc. Treck Inc TCP/IP: IPv4",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "Treck Inc TCP/IP"
},
{
"branches": [
{
"category": "product_version",
"name": "IPv6",
"product": {
"name": "Treck Inc. Treck Inc TCP/IP: IPv6",
"product_id": "CSAFPID-0002"
}
}
],
"category": "product_name",
"name": "Treck Inc TCP/IP"
},
{
"branches": [
{
"category": "product_version",
"name": "UDP",
"product": {
"name": "Treck Inc. Treck Inc TCP/IP: UDP",
"product_id": "CSAFPID-0003"
}
}
],
"category": "product_name",
"name": "Treck Inc TCP/IP"
},
{
"branches": [
{
"category": "product_version",
"name": "DNS",
"product": {
"name": "Treck Inc. Treck Inc TCP/IP: DNS",
"product_id": "CSAFPID-0004"
}
}
],
"category": "product_name",
"name": "Treck Inc TCP/IP"
},
{
"branches": [
{
"category": "product_version",
"name": "DHCP",
"product": {
"name": "Treck Inc. Treck Inc TCP/IP: DHCP",
"product_id": "CSAFPID-0005"
}
}
],
"category": "product_name",
"name": "Treck Inc TCP/IP"
},
{
"branches": [
{
"category": "product_version",
"name": "TCP",
"product": {
"name": "Treck Inc. Treck Inc TCP/IP: TCP",
"product_id": "CSAFPID-0006"
}
}
],
"category": "product_name",
"name": "Treck Inc TCP/IP"
},
{
"branches": [
{
"category": "product_version",
"name": "ICMPv4",
"product": {
"name": "Treck Inc. Treck Inc TCP/IP: ICMPv4",
"product_id": "CSAFPID-0007"
}
}
],
"category": "product_name",
"name": "Treck Inc TCP/IP"
},
{
"branches": [
{
"category": "product_version",
"name": "ARP",
"product": {
"name": "Treck Inc. Treck Inc TCP/IP: ARP",
"product_id": "CSAFPID-0008"
}
}
],
"category": "product_name",
"name": "Treck Inc TCP/IP"
}
],
"category": "vendor",
"name": "Treck Inc."
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-11896",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "summary",
"text": "Improper handling of length parameter inconsistency in IPv4/UDP component when handling a packet sent by an unauthorized network attacker. This vulnerability may result in remote code execution.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11896"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Treck recommends users apply the latest version of the affected products:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Treck TCP/IP: Update to 6.0.1.67 or later versions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "To obtain patches, email Treck at security@treck.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "mailto:security@treck.com"
},
{
"category": "mitigation",
"details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Treck advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1508.html"
},
{
"category": "mitigation",
"details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "ABB",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=1MRS494936A\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
},
{
"category": "mitigation",
"details": "B.Braun",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bbraunusa.com/en/products-and-therapies/customer-communications.html"
},
{
"category": "mitigation",
"details": "Baxter",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.baxter.com/product-security#additionalresources"
},
{
"category": "mitigation",
"details": "BD",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bd.com/en-us/support/product-security-and-privacy/product-security-bulletins/third-party-product-security-bulletin-for-treck-tcp-ip-stack-vulnerabilities"
},
{
"category": "mitigation",
"details": "CareStream",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.carestream.com/en/us/services-and-support/cybersecurity-and-privacy"
},
{
"category": "mitigation",
"details": "Caterpillar",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.cat.com/en_US/support/technology/connected-solutions-principles/security/caterpillar-cybersecurity-advisory.html"
},
{
"category": "mitigation",
"details": "DIGI International",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.digi.com/support/knowledge-base/digi-international-security-notice-treck-tcp-ip-st"
},
{
"category": "mitigation",
"details": "Eaton",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/eaton-security-bulletin-treck-tcp-ip-stack-vulnerabilities-ripple20.pdf"
},
{
"category": "mitigation",
"details": "Green Hills Software",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://support.ghs.com/psirt/PSA-2020-05/"
},
{
"category": "mitigation",
"details": "IDEC Corporation",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://us.idec.com/media/24-RD-0300-EN.pdf"
},
{
"category": "mitigation",
"details": "Johnson Controls",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.johnsoncontrols.com/cyber-solutions/security-advisories"
},
{
"category": "mitigation",
"details": "Miele",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2020-024"
},
{
"category": "mitigation",
"details": "Opto 22",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.opto22.com/support/resources-tools/knowledgebase/kb88981"
},
{
"category": "mitigation",
"details": "Pepperl+Fuchs",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en/advisories/VDE-2021-028/"
},
{
"category": "mitigation",
"details": "Rockwell",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1126896"
},
{
"category": "mitigation",
"details": "Schneider Electric",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.se.com/ww/en/download/document/SESB-2020-168-01"
},
{
"category": "mitigation",
"details": "Smiths Medical",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.smiths-medical.com/company-information/news-and-events/news/2020/july/02/smiths-medical-cybersecurity-bulletin"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
}
]
},
{
"cve": "CVE-2020-11897",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "summary",
"text": "Improper handling of length parameter inconsistency in IPv6 component when handling a packet sent by an unauthorized network attacker. This vulnerability may result in possible out-of-bounds write.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11897"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Treck recommends users apply the latest version of the affected products:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Treck TCP/IP: Update to 6.0.1.67 or later versions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "To obtain patches, email Treck at security@treck.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "mailto:security@treck.com"
},
{
"category": "mitigation",
"details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Treck advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1508.html"
},
{
"category": "mitigation",
"details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "ABB",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=1MRS494936A\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
},
{
"category": "mitigation",
"details": "B.Braun",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bbraunusa.com/en/products-and-therapies/customer-communications.html"
},
{
"category": "mitigation",
"details": "Baxter",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.baxter.com/product-security#additionalresources"
},
{
"category": "mitigation",
"details": "BD",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bd.com/en-us/support/product-security-and-privacy/product-security-bulletins/third-party-product-security-bulletin-for-treck-tcp-ip-stack-vulnerabilities"
},
{
"category": "mitigation",
"details": "CareStream",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.carestream.com/en/us/services-and-support/cybersecurity-and-privacy"
},
{
"category": "mitigation",
"details": "Caterpillar",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.cat.com/en_US/support/technology/connected-solutions-principles/security/caterpillar-cybersecurity-advisory.html"
},
{
"category": "mitigation",
"details": "DIGI International",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.digi.com/support/knowledge-base/digi-international-security-notice-treck-tcp-ip-st"
},
{
"category": "mitigation",
"details": "Eaton",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/eaton-security-bulletin-treck-tcp-ip-stack-vulnerabilities-ripple20.pdf"
},
{
"category": "mitigation",
"details": "Green Hills Software",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://support.ghs.com/psirt/PSA-2020-05/"
},
{
"category": "mitigation",
"details": "IDEC Corporation",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://us.idec.com/media/24-RD-0300-EN.pdf"
},
{
"category": "mitigation",
"details": "Johnson Controls",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.johnsoncontrols.com/cyber-solutions/security-advisories"
},
{
"category": "mitigation",
"details": "Miele",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2020-024"
},
{
"category": "mitigation",
"details": "Opto 22",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.opto22.com/support/resources-tools/knowledgebase/kb88981"
},
{
"category": "mitigation",
"details": "Pepperl+Fuchs",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en/advisories/VDE-2021-028/"
},
{
"category": "mitigation",
"details": "Rockwell",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1126896"
},
{
"category": "mitigation",
"details": "Schneider Electric",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.se.com/ww/en/download/document/SESB-2020-168-01"
},
{
"category": "mitigation",
"details": "Smiths Medical",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.smiths-medical.com/company-information/news-and-events/news/2020/july/02/smiths-medical-cybersecurity-bulletin"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
}
]
},
{
"cve": "CVE-2020-11898",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "summary",
"text": "Improper handling of length parameter inconsistency in IPv4/ICMPv4 component when handling a packet sent by an unauthorized network attacker. This vulnerability may result in out-of-bounds read.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11898"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Treck recommends users apply the latest version of the affected products:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Treck TCP/IP: Update to 6.0.1.67 or later versions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "To obtain patches, email Treck at security@treck.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "mailto:security@treck.com"
},
{
"category": "mitigation",
"details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Treck advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1508.html"
},
{
"category": "mitigation",
"details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "ABB",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=1MRS494936A\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
},
{
"category": "mitigation",
"details": "B.Braun",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bbraunusa.com/en/products-and-therapies/customer-communications.html"
},
{
"category": "mitigation",
"details": "Baxter",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.baxter.com/product-security#additionalresources"
},
{
"category": "mitigation",
"details": "BD",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bd.com/en-us/support/product-security-and-privacy/product-security-bulletins/third-party-product-security-bulletin-for-treck-tcp-ip-stack-vulnerabilities"
},
{
"category": "mitigation",
"details": "CareStream",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.carestream.com/en/us/services-and-support/cybersecurity-and-privacy"
},
{
"category": "mitigation",
"details": "Caterpillar",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.cat.com/en_US/support/technology/connected-solutions-principles/security/caterpillar-cybersecurity-advisory.html"
},
{
"category": "mitigation",
"details": "DIGI International",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.digi.com/support/knowledge-base/digi-international-security-notice-treck-tcp-ip-st"
},
{
"category": "mitigation",
"details": "Eaton",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/eaton-security-bulletin-treck-tcp-ip-stack-vulnerabilities-ripple20.pdf"
},
{
"category": "mitigation",
"details": "Green Hills Software",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://support.ghs.com/psirt/PSA-2020-05/"
},
{
"category": "mitigation",
"details": "IDEC Corporation",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://us.idec.com/media/24-RD-0300-EN.pdf"
},
{
"category": "mitigation",
"details": "Johnson Controls",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.johnsoncontrols.com/cyber-solutions/security-advisories"
},
{
"category": "mitigation",
"details": "Miele",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2020-024"
},
{
"category": "mitigation",
"details": "Opto 22",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.opto22.com/support/resources-tools/knowledgebase/kb88981"
},
{
"category": "mitigation",
"details": "Pepperl+Fuchs",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en/advisories/VDE-2021-028/"
},
{
"category": "mitigation",
"details": "Rockwell",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1126896"
},
{
"category": "mitigation",
"details": "Schneider Electric",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.se.com/ww/en/download/document/SESB-2020-168-01"
},
{
"category": "mitigation",
"details": "Smiths Medical",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.smiths-medical.com/company-information/news-and-events/news/2020/july/02/smiths-medical-cybersecurity-bulletin"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
}
]
},
{
"cve": "CVE-2020-11899",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Improper input validation in IPv6 component when handling a packet sent by an unauthorized network attacker. This vulnerability may allow out-of-bounds read and a possible denial of service.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11899"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Treck recommends users apply the latest version of the affected products:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Treck TCP/IP: Update to 6.0.1.67 or later versions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "To obtain patches, email Treck at security@treck.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "mailto:security@treck.com"
},
{
"category": "mitigation",
"details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Treck advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1508.html"
},
{
"category": "mitigation",
"details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "ABB",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=1MRS494936A\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
},
{
"category": "mitigation",
"details": "B.Braun",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bbraunusa.com/en/products-and-therapies/customer-communications.html"
},
{
"category": "mitigation",
"details": "Baxter",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.baxter.com/product-security#additionalresources"
},
{
"category": "mitigation",
"details": "BD",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bd.com/en-us/support/product-security-and-privacy/product-security-bulletins/third-party-product-security-bulletin-for-treck-tcp-ip-stack-vulnerabilities"
},
{
"category": "mitigation",
"details": "CareStream",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.carestream.com/en/us/services-and-support/cybersecurity-and-privacy"
},
{
"category": "mitigation",
"details": "Caterpillar",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.cat.com/en_US/support/technology/connected-solutions-principles/security/caterpillar-cybersecurity-advisory.html"
},
{
"category": "mitigation",
"details": "DIGI International",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.digi.com/support/knowledge-base/digi-international-security-notice-treck-tcp-ip-st"
},
{
"category": "mitigation",
"details": "Eaton",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/eaton-security-bulletin-treck-tcp-ip-stack-vulnerabilities-ripple20.pdf"
},
{
"category": "mitigation",
"details": "Green Hills Software",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://support.ghs.com/psirt/PSA-2020-05/"
},
{
"category": "mitigation",
"details": "IDEC Corporation",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://us.idec.com/media/24-RD-0300-EN.pdf"
},
{
"category": "mitigation",
"details": "Johnson Controls",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.johnsoncontrols.com/cyber-solutions/security-advisories"
},
{
"category": "mitigation",
"details": "Miele",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2020-024"
},
{
"category": "mitigation",
"details": "Opto 22",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.opto22.com/support/resources-tools/knowledgebase/kb88981"
},
{
"category": "mitigation",
