Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-22156 (GCVE-0-2021-22156)
Vulnerability from cvelistv5 – Published: 2021-08-17 18:35 – Updated: 2025-08-22 15:20- Denial of service or arbitrary code execution
- CWE-190 - Integer Overflow or Wraparound
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| BlackBerry | QNX Software Development Platform (SDP), QNX OS for Medical and QNX OS for Safety |
Affected:
QNX SDP 6.5.0 SP1 and earlier
Affected: QNX OS for Medical 1.1 and earlier Affected: QNX OS for Safety 1.0.1 and earlier |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T18:37:17.775Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://support.blackberry.com/kb/articleDetail?articleNumber=000082334"
},
{
"name": "20210818 BlackBerry QNX-2021-001 Vulnerability Affecting Cisco Products: August 2021",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-qnx-TOxjVPdL"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "QNX Software Development Platform (SDP), QNX OS for Medical and QNX OS for Safety",
"vendor": "BlackBerry",
"versions": [
{
"status": "affected",
"version": "QNX SDP 6.5.0 SP1 and earlier"
},
{
"status": "affected",
"version": "QNX OS for Medical 1.1 and earlier"
},
{
"status": "affected",
"version": "QNX OS for Safety 1.0.1 and earlier"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eAn integer overflow vulnerability in the calloc() function of the C runtime library of affected versions of BlackBerry\u00ae QNX Software Development Platform (SDP) version(s) 6.5.0SP1 and earlier, QNX OS for Medical 1.1 and earlier, and QNX OS for Safety 1.0.1 and earlier that could allow an attacker to potentially perform a denial of service or execute arbitrary code.\u003c/p\u003e"
}
],
"value": "An integer overflow vulnerability in the calloc() function of the C runtime library of affected versions of BlackBerry\u00ae QNX Software Development Platform (SDP) version(s) 6.5.0SP1 and earlier, QNX OS for Medical 1.1 and earlier, and QNX OS for Safety 1.0.1 and earlier that could allow an attacker to potentially perform a denial of service or execute arbitrary code."
}
],
"impacts": [
{
"capecId": "CAPEC-92",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-92 Forced Integer Overflow"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Denial of service or arbitrary code execution",
"lang": "en"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-190",
"description": "CWE-190 Integer Overflow or Wraparound",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-22T15:20:31.911Z",
"orgId": "dbe78b00-5e7b-4fda-8748-329789ecfc5c",
"shortName": "blackberry"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://support.blackberry.com/kb/articleDetail?articleNumber=000082334"
},
{
"name": "20210818 BlackBerry QNX-2021-001 Vulnerability Affecting Cisco Products: August 2021",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-qnx-TOxjVPdL"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secure@blackberry.com",
"ID": "CVE-2021-22156",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "BlackBerry QNX Software Development Platform (SDP), QNX OS for Medical and QNX OS for Safety",
"version": {
"version_data": [
{
"version_value": "QNX SDP 6.5.0 SP1 and earlier"
},
{
"version_value": "QNX OS for Medical 1.1 and earlier"
},
{
"version_value": "QNX OS for Safety 1.0.1 and earlier"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An integer overflow vulnerability in the calloc() function of the C runtime library of affected versions of BlackBerry\u00ae QNX Software Development Platform (SDP) version(s) 6.5.0SP1 and earlier, QNX OS for Medical 1.1 and earlier, and QNX OS for Safety 1.0.1 and earlier that could allow an attacker to potentially perform a denial of service or execute arbitrary code."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Denial of service or arbitrary code execution"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://support.blackberry.com/kb/articleDetail?articleNumber=000082334",
"refsource": "MISC",
"url": "https://support.blackberry.com/kb/articleDetail?articleNumber=000082334"
},
{
"name": "20210818 BlackBerry QNX-2021-001 Vulnerability Affecting Cisco Products: August 2021",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-qnx-TOxjVPdL"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "dbe78b00-5e7b-4fda-8748-329789ecfc5c",
"assignerShortName": "blackberry",
"cveId": "CVE-2021-22156",
"datePublished": "2021-08-17T18:35:38",
"dateReserved": "2021-01-04T00:00:00",