"details": "Pepperl+Fuchs",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en/advisories/VDE-2021-028/"
},
{
"category": "mitigation",
"details": "Rockwell",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1126896"
},
{
"category": "mitigation",
"details": "Schneider Electric",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.se.com/ww/en/download/document/SESB-2020-168-01"
},
{
"category": "mitigation",
"details": "Smiths Medical",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.smiths-medical.com/company-information/news-and-events/news/2020/july/02/smiths-medical-cybersecurity-bulletin"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
}
]
},
{
"cve": "CVE-2020-11900",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "summary",
"text": "Possible double free in IPv4 tunneling component when handling a packet sent by a network attacker. This vulnerability may result in use after free.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11900"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Treck recommends users apply the latest version of the affected products:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Treck TCP/IP: Update to 6.0.1.67 or later versions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "To obtain patches, email Treck at security@treck.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "mailto:security@treck.com"
},
{
"category": "mitigation",
"details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Treck advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1508.html"
},
{
"category": "mitigation",
"details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "ABB",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=1MRS494936A\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
},
{
"category": "mitigation",
"details": "B.Braun",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bbraunusa.com/en/products-and-therapies/customer-communications.html"
},
{
"category": "mitigation",
"details": "Baxter",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.baxter.com/product-security#additionalresources"
},
{
"category": "mitigation",
"details": "BD",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bd.com/en-us/support/product-security-and-privacy/product-security-bulletins/third-party-product-security-bulletin-for-treck-tcp-ip-stack-vulnerabilities"
},
{
"category": "mitigation",
"details": "CareStream",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.carestream.com/en/us/services-and-support/cybersecurity-and-privacy"
},
{
"category": "mitigation",
"details": "Caterpillar",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.cat.com/en_US/support/technology/connected-solutions-principles/security/caterpillar-cybersecurity-advisory.html"
},
{
"category": "mitigation",
"details": "DIGI International",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.digi.com/support/knowledge-base/digi-international-security-notice-treck-tcp-ip-st"
},
{
"category": "mitigation",
"details": "Eaton",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/eaton-security-bulletin-treck-tcp-ip-stack-vulnerabilities-ripple20.pdf"
},
{
"category": "mitigation",
"details": "Green Hills Software",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://support.ghs.com/psirt/PSA-2020-05/"
},
{
"category": "mitigation",
"details": "IDEC Corporation",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://us.idec.com/media/24-RD-0300-EN.pdf"
},
{
"category": "mitigation",
"details": "Johnson Controls",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.johnsoncontrols.com/cyber-solutions/security-advisories"
},
{
"category": "mitigation",
"details": "Miele",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2020-024"
},
{
"category": "mitigation",
"details": "Opto 22",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.opto22.com/support/resources-tools/knowledgebase/kb88981"
},
{
"category": "mitigation",
"details": "Pepperl+Fuchs",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en/advisories/VDE-2021-028/"
},
{
"category": "mitigation",
"details": "Rockwell",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1126896"
},
{
"category": "mitigation",
"details": "Schneider Electric",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.se.com/ww/en/download/document/SESB-2020-168-01"
},
{
"category": "mitigation",
"details": "Smiths Medical",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.smiths-medical.com/company-information/news-and-events/news/2020/july/02/smiths-medical-cybersecurity-bulletin"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
}
]
},
{
"cve": "CVE-2020-11901",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Improper input validation in DNS resolver component when handling a packet sent by an unauthorized network attacker. This vulnerability may result in remote code execution.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11901"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Treck recommends users apply the latest version of the affected products:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Treck TCP/IP: Update to 6.0.1.67 or later versions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "To obtain patches, email Treck at security@treck.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "mailto:security@treck.com"
},
{
"category": "mitigation",
"details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Treck advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1508.html"
},
{
"category": "mitigation",
"details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "ABB",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=1MRS494936A\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
},
{
"category": "mitigation",
"details": "B.Braun",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bbraunusa.com/en/products-and-therapies/customer-communications.html"
},
{
"category": "mitigation",
"details": "Baxter",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.baxter.com/product-security#additionalresources"
},
{
"category": "mitigation",
"details": "BD",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bd.com/en-us/support/product-security-and-privacy/product-security-bulletins/third-party-product-security-bulletin-for-treck-tcp-ip-stack-vulnerabilities"
},
{
"category": "mitigation",
"details": "CareStream",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.carestream.com/en/us/services-and-support/cybersecurity-and-privacy"
},
{
"category": "mitigation",
"details": "Caterpillar",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.cat.com/en_US/support/technology/connected-solutions-principles/security/caterpillar-cybersecurity-advisory.html"
},
{
"category": "mitigation",
"details": "DIGI International",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.digi.com/support/knowledge-base/digi-international-security-notice-treck-tcp-ip-st"
},
{
"category": "mitigation",
"details": "Eaton",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/eaton-security-bulletin-treck-tcp-ip-stack-vulnerabilities-ripple20.pdf"
},
{
"category": "mitigation",
"details": "Green Hills Software",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://support.ghs.com/psirt/PSA-2020-05/"
},
{
"category": "mitigation",
"details": "IDEC Corporation",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://us.idec.com/media/24-RD-0300-EN.pdf"
},
{
"category": "mitigation",
"details": "Johnson Controls",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.johnsoncontrols.com/cyber-solutions/security-advisories"
},
{
"category": "mitigation",
"details": "Miele",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2020-024"
},
{
"category": "mitigation",
"details": "Opto 22",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.opto22.com/support/resources-tools/knowledgebase/kb88981"
},
{
"category": "mitigation",
"details": "Pepperl+Fuchs",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en/advisories/VDE-2021-028/"
},
{
"category": "mitigation",
"details": "Rockwell",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1126896"
},
{
"category": "mitigation",
"details": "Schneider Electric",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.se.com/ww/en/download/document/SESB-2020-168-01"
},
{
"category": "mitigation",
"details": "Smiths Medical",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.smiths-medical.com/company-information/news-and-events/news/2020/july/02/smiths-medical-cybersecurity-bulletin"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
}
]
},
{
"cve": "CVE-2020-11902",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Improper input validation in IPv6 over IPv4 tunneling component when handling a packet sent by an unauthorized network attacker. This vulnerability may allow out-of-bounds read.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11902"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Treck recommends users apply the latest version of the affected products:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Treck TCP/IP: Update to 6.0.1.67 or later versions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "To obtain patches, email Treck at security@treck.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "mailto:security@treck.com"
},
{
"category": "mitigation",
"details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Treck advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1508.html"
},
{
"category": "mitigation",
"details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "ABB",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=1MRS494936A\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
},
{
"category": "mitigation",
"details": "B.Braun",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bbraunusa.com/en/products-and-therapies/customer-communications.html"
},
{
"category": "mitigation",
"details": "Baxter",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.baxter.com/product-security#additionalresources"
},
{
"category": "mitigation",
"details": "BD",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bd.com/en-us/support/product-security-and-privacy/product-security-bulletins/third-party-product-security-bulletin-for-treck-tcp-ip-stack-vulnerabilities"
},
{
"category": "mitigation",
"details": "CareStream",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.carestream.com/en/us/services-and-support/cybersecurity-and-privacy"
},
{
"category": "mitigation",
"details": "Caterpillar",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.cat.com/en_US/support/technology/connected-solutions-principles/security/caterpillar-cybersecurity-advisory.html"
},
{
"category": "mitigation",
"details": "DIGI International",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.digi.com/support/knowledge-base/digi-international-security-notice-treck-tcp-ip-st"
},
{
"category": "mitigation",
"details": "Eaton",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/eaton-security-bulletin-treck-tcp-ip-stack-vulnerabilities-ripple20.pdf"
},
{
"category": "mitigation",
"details": "Green Hills Software",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://support.ghs.com/psirt/PSA-2020-05/"
},
{
"category": "mitigation",
"details": "IDEC Corporation",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://us.idec.com/media/24-RD-0300-EN.pdf"
},
{
"category": "mitigation",
"details": "Johnson Controls",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.johnsoncontrols.com/cyber-solutions/security-advisories"
},
{
"category": "mitigation",
"details": "Miele",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2020-024"
},
{
"category": "mitigation",
"details": "Opto 22",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.opto22.com/support/resources-tools/knowledgebase/kb88981"
},
{
"category": "mitigation",
"details": "Pepperl+Fuchs",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en/advisories/VDE-2021-028/"
},
{
"category": "mitigation",
"details": "Rockwell",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1126896"
},
{
"category": "mitigation",
"details": "Schneider Electric",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.se.com/ww/en/download/document/SESB-2020-168-01"
},
{
"category": "mitigation",
"details": "Smiths Medical",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.smiths-medical.com/company-information/news-and-events/news/2020/july/02/smiths-medical-cybersecurity-bulletin"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
}
]
},
{
"cve": "CVE-2020-11903",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "Possible out-of-bounds read in DHCP component when handling a packet sent by an unauthorized network attacker. This vulnerability may allow exposure of sensitive information.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11903"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Treck recommends users apply the latest version of the affected products:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Treck TCP/IP: Update to 6.0.1.67 or later versions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "To obtain patches, email Treck at security@treck.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "mailto:security@treck.com"
},
{
"category": "mitigation",
"details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Treck advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1508.html"
},
{
"category": "mitigation",
"details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "ABB",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=1MRS494936A\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
},
{
"category": "mitigation",
"details": "B.Braun",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bbraunusa.com/en/products-and-therapies/customer-communications.html"
},
{
"category": "mitigation",
"details": "Baxter",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.baxter.com/product-security#additionalresources"
},
{
"category": "mitigation",
"details": "BD",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bd.com/en-us/support/product-security-and-privacy/product-security-bulletins/third-party-product-security-bulletin-for-treck-tcp-ip-stack-vulnerabilities"
},
{
"category": "mitigation",
"details": "CareStream",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.carestream.com/en/us/services-and-support/cybersecurity-and-privacy"
},
{
"category": "mitigation",
"details": "Caterpillar",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.cat.com/en_US/support/technology/connected-solutions-principles/security/caterpillar-cybersecurity-advisory.html"
},
{
"category": "mitigation",
"details": "DIGI International",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.digi.com/support/knowledge-base/digi-international-security-notice-treck-tcp-ip-st"
},
{
"category": "mitigation",
"details": "Eaton",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/eaton-security-bulletin-treck-tcp-ip-stack-vulnerabilities-ripple20.pdf"
},
{
"category": "mitigation",
"details": "Green Hills Software",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://support.ghs.com/psirt/PSA-2020-05/"
},
{
"category": "mitigation",
"details": "IDEC Corporation",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://us.idec.com/media/24-RD-0300-EN.pdf"
},
{
"category": "mitigation",
"details": "Johnson Controls",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.johnsoncontrols.com/cyber-solutions/security-advisories"
},
{
"category": "mitigation",
"details": "Miele",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2020-024"
},
{
"category": "mitigation",
"details": "Opto 22",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.opto22.com/support/resources-tools/knowledgebase/kb88981"
},
{
"category": "mitigation",
"details": "Pepperl+Fuchs",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en/advisories/VDE-2021-028/"
},
{
"category": "mitigation",
"details": "Rockwell",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1126896"
},
{
"category": "mitigation",
"details": "Schneider Electric",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.se.com/ww/en/download/document/SESB-2020-168-01"
},
{
"category": "mitigation",
"details": "Smiths Medical",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.smiths-medical.com/company-information/news-and-events/news/2020/july/02/smiths-medical-cybersecurity-bulletin"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
}
]
},
{
"cve": "CVE-2020-11904",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "Possible integer overflow or wraparound in memory allocation component when handling a packet sent by an unauthorized network attacker may result in out-of-bounds write.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11904"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Treck recommends users apply the latest version of the affected products:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Treck TCP/IP: Update to 6.0.1.67 or later versions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "To obtain patches, email Treck at security@treck.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "mailto:security@treck.com"
},
{
"category": "mitigation",
"details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Treck advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1508.html"
},
{
"category": "mitigation",
"details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "ABB",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=1MRS494936A\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
},
{
"category": "mitigation",
"details": "B.Braun",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bbraunusa.com/en/products-and-therapies/customer-communications.html"
},
{
"category": "mitigation",
"details": "Baxter",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.baxter.com/product-security#additionalresources"
},
{
"category": "mitigation",
"details": "BD",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bd.com/en-us/support/product-security-and-privacy/product-security-bulletins/third-party-product-security-bulletin-for-treck-tcp-ip-stack-vulnerabilities"
},
{
"category": "mitigation",
"details": "CareStream",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.carestream.com/en/us/services-and-support/cybersecurity-and-privacy"
},
{
"category": "mitigation",
"details": "Caterpillar",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.cat.com/en_US/support/technology/connected-solutions-principles/security/caterpillar-cybersecurity-advisory.html"
},
{
"category": "mitigation",
"details": "DIGI International",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.digi.com/support/knowledge-base/digi-international-security-notice-treck-tcp-ip-st"
},
{
"category": "mitigation",
"details": "Eaton",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/eaton-security-bulletin-treck-tcp-ip-stack-vulnerabilities-ripple20.pdf"
},
{
"category": "mitigation",
"details": "Green Hills Software",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://support.ghs.com/psirt/PSA-2020-05/"
},
{
"category": "mitigation",
"details": "IDEC Corporation",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://us.idec.com/media/24-RD-0300-EN.pdf"
},
{
"category": "mitigation",
"details": "Johnson Controls",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.johnsoncontrols.com/cyber-solutions/security-advisories"
},
{
"category": "mitigation",
"details": "Miele",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2020-024"
},
{
"category": "mitigation",
"details": "Opto 22",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.opto22.com/support/resources-tools/knowledgebase/kb88981"
},
{
"category": "mitigation",
"details": "Pepperl+Fuchs",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en/advisories/VDE-2021-028/"
},
{
"category": "mitigation",
"details": "Rockwell",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1126896"
},
{
"category": "mitigation",
"details": "Schneider Electric",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.se.com/ww/en/download/document/SESB-2020-168-01"
},
{
"category": "mitigation",
"details": "Smiths Medical",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.smiths-medical.com/company-information/news-and-events/news/2020/july/02/smiths-medical-cybersecurity-bulletin"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
}
]
},
{
"cve": "CVE-2020-11905",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "Possible out-of-bounds read in DHCPv6 component when handling a packet sent by an unauthorized network attacker. This vulnerability may allow exposure of sensitive information.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11905"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Treck recommends users apply the latest version of the affected products:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Treck TCP/IP: Update to 6.0.1.67 or later versions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "To obtain patches, email Treck at security@treck.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "mailto:security@treck.com"
},
{
"category": "mitigation",
"details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Treck advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1508.html"
},
{
"category": "mitigation",
"details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "ABB",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=1MRS494936A\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
},
{
"category": "mitigation",
"details": "B.Braun",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bbraunusa.com/en/products-and-therapies/customer-communications.html"
},
{
"category": "mitigation",
"details": "Baxter",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.baxter.com/product-security#additionalresources"
},
{
"category": "mitigation",
"details": "BD",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bd.com/en-us/support/product-security-and-privacy/product-security-bulletins/third-party-product-security-bulletin-for-treck-tcp-ip-stack-vulnerabilities"
},
{
"category": "mitigation",
"details": "CareStream",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.carestream.com/en/us/services-and-support/cybersecurity-and-privacy"
},
{
"category": "mitigation",
"details": "Caterpillar",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.cat.com/en_US/support/technology/connected-solutions-principles/security/caterpillar-cybersecurity-advisory.html"
},
{
"category": "mitigation",
"details": "DIGI International",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.digi.com/support/knowledge-base/digi-international-security-notice-treck-tcp-ip-st"
},
{
"category": "mitigation",
"details": "Eaton",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/eaton-security-bulletin-treck-tcp-ip-stack-vulnerabilities-ripple20.pdf"
},
{
"category": "mitigation",
"details": "Green Hills Software",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://support.ghs.com/psirt/PSA-2020-05/"
},
{
"category": "mitigation",
"details": "IDEC Corporation",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://us.idec.com/media/24-RD-0300-EN.pdf"
},
{
"category": "mitigation",
"details": "Johnson Controls",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.johnsoncontrols.com/cyber-solutions/security-advisories"
},
{
"category": "mitigation",
"details": "Miele",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2020-024"
},
{
"category": "mitigation",
"details": "Opto 22",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.opto22.com/support/resources-tools/knowledgebase/kb88981"
},
{
"category": "mitigation",
"details": "Pepperl+Fuchs",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en/advisories/VDE-2021-028/"
},
{
"category": "mitigation",
"details": "Rockwell",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1126896"
},
{
"category": "mitigation",
"details": "Schneider Electric",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.se.com/ww/en/download/document/SESB-2020-168-01"
},
{
"category": "mitigation",
"details": "Smiths Medical",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.smiths-medical.com/company-information/news-and-events/news/2020/july/02/smiths-medical-cybersecurity-bulletin"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
}
]
},
{
"cve": "CVE-2020-11906",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Improper input validation CWE-20 in ethernet link layer component from a packet sent by an unauthorized user. ",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11906"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Treck recommends users apply the latest version of the affected products:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Treck TCP/IP: Update to 6.0.1.67 or later versions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "To obtain patches, email Treck at security@treck.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "mailto:security@treck.com"
},
{
"category": "mitigation",
"details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Treck advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1508.html"
},
{
"category": "mitigation",
"details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "ABB",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=1MRS494936A\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
},
{
"category": "mitigation",
"details": "B.Braun",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bbraunusa.com/en/products-and-therapies/customer-communications.html"
},
{
"category": "mitigation",
"details": "Baxter",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.baxter.com/product-security#additionalresources"
},
{
"category": "mitigation",
"details": "BD",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bd.com/en-us/support/product-security-and-privacy/product-security-bulletins/third-party-product-security-bulletin-for-treck-tcp-ip-stack-vulnerabilities"
},
{
"category": "mitigation",
"details": "CareStream",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.carestream.com/en/us/services-and-support/cybersecurity-and-privacy"
},
{
"category": "mitigation",
"details": "Caterpillar",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.cat.com/en_US/support/technology/connected-solutions-principles/security/caterpillar-cybersecurity-advisory.html"
},
{
"category": "mitigation",
"details": "DIGI International",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.digi.com/support/knowledge-base/digi-international-security-notice-treck-tcp-ip-st"
},
{
"category": "mitigation",
"details": "Eaton",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/eaton-security-bulletin-treck-tcp-ip-stack-vulnerabilities-ripple20.pdf"
},
{
"category": "mitigation",
"details": "Green Hills Software",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://support.ghs.com/psirt/PSA-2020-05/"
},
{
"category": "mitigation",
"details": "IDEC Corporation",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://us.idec.com/media/24-RD-0300-EN.pdf"
},
{
"category": "mitigation",
"details": "Johnson Controls",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.johnsoncontrols.com/cyber-solutions/security-advisories"
},
{
"category": "mitigation",
"details": "Miele",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2020-024"
},
{
"category": "mitigation",
"details": "Opto 22",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.opto22.com/support/resources-tools/knowledgebase/kb88981"
},
{
"category": "mitigation",
"details": "Pepperl+Fuchs",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en/advisories/VDE-2021-028/"
},
{
"category": "mitigation",
"details": "Rockwell",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1126896"
},
{
"category": "mitigation",
"details": "Schneider Electric",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.se.com/ww/en/download/document/SESB-2020-168-01"
},
{
"category": "mitigation",
"details": "Smiths Medical",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.smiths-medical.com/company-information/news-and-events/news/2020/july/02/smiths-medical-cybersecurity-bulletin"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
}
]
},
{
"cve": "CVE-2020-11907",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "summary",
"text": "Improper handling of length parameter inconsistency in TCP component, from a packet sent by an unauthorized network attacker.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11907"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Treck recommends users apply the latest version of the affected products:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Treck TCP/IP: Update to 6.0.1.67 or later versions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "To obtain patches, email Treck at security@treck.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "mailto:security@treck.com"
},
{
"category": "mitigation",
"details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Treck advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1508.html"
},
{
"category": "mitigation",
"details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "ABB",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=1MRS494936A\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
},
{
"category": "mitigation",
"details": "B.Braun",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bbraunusa.com/en/products-and-therapies/customer-communications.html"
},
{
"category": "mitigation",
"details": "Baxter",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.baxter.com/product-security#additionalresources"
},
{
"category": "mitigation",
"details": "BD",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bd.com/en-us/support/product-security-and-privacy/product-security-bulletins/third-party-product-security-bulletin-for-treck-tcp-ip-stack-vulnerabilities"
},
{
"category": "mitigation",
"details": "CareStream",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.carestream.com/en/us/services-and-support/cybersecurity-and-privacy"
},
{
"category": "mitigation",
"details": "Caterpillar",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.cat.com/en_US/support/technology/connected-solutions-principles/security/caterpillar-cybersecurity-advisory.html"
},
{
"category": "mitigation",
"details": "DIGI International",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.digi.com/support/knowledge-base/digi-international-security-notice-treck-tcp-ip-st"
},
{
"category": "mitigation",
"details": "Eaton",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/eaton-security-bulletin-treck-tcp-ip-stack-vulnerabilities-ripple20.pdf"
},
{
"category": "mitigation",
"details": "Green Hills Software",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://support.ghs.com/psirt/PSA-2020-05/"
},
{
"category": "mitigation",
"details": "IDEC Corporation",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://us.idec.com/media/24-RD-0300-EN.pdf"
},
{
"category": "mitigation",
"details": "Johnson Controls",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.johnsoncontrols.com/cyber-solutions/security-advisories"
},
{
"category": "mitigation",
"details": "Miele",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2020-024"
},
{
"category": "mitigation",
"details": "Opto 22",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.opto22.com/support/resources-tools/knowledgebase/kb88981"
},
{
"category": "mitigation",
"details": "Pepperl+Fuchs",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en/advisories/VDE-2021-028/"
},
{
"category": "mitigation",
"details": "Rockwell",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1126896"
},
{
"category": "mitigation",
"details": "Schneider Electric",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.se.com/ww/en/download/document/SESB-2020-168-01"
},
{
"category": "mitigation",
"details": "Smiths Medical",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.smiths-medical.com/company-information/news-and-events/news/2020/july/02/smiths-medical-cybersecurity-bulletin"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
}
]
},
{
"cve": "CVE-2020-11908",
"cwe": {
"id": "CWE-170",
"name": "Improper Null Termination"
},
"notes": [
{
"category": "summary",
"text": "Improper null termination in DHCP component when handling a packet sent by an unauthorized network attacker. This vulnerability may allow exposure of sensitive information.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11908"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Treck recommends users apply the latest version of the affected products:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Treck TCP/IP: Update to 6.0.1.67 or later versions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "To obtain patches, email Treck at security@treck.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "mailto:security@treck.com"
},
{
"category": "mitigation",
"details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Treck advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1508.html"
},
{
"category": "mitigation",
"details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "ABB",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=1MRS494936A\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
},
{
"category": "mitigation",
"details": "B.Braun",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bbraunusa.com/en/products-and-therapies/customer-communications.html"
},
{
"category": "mitigation",
"details": "Baxter",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.baxter.com/product-security#additionalresources"
},
{
"category": "mitigation",
"details": "BD",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bd.com/en-us/support/product-security-and-privacy/product-security-bulletins/third-party-product-security-bulletin-for-treck-tcp-ip-stack-vulnerabilities"
},
{
"category": "mitigation",
"details": "CareStream",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.carestream.com/en/us/services-and-support/cybersecurity-and-privacy"
},
{
"category": "mitigation",
"details": "Caterpillar",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.cat.com/en_US/support/technology/connected-solutions-principles/security/caterpillar-cybersecurity-advisory.html"
},
{
"category": "mitigation",
"details": "DIGI International",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.digi.com/support/knowledge-base/digi-international-security-notice-treck-tcp-ip-st"
},
{
"category": "mitigation",
"details": "Eaton",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/eaton-security-bulletin-treck-tcp-ip-stack-vulnerabilities-ripple20.pdf"
},
{
"category": "mitigation",
"details": "Green Hills Software",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://support.ghs.com/psirt/PSA-2020-05/"
},
{
"category": "mitigation",
"details": "IDEC Corporation",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://us.idec.com/media/24-RD-0300-EN.pdf"
},
{
"category": "mitigation",
"details": "Johnson Controls",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.johnsoncontrols.com/cyber-solutions/security-advisories"
},
{
"category": "mitigation",
"details": "Miele",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2020-024"
},
{
"category": "mitigation",
"details": "Opto 22",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.opto22.com/support/resources-tools/knowledgebase/kb88981"
},
{
"category": "mitigation",
"details": "Pepperl+Fuchs",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en/advisories/VDE-2021-028/"
},
{
"category": "mitigation",
"details": "Rockwell",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1126896"
},
{
"category": "mitigation",
"details": "Schneider Electric",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.se.com/ww/en/download/document/SESB-2020-168-01"
},
{
"category": "mitigation",
"details": "Smiths Medical",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.smiths-medical.com/company-information/news-and-events/news/2020/july/02/smiths-medical-cybersecurity-bulletin"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
}
]
},
{
"cve": "CVE-2020-11909",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Improper input validation in IPv4 component when handling a packet sent by an unauthorized network attacker.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11909"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Treck recommends users apply the latest version of the affected products:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Treck TCP/IP: Update to 6.0.1.67 or later versions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "To obtain patches, email Treck at security@treck.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "mailto:security@treck.com"
},
{
"category": "mitigation",
"details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Treck advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1508.html"
},
{
"category": "mitigation",
"details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "ABB",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=1MRS494936A\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
},
{
"category": "mitigation",
"details": "B.Braun",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bbraunusa.com/en/products-and-therapies/customer-communications.html"
},
{
"category": "mitigation",
"details": "Baxter",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.baxter.com/product-security#additionalresources"
},
{
"category": "mitigation",
"details": "BD",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bd.com/en-us/support/product-security-and-privacy/product-security-bulletins/third-party-product-security-bulletin-for-treck-tcp-ip-stack-vulnerabilities"
},
{
"category": "mitigation",
"details": "CareStream",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.carestream.com/en/us/services-and-support/cybersecurity-and-privacy"
},
{
"category": "mitigation",
"details": "Caterpillar",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.cat.com/en_US/support/technology/connected-solutions-principles/security/caterpillar-cybersecurity-advisory.html"
},
{
"category": "mitigation",
"details": "DIGI International",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.digi.com/support/knowledge-base/digi-international-security-notice-treck-tcp-ip-st"
},
{
"category": "mitigation",
"details": "Eaton",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/eaton-security-bulletin-treck-tcp-ip-stack-vulnerabilities-ripple20.pdf"
},
{
"category": "mitigation",
"details": "Green Hills Software",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://support.ghs.com/psirt/PSA-2020-05/"
},
{
"category": "mitigation",
"details": "IDEC Corporation",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://us.idec.com/media/24-RD-0300-EN.pdf"
},
{
"category": "mitigation",
"details": "Johnson Controls",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.johnsoncontrols.com/cyber-solutions/security-advisories"
},
{
"category": "mitigation",
"details": "Miele",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2020-024"
},
{
"category": "mitigation",
"details": "Opto 22",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.opto22.com/support/resources-tools/knowledgebase/kb88981"
},
{
"category": "mitigation",
"details": "Pepperl+Fuchs",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en/advisories/VDE-2021-028/"
},
{
"category": "mitigation",
"details": "Rockwell",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1126896"
},
{
"category": "mitigation",
"details": "Schneider Electric",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.se.com/ww/en/download/document/SESB-2020-168-01"
},
{
"category": "mitigation",
"details": "Smiths Medical",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.smiths-medical.com/company-information/news-and-events/news/2020/july/02/smiths-medical-cybersecurity-bulletin"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
}
]
},
{
"cve": "CVE-2020-11910",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Improper input validation in ICMPv4 component when handling a packet sent by an unauthorized network attacker. This vulnerability may allow out-of-bounds read.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11910"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Treck recommends users apply the latest version of the affected products:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Treck TCP/IP: Update to 6.0.1.67 or later versions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "To obtain patches, email Treck at security@treck.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "mailto:security@treck.com"
},
{
"category": "mitigation",
"details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Treck advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1508.html"
},
{
"category": "mitigation",
"details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "ABB",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=1MRS494936A\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
},
{
"category": "mitigation",
"details": "B.Braun",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bbraunusa.com/en/products-and-therapies/customer-communications.html"
},
{
"category": "mitigation",
"details": "Baxter",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.baxter.com/product-security#additionalresources"
},
{
"category": "mitigation",
"details": "BD",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bd.com/en-us/support/product-security-and-privacy/product-security-bulletins/third-party-product-security-bulletin-for-treck-tcp-ip-stack-vulnerabilities"
},
{
"category": "mitigation",
"details": "CareStream",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.carestream.com/en/us/services-and-support/cybersecurity-and-privacy"
},
{
"category": "mitigation",
"details": "Caterpillar",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.cat.com/en_US/support/technology/connected-solutions-principles/security/caterpillar-cybersecurity-advisory.html"
},
{
"category": "mitigation",
"details": "DIGI International",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.digi.com/support/knowledge-base/digi-international-security-notice-treck-tcp-ip-st"
},
{
"category": "mitigation",
"details": "Eaton",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/eaton-security-bulletin-treck-tcp-ip-stack-vulnerabilities-ripple20.pdf"
},
{
"category": "mitigation",
"details": "Green Hills Software",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://support.ghs.com/psirt/PSA-2020-05/"
},
{
"category": "mitigation",
"details": "IDEC Corporation",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://us.idec.com/media/24-RD-0300-EN.pdf"
},
{
"category": "mitigation",
"details": "Johnson Controls",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.johnsoncontrols.com/cyber-solutions/security-advisories"
},
{
"category": "mitigation",
"details": "Miele",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2020-024"
},
{
"category": "mitigation",
"details": "Opto 22",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.opto22.com/support/resources-tools/knowledgebase/kb88981"
},
{
"category": "mitigation",
"details": "Pepperl+Fuchs",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en/advisories/VDE-2021-028/"
},
{
"category": "mitigation",
"details": "Rockwell",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1126896"
},
{
"category": "mitigation",
"details": "Schneider Electric",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.se.com/ww/en/download/document/SESB-2020-168-01"
},
{
"category": "mitigation",
"details": "Smiths Medical",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.smiths-medical.com/company-information/news-and-events/news/2020/july/02/smiths-medical-cybersecurity-bulletin"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
}
]
},
{
"cve": "CVE-2020-11911",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "summary",
"text": "The affected product is vulnerable to improper access control, which may allow an attacker to change one specific configuration value.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11911"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Treck recommends users apply the latest version of the affected products:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Treck TCP/IP: Update to 6.0.1.67 or later versions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "To obtain patches, email Treck at security@treck.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "mailto:security@treck.com"
},
{
"category": "mitigation",
"details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Treck advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1508.html"
},
{
"category": "mitigation",
"details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "ABB",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=1MRS494936A\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
},
{
"category": "mitigation",
"details": "B.Braun",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bbraunusa.com/en/products-and-therapies/customer-communications.html"
},
{
"category": "mitigation",
"details": "Baxter",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.baxter.com/product-security#additionalresources"
},
{
"category": "mitigation",
"details": "BD",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bd.com/en-us/support/product-security-and-privacy/product-security-bulletins/third-party-product-security-bulletin-for-treck-tcp-ip-stack-vulnerabilities"
},
{
"category": "mitigation",
"details": "CareStream",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.carestream.com/en/us/services-and-support/cybersecurity-and-privacy"
},
{
"category": "mitigation",
"details": "Caterpillar",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.cat.com/en_US/support/technology/connected-solutions-principles/security/caterpillar-cybersecurity-advisory.html"
},
{
"category": "mitigation",
"details": "DIGI International",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.digi.com/support/knowledge-base/digi-international-security-notice-treck-tcp-ip-st"
},
{
"category": "mitigation",
"details": "Eaton",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/eaton-security-bulletin-treck-tcp-ip-stack-vulnerabilities-ripple20.pdf"
},
{
"category": "mitigation",
"details": "Green Hills Software",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://support.ghs.com/psirt/PSA-2020-05/"
},
{
"category": "mitigation",
"details": "IDEC Corporation",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://us.idec.com/media/24-RD-0300-EN.pdf"
},
{
"category": "mitigation",
"details": "Johnson Controls",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.johnsoncontrols.com/cyber-solutions/security-advisories"
},
{
"category": "mitigation",
"details": "Miele",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2020-024"
},
{
"category": "mitigation",
"details": "Opto 22",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.opto22.com/support/resources-tools/knowledgebase/kb88981"
},
{
"category": "mitigation",
"details": "Pepperl+Fuchs",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en/advisories/VDE-2021-028/"
},
{
"category": "mitigation",
"details": "Rockwell",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1126896"
},
{
"category": "mitigation",
"details": "Schneider Electric",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.se.com/ww/en/download/document/SESB-2020-168-01"
},
{
"category": "mitigation",
"details": "Smiths Medical",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.smiths-medical.com/company-information/news-and-events/news/2020/july/02/smiths-medical-cybersecurity-bulletin"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
}
]
},
{
"cve": "CVE-2020-11912",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Improper input validation in TCP component when handling a packet sent by an unauthorized network attacker. This vulnerability may allow out-of-bounds read.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11912"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Treck recommends users apply the latest version of the affected products:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Treck TCP/IP: Update to 6.0.1.67 or later versions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "To obtain patches, email Treck at security@treck.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "mailto:security@treck.com"
},
{
"category": "mitigation",
"details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Treck advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1508.html"
},
{
"category": "mitigation",
"details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "ABB",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=1MRS494936A\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
},
{
"category": "mitigation",
"details": "B.Braun",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bbraunusa.com/en/products-and-therapies/customer-communications.html"
},
{
"category": "mitigation",
"details": "Baxter",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.baxter.com/product-security#additionalresources"
},
{
"category": "mitigation",
"details": "BD",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bd.com/en-us/support/product-security-and-privacy/product-security-bulletins/third-party-product-security-bulletin-for-treck-tcp-ip-stack-vulnerabilities"
},
{
"category": "mitigation",
"details": "CareStream",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.carestream.com/en/us/services-and-support/cybersecurity-and-privacy"
},
{
"category": "mitigation",
"details": "Caterpillar",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.cat.com/en_US/support/technology/connected-solutions-principles/security/caterpillar-cybersecurity-advisory.html"
},
{
"category": "mitigation",
"details": "DIGI International",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.digi.com/support/knowledge-base/digi-international-security-notice-treck-tcp-ip-st"
},
{
"category": "mitigation",
"details": "Eaton",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/eaton-security-bulletin-treck-tcp-ip-stack-vulnerabilities-ripple20.pdf"
},
{
"category": "mitigation",
"details": "Green Hills Software",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://support.ghs.com/psirt/PSA-2020-05/"
},
{
"category": "mitigation",
"details": "IDEC Corporation",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://us.idec.com/media/24-RD-0300-EN.pdf"
},
{
"category": "mitigation",
"details": "Johnson Controls",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.johnsoncontrols.com/cyber-solutions/security-advisories"
},
{
"category": "mitigation",
"details": "Miele",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2020-024"
},
{
"category": "mitigation",
"details": "Opto 22",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.opto22.com/support/resources-tools/knowledgebase/kb88981"
},
{
"category": "mitigation",
"details": "Pepperl+Fuchs",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en/advisories/VDE-2021-028/"
},
{
"category": "mitigation",
"details": "Rockwell",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1126896"
},
{
"category": "mitigation",
"details": "Schneider Electric",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.se.com/ww/en/download/document/SESB-2020-168-01"
},
{
"category": "mitigation",
"details": "Smiths Medical",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.smiths-medical.com/company-information/news-and-events/news/2020/july/02/smiths-medical-cybersecurity-bulletin"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
}
]
},
{
"cve": "CVE-2020-11913",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Improper input validation in IPv6 component when handling a packet sent by an unauthorized network attacker. This vulnerability may allow out-of-bounds read.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11913"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Treck recommends users apply the latest version of the affected products:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Treck TCP/IP: Update to 6.0.1.67 or later versions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "To obtain patches, email Treck at security@treck.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "mailto:security@treck.com"
},
{
"category": "mitigation",
"details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Treck advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1508.html"
},
{
"category": "mitigation",
"details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "ABB",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=1MRS494936A\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
},
{
"category": "mitigation",
"details": "B.Braun",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bbraunusa.com/en/products-and-therapies/customer-communications.html"
},
{
"category": "mitigation",
"details": "Baxter",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.baxter.com/product-security#additionalresources"
},
{
"category": "mitigation",
"details": "BD",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bd.com/en-us/support/product-security-and-privacy/product-security-bulletins/third-party-product-security-bulletin-for-treck-tcp-ip-stack-vulnerabilities"
},
{
"category": "mitigation",
"details": "CareStream",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.carestream.com/en/us/services-and-support/cybersecurity-and-privacy"
},
{
"category": "mitigation",
"details": "Caterpillar",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.cat.com/en_US/support/technology/connected-solutions-principles/security/caterpillar-cybersecurity-advisory.html"
},
{
"category": "mitigation",
"details": "DIGI International",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.digi.com/support/knowledge-base/digi-international-security-notice-treck-tcp-ip-st"
},
{
"category": "mitigation",
"details": "Eaton",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/eaton-security-bulletin-treck-tcp-ip-stack-vulnerabilities-ripple20.pdf"
},
{
"category": "mitigation",
"details": "Green Hills Software",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://support.ghs.com/psirt/PSA-2020-05/"
},
{
"category": "mitigation",
"details": "IDEC Corporation",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://us.idec.com/media/24-RD-0300-EN.pdf"
},
{
"category": "mitigation",
"details": "Johnson Controls",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.johnsoncontrols.com/cyber-solutions/security-advisories"
},
{
"category": "mitigation",
"details": "Miele",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2020-024"
},
{
"category": "mitigation",
"details": "Opto 22",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.opto22.com/support/resources-tools/knowledgebase/kb88981"
},
{
"category": "mitigation",
"details": "Pepperl+Fuchs",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en/advisories/VDE-2021-028/"
},
{
"category": "mitigation",
"details": "Rockwell",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1126896"
},
{
"category": "mitigation",
"details": "Schneider Electric",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.se.com/ww/en/download/document/SESB-2020-168-01"
},
{
"category": "mitigation",
"details": "Smiths Medical",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.smiths-medical.com/company-information/news-and-events/news/2020/july/02/smiths-medical-cybersecurity-bulletin"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
}
]
},
{
"cve": "CVE-2020-11914",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Improper input validation in ARP component when handling a packet sent by an unauthorized network attacker. This vulnerability may allow out-of-bounds read.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11914"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Treck recommends users apply the latest version of the affected products:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Treck TCP/IP: Update to 6.0.1.67 or later versions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "To obtain patches, email Treck at security@treck.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "mailto:security@treck.com"
},
{
"category": "mitigation",
"details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Treck advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1508.html"
},
{
"category": "mitigation",
"details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "ABB",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=1MRS494936A\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
},
{
"category": "mitigation",
"details": "B.Braun",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bbraunusa.com/en/products-and-therapies/customer-communications.html"
},
{
"category": "mitigation",
"details": "Baxter",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.baxter.com/product-security#additionalresources"
},
{
"category": "mitigation",
"details": "BD",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.bd.com/en-us/support/product-security-and-privacy/product-security-bulletins/third-party-product-security-bulletin-for-treck-tcp-ip-stack-vulnerabilities"
},
{
"category": "mitigation",
"details": "CareStream",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.carestream.com/en/us/services-and-support/cybersecurity-and-privacy"
},
{
"category": "mitigation",
"details": "Caterpillar",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.cat.com/en_US/support/technology/connected-solutions-principles/security/caterpillar-cybersecurity-advisory.html"
},
{
"category": "mitigation",
"details": "DIGI International",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.digi.com/support/knowledge-base/digi-international-security-notice-treck-tcp-ip-st"
},
{
"category": "mitigation",
"details": "Eaton",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/eaton-security-bulletin-treck-tcp-ip-stack-vulnerabilities-ripple20.pdf"
},
{
"category": "mitigation",
"details": "Green Hills Software",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://support.ghs.com/psirt/PSA-2020-05/"
},
{
"category": "mitigation",
"details": "IDEC Corporation",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://us.idec.com/media/24-RD-0300-EN.pdf"
},
{
"category": "mitigation",
"details": "Johnson Controls",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.johnsoncontrols.com/cyber-solutions/security-advisories"
},
{
"category": "mitigation",
"details": "Miele",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2020-024"
},
{
"category": "mitigation",
"details": "Opto 22",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.opto22.com/support/resources-tools/knowledgebase/kb88981"
},
{
"category": "mitigation",
"details": "Pepperl+Fuchs",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://cert.vde.com/en/advisories/VDE-2021-028/"
},
{
"category": "mitigation",
"details": "Rockwell",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1126896"
},
{
"category": "mitigation",
"details": "Schneider Electric",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.se.com/ww/en/download/document/SESB-2020-168-01"
},
{
"category": "mitigation",
"details": "Smiths Medical",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
],
"url": "https://www.smiths-medical.com/company-information/news-and-events/news/2020/july/02/smiths-medical-cybersecurity-bulletin"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
}
]
}
]
}
CERTFR-2020-AVI-375
Vulnerability from certfr_avis - Published: - Updated:
Le 16 juin 2020, des chercheurs ont annoncé la découverte de dix-neuf vulnérabilités dans l'implémentation de la pile TCP/IP de Treck.
Ce composant est utilisé dans de nombreux systèmes embarqués et objets connectés, dont certains équipements médicaux et équipements de contrôle industriel. Les vulnérabilités les plus critiques permettent une exécution de code arbitraire à distance.
Lorsque des vulnérabilités sont découvertes dans un composant d'aussi bas niveau, il est très difficile de compiler une liste exhaustive de produits vulnérables. De plus, la simple présence de ce composant dans un produit n'implique pas forcément que celui-ci est vulnérable, parce que la vulnérabilité a déjà été corrigée ou encore parce que ce composant a été modifié et que la vulnérabilité n'est pas forcément atteignable.
Le CERT Carneggie Mellon ainsi que les chercheurs ont proposé sur leurs sites respectifs une liste de produits vulnérables et certains éditeurs ont déjà communiqué sur le statut de leurs produits (cf. section Documentation).
Parmi les dix-neuf vulnérabilités, les trois les plus critiques sont identifiées comme :
- CVE-2020-11896 : des datagrammes UDP fragmentés sur plusieurs paquets IP peuvent permettre un exécution de code arbitraire à distance ou un déni de service à distance sur des équipements avec une fonction d'IP Tunneling activée ;
- CVE-2020-11897 : des paquets IPv6 mal formés permettent une exécution de code arbitraire à distance [1] ;
- CVE-2020-11901 : une réponse DNS mal formée permet une exécution de code arbitraire à distance.
Si ces vulnérabilités sont jugées critiques, leur impact est atténué par les conditions d’exploitabilité.
Il convient donc de vérifier dans un premier temps si les équipements en bordure de réseau sont dans une configuration vulnérable. Si c'est le cas, il faut alors appliquer les mises à jour si elles sont disponibles ou mettre en œuvre les mesures de contournement.
[mise à jour du 26 octobre 2020] Les avis de sécurité Schneider Electric SEVD-2020-174-01 et SEVD-2020-175-01 ont été mis à jour le 22 octobre 2020 suite à la découverte d'impacts supplémentaires sur les produits Schneider. Des correctifs sont en cours de développement, certains ont déjà été publiés et des mesures de contournement sont identifiées et listées dans les avis à jour.
[1] cette vulnérabilité a été corrigée dans la version 5.0.1.35, sans être accompagnée d'un avis de sécurité à l'époque de sa mise à disposition.
Solution
Se référer au bulletin de sécurité des éditeurs pour l'obtention des correctifs (cf. section Documentation).
None{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "versions de la pile TCP/IP de Treck ant\u00e9rieures \u00e0 6.0.1.66",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 des \u00e9diteurs pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-11913",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11913"
},
{
"name": "CVE-2020-11910",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11910"
},
{
"name": "CVE-2020-11899",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11899"
},
{
"name": "CVE-2020-11908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11908"
},
{
"name": "CVE-2020-11906",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11906"
},
{
"name": "CVE-2020-11914",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11914"
},
{
"name": "CVE-2020-11897",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11897"
},
{
"name": "CVE-2020-11911",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11911"
},
{
"name": "CVE-2020-11900",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11900"
},
{
"name": "CVE-2020-11903",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11903"
},
{
"name": "CVE-2020-11912",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11912"
},
{
"name": "CVE-2020-11901",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11901"
},
{
"name": "CVE-2020-11904",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11904"
},
{
"name": "CVE-2020-11907",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11907"
},
{
"name": "CVE-2020-11905",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11905"
},
{
"name": "CVE-2020-11898",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11898"
},
{
"name": "CVE-2020-11896",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11896"
},
{
"name": "CVE-2020-11909",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11909"
},
{
"name": "CVE-2020-11902",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11902"
}
],
"links": [
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11903",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11903"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11905",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11905"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2020-174-01 du 22 juin 2020, mis \u00e0 jour le 23 juin 2020 et mis \u00e0 jour le 22 octobre 2020",
"url": "https://www.se.com/ww/en/download/document/SEVD-2020-174-01/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2020-175-01 du 23 juin 2020 mis \u00e0 jour le 22 octobre 2020",
"url": "https://www.se.com/ww/en/download/document/SEVD-2020-175-01/"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11911",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11911"
},
{
"title": "Annonce de Moxa du 30 juin 2020",
"url": "https://www.moxa.com/en/support/support/security-advisory/moxas-response-regarding-the-ripple20-vulnerabilities"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11902",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11902"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Aruba ARUBA-PSA-2020-006 du 23 juin 2020",
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt"
},
{
"title": "Communication de Green Hills Software du 16 juin 2020",
"url": "https://support.ghs.com/psirt/PSA-2020-05/"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11897",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11897"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Treck du 16 juin 2020",
"url": "https://treck.com/vulnerability-response-information/"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11908"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11907",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11907"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11910",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11910"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks PAN-SA-2020-0007 du 08 juillet 2020",
"url": "https://security.paloaltonetworks.com/PAN-SA-2020-0007"
},
{
"title": "Communication de Braun du 12 juin 2020",
"url": "https://www.bbraunusa.com/content/dam/b-braun/us/website/customer_communications/Skyline%20Response_Outlook_6.9.2020_FINAL1.pdf"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11906",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11906"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11904",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11904"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 HP HPSBPI03666 du 12 juin 2020",
"url": "https://support.hp.com/in-en/document/c06640149"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-treck-ip-stack-JyBQ5GyC du 17 juin 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11914",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11914"
},
{
"title": "Billet de blogue Ripple20 du 16 juin 2020",
"url": "https://www.jsof-tech.com/ripple20/"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11898",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11898"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11912",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11912"
},
{
"title": "Avis de s\u00e9curit\u00e9 du CERT Carnegie Mellon du 16 juin 2020",
"url": "https://kb.cert.org/vuls/id/257161"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11900",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11900"
},
{
"title": "Avis de s\u00e9curit\u00e9 ICS-CERT ICSA-20-168-01 du 16 juin 2020",
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-168-01"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11909",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11909"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11901",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11901"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11913",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11913"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11896",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11896"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11899",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11899"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2020-168-01 du 22 juin 2020, mis \u00e0 jour le 23 juin 2020",
"url": "https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet\u0026p_File_Name=SESB-2020-168-01_Treck_Vulnerabilities_Security_Bulletin.pdf\u0026p_Doc_Ref=SESB-2020-168-01"
}
],
"reference": "CERTFR-2020-AVI-375",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-01-08T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Le 16 juin 2020, des chercheurs ont annonc\u00e9 la d\u00e9couverte de dix-neuf\nvuln\u00e9rabilit\u00e9s dans l\u0027impl\u00e9mentation de la pile TCP/IP de Treck.\n\nCe composant est utilis\u00e9 dans de nombreux syst\u00e8mes embarqu\u00e9s et objets\nconnect\u00e9s, dont certains \u00e9quipements m\u00e9dicaux et \u00e9quipements de contr\u00f4le\nindustriel. Les vuln\u00e9rabilit\u00e9s les plus critiques permettent une\nex\u00e9cution de code arbitraire \u00e0 distance.\n\nLorsque des vuln\u00e9rabilit\u00e9s sont d\u00e9couvertes dans un composant d\u0027aussi\nbas niveau, il est tr\u00e8s difficile de compiler une liste exhaustive de\nproduits vuln\u00e9rables. De plus, la simple pr\u00e9sence de ce composant dans\nun produit n\u0027implique pas forc\u00e9ment que celui-ci est vuln\u00e9rable, parce\nque la vuln\u00e9rabilit\u00e9 a d\u00e9j\u00e0 \u00e9t\u00e9 corrig\u00e9e ou encore parce que ce\ncomposant a \u00e9t\u00e9 modifi\u00e9 et que la vuln\u00e9rabilit\u00e9 n\u0027est pas forc\u00e9ment\natteignable.\n\nLe CERT Carneggie Mellon ainsi que les chercheurs ont propos\u00e9 sur leurs\nsites respectifs une liste de produits vuln\u00e9rables et certains \u00e9diteurs\nont d\u00e9j\u00e0 communiqu\u00e9 sur le statut de leurs produits (cf. section\nDocumentation).\n\nParmi les dix-neuf vuln\u00e9rabilit\u00e9s, les trois les plus critiques sont\nidentifi\u00e9es comme :\n\n- CVE-2020-11896 : des datagrammes UDP fragment\u00e9s sur plusieurs\n paquets IP peuvent permettre un ex\u00e9cution de code arbitraire \u00e0\n distance ou un d\u00e9ni de service \u00e0 distance sur des \u00e9quipements avec\n une fonction d\u0027IP Tunneling activ\u00e9e ;\n- CVE-2020-11897 : des paquets IPv6 mal form\u00e9s permettent une\n ex\u00e9cution de code arbitraire \u00e0 distance \\[1\\] ;\n- CVE-2020-11901 : une r\u00e9ponse DNS mal form\u00e9e permet une ex\u00e9cution de\n code arbitraire \u00e0 distance.\n\nSi ces vuln\u00e9rabilit\u00e9s sont jug\u00e9es critiques, leur impact est att\u00e9nu\u00e9 par\nles conditions d\u2019exploitabilit\u00e9.\n\nIl convient donc de v\u00e9rifier dans un premier temps si les \u00e9quipements en\nbordure de r\u00e9seau sont dans une configuration vuln\u00e9rable. Si c\u0027est le\ncas, il faut alors appliquer les mises \u00e0 jour si elles sont disponibles\nou mettre en \u0153uvre les mesures de contournement.\n\n\u003cstrong\u003e\\[mise \u00e0 jour du 26 octobre 2020\\]\u003c/strong\u003e Les avis de s\u00e9curit\u00e9 Schneider\nElectric SEVD-2020-174-01 et SEVD-2020-175-01 ont \u00e9t\u00e9 mis \u00e0 jour le 22\noctobre 2020 suite \u00e0 la d\u00e9couverte d\u0027impacts suppl\u00e9mentaires sur les\nproduits Schneider. Des correctifs sont en cours de d\u00e9veloppement,\ncertains ont d\u00e9j\u00e0 \u00e9t\u00e9 publi\u00e9s et des mesures de contournement sont\nidentifi\u00e9es et list\u00e9es dans les avis \u00e0 jour.\n\n\u00a0\n\n\\[1\\] cette vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 corrig\u00e9e dans la version 5.0.1.35, sans\n\u00eatre accompagn\u00e9e d\u0027un avis de s\u00e9curit\u00e9 \u00e0 l\u0027\u00e9poque de sa mise \u00e0\ndisposition.\n",
"title": "[M\u00e0J] Multiples vuln\u00e9rabilit\u00e9s dans la pile TCP/IP de Treck",
"vendor_advisories": []
}
CERTFR-2020-AVI-375
Vulnerability from certfr_avis - Published: - Updated:
Le 16 juin 2020, des chercheurs ont annoncé la découverte de dix-neuf vulnérabilités dans l'implémentation de la pile TCP/IP de Treck.
Ce composant est utilisé dans de nombreux systèmes embarqués et objets connectés, dont certains équipements médicaux et équipements de contrôle industriel. Les vulnérabilités les plus critiques permettent une exécution de code arbitraire à distance.
Lorsque des vulnérabilités sont découvertes dans un composant d'aussi bas niveau, il est très difficile de compiler une liste exhaustive de produits vulnérables. De plus, la simple présence de ce composant dans un produit n'implique pas forcément que celui-ci est vulnérable, parce que la vulnérabilité a déjà été corrigée ou encore parce que ce composant a été modifié et que la vulnérabilité n'est pas forcément atteignable.
Le CERT Carneggie Mellon ainsi que les chercheurs ont proposé sur leurs sites respectifs une liste de produits vulnérables et certains éditeurs ont déjà communiqué sur le statut de leurs produits (cf. section Documentation).
Parmi les dix-neuf vulnérabilités, les trois les plus critiques sont identifiées comme :
- CVE-2020-11896 : des datagrammes UDP fragmentés sur plusieurs paquets IP peuvent permettre un exécution de code arbitraire à distance ou un déni de service à distance sur des équipements avec une fonction d'IP Tunneling activée ;
- CVE-2020-11897 : des paquets IPv6 mal formés permettent une exécution de code arbitraire à distance [1] ;
- CVE-2020-11901 : une réponse DNS mal formée permet une exécution de code arbitraire à distance.
Si ces vulnérabilités sont jugées critiques, leur impact est atténué par les conditions d’exploitabilité.
Il convient donc de vérifier dans un premier temps si les équipements en bordure de réseau sont dans une configuration vulnérable. Si c'est le cas, il faut alors appliquer les mises à jour si elles sont disponibles ou mettre en œuvre les mesures de contournement.
[mise à jour du 26 octobre 2020] Les avis de sécurité Schneider Electric SEVD-2020-174-01 et SEVD-2020-175-01 ont été mis à jour le 22 octobre 2020 suite à la découverte d'impacts supplémentaires sur les produits Schneider. Des correctifs sont en cours de développement, certains ont déjà été publiés et des mesures de contournement sont identifiées et listées dans les avis à jour.
[1] cette vulnérabilité a été corrigée dans la version 5.0.1.35, sans être accompagnée d'un avis de sécurité à l'époque de sa mise à disposition.
Solution
Se référer au bulletin de sécurité des éditeurs pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "versions de la pile TCP/IP de Treck ant\u00e9rieures \u00e0 6.0.1.66",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 des \u00e9diteurs pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-11913",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11913"
},
{
"name": "CVE-2020-11910",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11910"
},
{
"name": "CVE-2020-11899",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11899"
},
{
"name": "CVE-2020-11908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11908"
},
{
"name": "CVE-2020-11906",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11906"
},
{
"name": "CVE-2020-11914",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11914"
},
{
"name": "CVE-2020-11897",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11897"
},
{
"name": "CVE-2020-11911",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11911"
},
{
"name": "CVE-2020-11900",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11900"
},
{
"name": "CVE-2020-11903",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11903"
},
{
"name": "CVE-2020-11912",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11912"
},
{
"name": "CVE-2020-11901",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11901"
},
{
"name": "CVE-2020-11904",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11904"
},
{
"name": "CVE-2020-11907",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11907"
},
{
"name": "CVE-2020-11905",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11905"
},
{
"name": "CVE-2020-11898",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11898"
},
{
"name": "CVE-2020-11896",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11896"
},
{
"name": "CVE-2020-11909",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11909"
},
{
"name": "CVE-2020-11902",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11902"
}
],
"links": [
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11903",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11903"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11905",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11905"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2020-174-01 du 22 juin 2020, mis \u00e0 jour le 23 juin 2020 et mis \u00e0 jour le 22 octobre 2020",
"url": "https://www.se.com/ww/en/download/document/SEVD-2020-174-01/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2020-175-01 du 23 juin 2020 mis \u00e0 jour le 22 octobre 2020",
"url": "https://www.se.com/ww/en/download/document/SEVD-2020-175-01/"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11911",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11911"
},
{
"title": "Annonce de Moxa du 30 juin 2020",
"url": "https://www.moxa.com/en/support/support/security-advisory/moxas-response-regarding-the-ripple20-vulnerabilities"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11902",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11902"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Aruba ARUBA-PSA-2020-006 du 23 juin 2020",
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt"
},
{
"title": "Communication de Green Hills Software du 16 juin 2020",
"url": "https://support.ghs.com/psirt/PSA-2020-05/"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11897",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11897"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Treck du 16 juin 2020",
"url": "https://treck.com/vulnerability-response-information/"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11908"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11907",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11907"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11910",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11910"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks PAN-SA-2020-0007 du 08 juillet 2020",
"url": "https://security.paloaltonetworks.com/PAN-SA-2020-0007"
},
{
"title": "Communication de Braun du 12 juin 2020",
"url": "https://www.bbraunusa.com/content/dam/b-braun/us/website/customer_communications/Skyline%20Response_Outlook_6.9.2020_FINAL1.pdf"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11906",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11906"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11904",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11904"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 HP HPSBPI03666 du 12 juin 2020",
"url": "https://support.hp.com/in-en/document/c06640149"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-treck-ip-stack-JyBQ5GyC du 17 juin 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11914",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11914"
},
{
"title": "Billet de blogue Ripple20 du 16 juin 2020",
"url": "https://www.jsof-tech.com/ripple20/"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11898",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11898"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11912",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11912"
},
{
"title": "Avis de s\u00e9curit\u00e9 du CERT Carnegie Mellon du 16 juin 2020",
"url": "https://kb.cert.org/vuls/id/257161"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11900",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11900"
},
{
"title": "Avis de s\u00e9curit\u00e9 ICS-CERT ICSA-20-168-01 du 16 juin 2020",
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-168-01"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11909",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11909"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11901",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11901"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11913",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11913"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11896",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11896"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-11899",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11899"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2020-168-01 du 22 juin 2020, mis \u00e0 jour le 23 juin 2020",
"url": "https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet\u0026p_File_Name=SESB-2020-168-01_Treck_Vulnerabilities_Security_Bulletin.pdf\u0026p_Doc_Ref=SESB-2020-168-01"
}
],
"reference": "CERTFR-2020-AVI-375",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-01-08T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Le 16 juin 2020, des chercheurs ont annonc\u00e9 la d\u00e9couverte de dix-neuf\nvuln\u00e9rabilit\u00e9s dans l\u0027impl\u00e9mentation de la pile TCP/IP de Treck.\n\nCe composant est utilis\u00e9 dans de nombreux syst\u00e8mes embarqu\u00e9s et objets\nconnect\u00e9s, dont certains \u00e9quipements m\u00e9dicaux et \u00e9quipements de contr\u00f4le\nindustriel. Les vuln\u00e9rabilit\u00e9s les plus critiques permettent une\nex\u00e9cution de code arbitraire \u00e0 distance.\n\nLorsque des vuln\u00e9rabilit\u00e9s sont d\u00e9couvertes dans un composant d\u0027aussi\nbas niveau, il est tr\u00e8s difficile de compiler une liste exhaustive de\nproduits vuln\u00e9rables. De plus, la simple pr\u00e9sence de ce composant dans\nun produit n\u0027implique pas forc\u00e9ment que celui-ci est vuln\u00e9rable, parce\nque la vuln\u00e9rabilit\u00e9 a d\u00e9j\u00e0 \u00e9t\u00e9 corrig\u00e9e ou encore parce que ce\ncomposant a \u00e9t\u00e9 modifi\u00e9 et que la vuln\u00e9rabilit\u00e9 n\u0027est pas forc\u00e9ment\natteignable.\n\nLe CERT Carneggie Mellon ainsi que les chercheurs ont propos\u00e9 sur leurs\nsites respectifs une liste de produits vuln\u00e9rables et certains \u00e9diteurs\nont d\u00e9j\u00e0 communiqu\u00e9 sur le statut de leurs produits (cf. section\nDocumentation).\n\nParmi les dix-neuf vuln\u00e9rabilit\u00e9s, les trois les plus critiques sont\nidentifi\u00e9es comme :\n\n- CVE-2020-11896 : des datagrammes UDP fragment\u00e9s sur plusieurs\n paquets IP peuvent permettre un ex\u00e9cution de code arbitraire \u00e0\n distance ou un d\u00e9ni de service \u00e0 distance sur des \u00e9quipements avec\n une fonction d\u0027IP Tunneling activ\u00e9e ;\n- CVE-2020-11897 : des paquets IPv6 mal form\u00e9s permettent une\n ex\u00e9cution de code arbitraire \u00e0 distance \\[1\\] ;\n- CVE-2020-11901 : une r\u00e9ponse DNS mal form\u00e9e permet une ex\u00e9cution de\n code arbitraire \u00e0 distance.\n\nSi ces vuln\u00e9rabilit\u00e9s sont jug\u00e9es critiques, leur impact est att\u00e9nu\u00e9 par\nles conditions d\u2019exploitabilit\u00e9.\n\nIl convient donc de v\u00e9rifier dans un premier temps si les \u00e9quipements en\nbordure de r\u00e9seau sont dans une configuration vuln\u00e9rable. Si c\u0027est le\ncas, il faut alors appliquer les mises \u00e0 jour si elles sont disponibles\nou mettre en \u0153uvre les mesures de contournement.\n\n\u003cstrong\u003e\\[mise \u00e0 jour du 26 octobre 2020\\]\u003c/strong\u003e Les avis de s\u00e9curit\u00e9 Schneider\nElectric SEVD-2020-174-01 et SEVD-2020-175-01 ont \u00e9t\u00e9 mis \u00e0 jour le 22\noctobre 2020 suite \u00e0 la d\u00e9couverte d\u0027impacts suppl\u00e9mentaires sur les\nproduits Schneider. Des correctifs sont en cours de d\u00e9veloppement,\ncertains ont d\u00e9j\u00e0 \u00e9t\u00e9 publi\u00e9s et des mesures de contournement sont\nidentifi\u00e9es et list\u00e9es dans les avis \u00e0 jour.\n\n\u00a0\n\n\\[1\\] cette vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 corrig\u00e9e dans la version 5.0.1.35, sans\n\u00eatre accompagn\u00e9e d\u0027un avis de s\u00e9curit\u00e9 \u00e0 l\u0027\u00e9poque de sa mise \u00e0\ndisposition.\n",
"title": "[M\u00e0J] Multiples vuln\u00e9rabilit\u00e9s dans la pile TCP/IP de Treck",
"vendor_advisories": []
}
CISCO-SA-TRECK-IP-STACK-JYBQ5GYC
Vulnerability from csaf_cisco - Published: 2020-06-17 20:00 - Updated: 2020-08-21 16:40Notes
{
"document": {
"acknowledgments": [
{
"summary": "These vulnerabilities were discovered and reported to CERT/CC by JSOF."
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"notes": [
{
"category": "summary",
"text": "A set of previously unknown vulnerabilities on the Treck IP stack implementation were disclosed on June 16, 2020. The vulnerabilities are collectively known as Ripple20. Exploitation of these vulnerabilities could result in remote code execution, denial of service (DoS), or information disclosure, depending on the specific vulnerability.\r\n\r\nThis advisory will be updated as additional information becomes available.\r\n\r\nThis advisory is available at the following link:\r\nhttps://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC [\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC\"]",
"title": "Summary"
},
{
"category": "general",
"text": "Cisco investigated its product line to determine which products may be affected by these vulnerabilities.\r\n\r\nThe Vulnerable Products [\"#vp\"] section of this advisory includes Cisco bug IDs for each affected product. The bugs are accessible through the Cisco Bug Search Tool [\"https://bst.cloudapps.cisco.com/bugsearch/bug/BUGID\"] and contain additional platform-specific information, including workarounds (if available) and fixed software releases.\r\n\r\nAny product or service not listed in the Vulnerable Products [\"#vp\"] section of this advisory is to be considered not vulnerable.",
"title": "Affected Products"
},
{
"category": "general",
"text": "The following table lists Cisco products that are affected by the vulnerabilities that are described in this advisory. If a future release date is indicated for software, the date provided represents an estimate based on all information known to Cisco as of the Last Updated date at the top of the advisory. Availability dates are subject to change based on a number of factors, including satisfactory testing results and delivery of other priority features and fixes. If no version or date is listed for an affected component (indicated by a blank field and/or an advisory designation of Interim), Cisco is continuing to evaluate the fix and will update the advisory as additional information becomes available. After the advisory is marked Final, customers should refer to the associated Cisco bug(s) for further details. Unless otherwise documented, all software releases prior to the first fixed release are to be considered affected by these vulnerabilities.\r\n Product Cisco Bug ID Fixed Release Availability Routing and Switching - Enterprise and Service Provider Cisco ASR 5000 CSCvu68945 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvu68945\"] 21.5.27 (30 Jul 2020) Cisco ASR 5500 CSCvu68945 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvu68945\"] 21.5.27 (30 Jul 2020)\r\n21.8.x (14 Sep 2020)\r\n21.9.x (8 Sep 2020)\r\n21.10.x (2 Sep 2020)\r\n21.11.15 (29 Jul 2020)\r\n21.12.x (4 Sep 2020)\r\n21.13.x (31 Aug 2020)\r\n21.14.22 (30 Jul 2020)\r\n21.15.45 (22 Jul 2020)\r\n21.16.x (25 Aug 2020)\r\n21.17.10 (20 Aug 2020)\r\n21.18.8 (24 Aug 2020)\r\n21.19.5 (19 Aug 2020)\r\n21.20.2 (24 Jul 2020) Cisco Virtual Packet Core CSCvu68945 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvu68945\"] 21.5.27 (30 Jul 2020)\r\n21.8.x (14 Sep 2020)\r\n21.9.x (8 Sep 2020)\r\n21.10.x (2 Sep 2020)\r\n21.11.15 (29 Jul 2020)\r\n21.12.x (4 Sep 2020)\r\n21.13.x (31 Aug 2020)\r\n21.14.22 (30 Jul 2020)\r\n21.15.45 (22 Jul 2020)\r\n21.16.x (25 Aug 2020)\r\n21.17.10 (20 Aug 2020)\r\n21.18.8 (24 Aug 2020)\r\n21.19.5 (19 Aug 2020)\r\n21.20.2 (24 Jul 2020)\r\nNote: Exposure to the vulnerabilities may be configuration dependent. See the Cisco bug(s) for the most complete product-specific information.\r\n Cisco StarOS Software\r\nIn the following table, the left column lists the Cisco StarOS Software features that are vulnerable. The right column indicates the basic configuration for the feature from the show running-config CLI command. If a device is configured for one of these features, it is vulnerable.\r\n Cisco StarOS Software Feature Vulnerable Configuration URL-based Re-addressing\r\nflow action url-readdress server [...]\r\n SIP ALG NAT Inspection\r\nfirewall nat-alg sip [...]\r\n H323 ALG NAT Inspection\r\nfirewall nat-alg h323 [...]\r\n Inline TCP Optimization (CUSP)\r\ntcp-acceleration [...]\r\n\r\nIf a Cisco StarOS Software deployment uses a vulnerable configuration, as described above, it may be affected by the following vulnerabilities:\r\n\r\nCVE-2020-11896: Malformed IPv4 Tunneled Packets Processing Remote Code Execution Vulnerability\r\nCVE-2020-11898: Malformed IPv4 Packets Processing Out-of-Bounds Read Vulnerability\r\nCVE-2020-11899: Improper Input Validation in IPv6 Out-of-Bounds Read Vulnerability\r\nCVE-2020-11900: IPv4 Tunneling Component Double-Free Vulnerability\r\nCVE-2020-11907: Improper Packet Length Checks Integer Underflow Vulnerability\r\nCVE-2020-11909: Improper Input Validation in IPv4 Component\r\nCVE-2020-11912: Improper Input Validation in TCP Component\r\nCVE-2020-11913: Improper Input Validation in IPv6 Component\r\n\r\nCisco has confirmed that Cisco StarOS Software is not affected by the following vulnerabilities:\r\n\r\nCVE-2020-11897: Malformed IPv6 Packets Processing Out-of-Bounds Read and Write Vulnerability\r\nCVE-2020-11901: DNS Response Processing Remote Code Execution Vulnerability\r\nCVE-2020-11902: Out-of-Bounds Read When Processing IPv6 over IPv4 Packets\r\nCVE-2020-11903: Out-of-Bounds Read Processing DHCP Response\r\nCVE-2020-11904: Integer Overflow in Memory Allocation\r\nCVE-2020-11905: DHCPv6 Out-of-Bounds Read Vulnerability\r\nCVE-2020-11906: Ethernet Link Layer Component Integer Underflow Vulnerability\r\nCVE-2020-11908: Improper Null Termination in DHCP Component\r\nCVE-2020-11910: Improper Input Validation in ICMPv4 Component\r\nCVE-2020-11911: Improper Access Control in ICMPv4 Component\r\nCVE-2020-11914: Improper Input Validation in ARP Component",
"title": "Vulnerable Products"
},
{
"category": "general",
"text": "Only products and services listed in the Vulnerable Products [\"#vulnerable\"] section of this advisory are known to be affected by these vulnerabilities.",
"title": "Products Confirmed Not Vulnerable"
},
{
"category": "general",
"text": "There are no workarounds that address these vulnerabilities.\r\n\r\nA set of network based mitigations has been documented by the CERT Coordination Center and is available at the following address:\r\n\r\nhttps://github.com/CERTCC/PoC-Exploits/blob/master/vu-257161/recommendations.md [\"https://github.com/CERTCC/PoC-Exploits/blob/master/vu-257161/recommendations.md\"]",
"title": "Workarounds"
},
{
"category": "general",
"text": "For information about fixed software releases, consult the Cisco bugs identified in the Vulnerable Products [\"#vp\"] section of this advisory.\r\n\r\nWhen considering software upgrades [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"], customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page [\"https://www.cisco.com/go/psirt\"], to determine exposure and a complete upgrade solution.\r\n\r\nIn all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.",
"title": "Fixed Software"
},
{
"category": "general",
"text": "To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html\"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.",
"title": "Vulnerability Policy"
},
{
"category": "general",
"text": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any malicious use of the vulnerabilities that are described in this advisory.",
"title": "Exploitation and Public Announcements"
},
{
"category": "general",
"text": "These vulnerabilities were discovered and reported to CERT/CC by JSOF.",
"title": "Source"
},
{
"category": "legal_disclaimer",
"text": "THIS DOCUMENT IS PROVIDED ON AN \"AS IS\" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME. CISCO EXPECTS TO UPDATE THIS DOCUMENT AS NEW INFORMATION BECOMES AVAILABLE.\r\n\r\nA standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.",
"title": "Legal Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "Emergency Support:\r\n+1 877 228 7302 (toll-free within North America)\r\n+1 408 525 6532 (International direct-dial)\r\nNon-emergency Support:\r\nEmail: psirt@cisco.com\r\nSupport requests that are received via e-mail are typically acknowledged within 48 hours.",
"issuing_authority": "Cisco product security incident response is the responsibility of the Cisco Product Security Incident Response Team (PSIRT). The Cisco PSIRT is a dedicated, global team that manages the receipt, investigation, and public reporting of security vulnerability information that is related to Cisco products and networks. The on-call Cisco PSIRT works 24x7 with Cisco customers, independent security researchers, consultants, industry organizations, and other vendors to identify possible security issues with Cisco products and networks.\r\nMore information can be found in Cisco Security Vulnerability Policy available at https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html",
"name": "Cisco",
"namespace": "https://wwww.cisco.com"
},
"references": [
{
"category": "self",
"summary": "Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC"
},
{
"category": "external",
"summary": "Cisco Security Vulnerability Policy",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html"
},
{
"category": "external",
"summary": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC"
},
{
"category": "external",
"summary": "Cisco Bug Search Tool",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/BUGID"
},
{
"category": "external",
"summary": "CSCvu68945",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvu68945"
},
{
"category": "external",
"summary": "CSCvu68945",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvu68945"
},
{
"category": "external",
"summary": "CSCvu68945",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvu68945"
},
{
"category": "external",
"summary": "https://github.com/CERTCC/PoC-Exploits/blob/master/vu-257161/recommendations.md",
"url": "https://github.com/CERTCC/PoC-Exploits/blob/master/vu-257161/recommendations.md"
},
{
"category": "external",
"summary": "considering software upgrades",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes"
},
{
"category": "external",
"summary": "Cisco Security Advisories page",
"url": "https://www.cisco.com/go/psirt"
},
{
"category": "external",
"summary": "Security Vulnerability Policy",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html"
}
],
"title": "Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
"tracking": {
"current_release_date": "2020-08-21T16:40:13+00:00",
"generator": {
"date": "2022-10-22T03:05:23+00:00",
"engine": {
"name": "TVCE"
}
},
"id": "cisco-sa-treck-ip-stack-JyBQ5GyC",
"initial_release_date": "2020-06-17T20:00:00+00:00",
"revision_history": [
{
"date": "2020-06-17T20:08:26+00:00",
"number": "1.0.0",
"summary": "Initial public release."
},
{
"date": "2020-06-22T21:59:35+00:00",
"number": "1.1.0",
"summary": "Updated the lists of products under investigation and vulnerable products."
},
{
"date": "2020-07-07T19:09:00+00:00",
"number": "1.2.0",
"summary": "Updated the list of vulnerable products: changed the product naming to refer to the affected platform rather than to the function (for example, GGSN, IPSG) for StarOS-based products. No products remain under investigation."
},
{
"date": "2020-07-10T17:10:26+00:00",
"number": "1.3.0",
"summary": "Added the fixed release availability information for vulnerable products. Added links to Snort rules."
},
{
"date": "2020-07-17T15:59:05+00:00",
"number": "1.4.0",
"summary": "Updated the vulnerable products with fix availability information. Added a reference to mitigations documented by CERT/CC."
},
{
"date": "2020-07-22T18:35:23+00:00",
"number": "1.5.0",
"summary": "Updated fixed release availability information. Clarified that exposure to the vulnerabilities may be configuration dependent."
},
{
"date": "2020-07-24T17:04:38+00:00",
"number": "1.6.0",
"summary": "Updated fixed release availability information. Documented vulnerable StarOS configurations. Specified which vulnerabilities affect StarOS."
},
{
"date": "2020-07-29T16:09:58+00:00",
"number": "1.7.0",
"summary": "Updated fixed release availability information."
},
{
"date": "2020-08-21T16:40:13+00:00",
"number": "1.8.0",
"summary": "Updated fixed release availability information. Added links to additional Snort rules."
}
],
"status": "interim",
"version": "1.8.0"
}
},
"vulnerabilities": [
{
"cve": "CVE-2020-11896",
"notes": [
{
"category": "general",
"text": "No additional information for this vulneraiblity is currently avaialbe.",
"title": "No Notes"
}
],
"release_date": "2020-06-17T20:00:00+00:00",
"remediations": [
{
"category": "none_available",
"details": "No remediation is available at this time."
}
],
"title": "Malformed IPv4 Tunnelled Packets Processing Remote Code Execution Vulnerability"
},
{
"cve": "CVE-2020-11897",
"notes": [
{
"category": "general",
"text": "No additional information for this vulneraiblity is currently avaialbe.",
"title": "No Notes"
}
],
"release_date": "2020-06-17T20:00:00+00:00",
"remediations": [
{
"category": "none_available",
"details": "No remediation is available at this time."
}
],
"title": "Malformed IPv6 Packets Processing Out Of Bounds Read Write Vulnerability"
},
{
"cve": "CVE-2020-11901",
"notes": [
{
"category": "general",
"text": "No additional information for this vulneraiblity is currently avaialbe.",
"title": "No Notes"
}
],
"release_date": "2020-06-17T20:00:00+00:00",
"remediations": [
{
"category": "none_available",
"details": "No remediation is available at this time."
}
],
"title": "DNS Response Processing Remote Code Execution Vulnerability"
},
{
"cve": "CVE-2020-11900",
"notes": [
{
"category": "general",
"text": "No additional information for this vulneraiblity is currently avaialbe.",
"title": "No Notes"
}
],
"release_date": "2020-06-17T20:00:00+00:00",
"remediations": [
{
"category": "none_available",
"details": "No remediation is available at this time."
}
],
"title": "Double free in IPv4 tunnelling compnent"
},
{
"cve": "CVE-2020-11898",
"notes": [
{
"category": "general",
"text": "No additional information for this vulneraiblity is currently avaialbe.",
"title": "No Notes"
}
],
"release_date": "2020-06-16T17:21:00+00:00",
"remediations": [
{
"category": "none_available",
"details": "No remediation is available at this time."
}
],
"title": "vuln-CVE-2020-11898"
},
{
"cve": "CVE-2020-11904",
"notes": [
{
"category": "general",
"text": "No additional information for this vulneraiblity is currently avaialbe.",
"title": "No Notes"
}
],
"release_date": "2020-06-17T16:00:00+00:00",
"remediations": [
{
"category": "none_available",
"details": "No remediation is available at this time."
}
],
"title": "vuln-CVE-2020-11904"
},
{
"cve": "CVE-2020-11903",
"notes": [
{
"category": "general",
"text": "No additional information for this vulneraiblity is currently avaialbe.",
"title": "No Notes"
}
],
"release_date": "2020-06-16T17:22:00+00:00",
"remediations": [
{
"category": "none_available",
"details": "No remediation is available at this time."
}
],
"title": "vuln-CVE-2020-11903"
},
{
"cve": "CVE-2020-11899",
"notes": [
{
"category": "general",
"text": "No additional information for this vulneraiblity is currently avaialbe.",
"title": "No Notes"
}
],
"release_date": "2020-06-17T20:00:00+00:00",
"remediations": [
{
"category": "none_available",
"details": "No remediation is available at this time."
}
],
"title": "Improper Input Validation in IPv6 handling Our Of Bounds Read Vulnerability"
},
{
"cve": "CVE-2020-11910",
"notes": [
{
"category": "general",
"text": "No additional information for this vulneraiblity is currently avaialbe.",
"title": "No Notes"
}
],
"release_date": "2020-06-17T20:00:00+00:00",
"remediations": [
{
"category": "none_available",
"details": "No remediation is available at this time."
}
],
"title": "Improper input validation in ICMPv4 component"
},
{
"cve": "CVE-2020-11902",
"notes": [
{
"category": "general",
"text": "No additional information for this vulneraiblity is currently avaialbe.",
"title": "No Notes"
}
],
"release_date": "2020-06-17T20:00:00+00:00",
"remediations": [
{
"category": "none_available",
"details": "No remediation is available at this time."
}
],
"title": "Out of Bounds Read when processing IPv6OverIPv4 packets"
},
{
"cve": "CVE-2020-11914",
"notes": [
{
"category": "general",
"text": "No additional information for this vulneraiblity is currently avaialbe.",
"title": "No Notes"
}
],
"release_date": "2020-06-17T20:00:00+00:00",
"remediations": [
{
"category": "none_available",
"details": "No remediation is available at this time."
}
],
"title": "Improper Input Validation in ARP component"
},
{
"cve": "CVE-2020-11906",
"notes": [
{
"category": "general",
"text": "No additional information for this vulneraiblity is currently avaialbe.",
"title": "No Notes"
}
],
"release_date": "2020-06-17T20:00:00+00:00",
"remediations": [
{
"category": "none_available",
"details": "No remediation is available at this time."
}
],
"title": "Integer Underflow in Ethernet Link Layer Component"
},
{
"cve": "CVE-2020-11911",
"notes": [
{
"category": "general",
"text": "No additional information for this vulneraiblity is currently avaialbe.",
"title": "No Notes"
}
],
"release_date": "2020-06-17T20:00:00+00:00",
"remediations": [
{
"category": "none_available",
"details": "No remediation is available at this time."
}
],
"title": "Improper Access Control in ICMPv4 component"
},
{
"cve": "CVE-2020-11907",
"notes": [
{
"category": "general",
"text": "No additional information for this vulneraiblity is currently avaialbe.",
"title": "No Notes"
}
],
"release_date": "2020-06-17T20:00:00+00:00",
"remediations": [
{
"category": "none_available",
"details": "No remediation is available at this time."
}
],
"title": "Integer Underflow in TCP processing"
},
{
"cve": "CVE-2020-11912",
"notes": [
{
"category": "general",
"text": "No additional information for this vulneraiblity is currently avaialbe.",
"title": "No Notes"
}
],
"release_date": "2020-06-17T20:00:00+00:00",
"remediations": [
{
"category": "none_available",
"details": "No remediation is available at this time."
}
],
"title": "Improper Input Validation in TCP component"
},
{
"cve": "CVE-2020-11908",
"notes": [
{
"category": "general",
"text": "No additional information for this vulneraiblity is currently avaialbe.",
"title": "No Notes"
}
],
"release_date": "2020-06-17T20:00:00+00:00",
"remediations": [
{
"category": "none_available",
"details": "No remediation is available at this time."
}
],
"title": "Improper Null Termination in DHCP component"
},
{
"cve": "CVE-2020-11913",
"notes": [
{
"category": "general",
"text": "No additional information for this vulneraiblity is currently avaialbe.",
"title": "No Notes"
}
],
"release_date": "2020-06-17T20:00:00+00:00",
"remediations": [
{
"category": "none_available",
"details": "No remediation is available at this time."
}
],
"title": "Improper Input Validation in IPv6 component"
},
{
"cve": "CVE-2020-11909",
"notes": [
{
"category": "general",
"text": "No additional information for this vulneraiblity is currently avaialbe.",
"title": "No Notes"
}
],
"release_date": "2020-06-17T20:00:00+00:00",
"remediations": [
{
"category": "none_available",
"details": "No remediation is available at this time."
}
],
"title": "Improper input validation in IPv4 component"
},
{
"cve": "CVE-2020-11905",
"notes": [
{
"category": "general",
"text": "No additional information for this vulneraiblity is currently avaialbe.",
"title": "No Notes"
}
],
"release_date": "2020-06-17T20:00:00+00:00",
"remediations": [
{
"category": "none_available",
"details": "No remediation is available at this time."
}
],
"title": "Out Of Bounds read in DHCPv6 component"
}
]
}
GHSA-H43V-QW2F-527M
Vulnerability from github – Published: 2022-05-24 17:20 – Updated: 2022-05-24 17:20The Treck TCP/IP stack before 6.0.1.66 allows Remote Code execution via a single invalid DNS response.
{
"affected": [],
"aliases": [
"CVE-2020-11901"
],
"database_specific": {
"cwe_ids": [
"CWE-20"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2020-06-17T11:15:00Z",
"severity": "HIGH"
},
"details": "The Treck TCP/IP stack before 6.0.1.66 allows Remote Code execution via a single invalid DNS response.",
"id": "GHSA-h43v-qw2f-527m",
"modified": "2022-05-24T17:20:43Z",
"published": "2022-05-24T17:20:43Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11901"
},
{
"type": "WEB",
"url": "https://jsof-tech.com/vulnerability-disclosure-policy"
},
{
"type": "WEB",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC"
},
{
"type": "WEB",
"url": "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities"
},
{
"type": "WEB",
"url": "https://www.jsof-tech.com/ripple20"
},
{
"type": "WEB",
"url": "https://www.kb.cert.org/vuls/id/257161"
},
{
"type": "WEB",
"url": "https://www.treck.com"
},
{
"type": "WEB",
"url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt"
}
],
"schema_version": "1.4.0",
"severity": []
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.