"dateUpdated": "2025-08-22T15:20:31.911Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:blackberry:qnx_software_development_platform:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"6.5.0\", \"matchCriteriaId\": \"F6FCB90F-1888-4350-A16E-5F4951F903B3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:blackberry:qnx_software_development_platform:6.5.0:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"B18FCC7D-290C-4FC7-80B7-C678515E403C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:blackberry:qnx_software_development_platform:6.5.0:sp1:*:*:*:*:*:*\", \"matchCriteriaId\": \"11F2C680-2F44-4CBC-BC7E-B608726302D2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:blackberry:qnx_os_for_medical:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.1.1\", \"matchCriteriaId\": \"75A18CC9-673C-4FA8-875E-08925D2A97AB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:blackberry:qnx_os_for_safety:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.0.2\", \"matchCriteriaId\": \"4C6CE0A1-8E88-405B-BD6D-48FCD084CB07\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"An integer overflow vulnerability in the calloc() function of the C runtime library of affected versions of BlackBerry\\u00ae QNX Software Development Platform (SDP) version(s) 6.5.0SP1 and earlier, QNX OS for Medical 1.1 and earlier, and QNX OS for Safety 1.0.1 and earlier that could allow an attacker to potentially perform a denial of service or execute arbitrary code.\"}, {\"lang\": \"es\", \"value\": \"Una vulnerabilidad de desbordamiento de enteros en la funci\\u00f3n calloc() de la biblioteca de tiempo de ejecuci\\u00f3n C de las versiones afectadas de BlackBerry\\u00ae QNX Software Development Platform (SDP) versi\\u00f3n(es) 6.5.0SP1 y anteriores, QNX OS for Medical versiones 1.1 y anteriores, y QNX OS for Safety versiones 1.0.1 y anteriores, que podr\\u00eda permitir a un atacante llevar a cabo potencialmente una denegaci\\u00f3n de servicio o ejecutar c\\u00f3digo arbitrario.\"}]",
"id": "CVE-2021-22156",
"lastModified": "2024-11-21T05:49:36.947",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 9.8, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:P/I:P/A:P\", \"baseScore\": 6.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2021-08-17T19:15:08.057",
"references": "[{\"url\": \"https://support.blackberry.com/kb/articleDetail?articleNumber=000082334\", \"source\": \"secure@blackberry.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-qnx-TOxjVPdL\", \"source\": \"secure@blackberry.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://support.blackberry.com/kb/articleDetail?articleNumber=000082334\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-qnx-TOxjVPdL\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]",
"sourceIdentifier": "secure@blackberry.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-190\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2021-22156\",\"sourceIdentifier\":\"secure@blackberry.com\",\"published\":\"2021-08-17T19:15:08.057\",\"lastModified\":\"2025-08-22T16:15:33.777\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An integer overflow vulnerability in the calloc() function of the C runtime library of affected versions of BlackBerry\u00ae QNX Software Development Platform (SDP) version(s) 6.5.0SP1 and earlier, QNX OS for Medical 1.1 and earlier, and QNX OS for Safety 1.0.1 and earlier that could allow an attacker to potentially perform a denial of service or execute arbitrary code.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad de desbordamiento de enteros en la funci\u00f3n calloc() de la biblioteca de tiempo de ejecuci\u00f3n C de las versiones afectadas de BlackBerry\u00ae QNX Software Development Platform (SDP) versi\u00f3n(es) 6.5.0SP1 y anteriores, QNX OS for Medical versiones 1.1 y anteriores, y QNX OS for Safety versiones 1.0.1 y anteriores, que podr\u00eda permitir a un atacante llevar a cabo potencialmente una denegaci\u00f3n de servicio o ejecutar c\u00f3digo arbitrario.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secure@blackberry.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":9.0,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.2,\"impactScore\":6.0},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"secure@blackberry.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-190\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-190\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:blackberry:qnx_software_development_platform:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.5.0\",\"matchCriteriaId\":\"F6FCB90F-1888-4350-A16E-5F4951F903B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:blackberry:qnx_software_development_platform:6.5.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"B18FCC7D-290C-4FC7-80B7-C678515E403C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:blackberry:qnx_software_development_platform:6.5.0:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"11F2C680-2F44-4CBC-BC7E-B608726302D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:blackberry:qnx_os_for_medical:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.1.1\",\"matchCriteriaId\":\"75A18CC9-673C-4FA8-875E-08925D2A97AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:blackberry:qnx_os_for_safety:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.0.2\",\"matchCriteriaId\":\"4C6CE0A1-8E88-405B-BD6D-48FCD084CB07\"}]}]}],\"references\":[{\"url\":\"https://support.blackberry.com/kb/articleDetail?articleNumber=000082334\",\"source\":\"secure@blackberry.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-qnx-TOxjVPdL\",\"source\":\"secure@blackberry.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.blackberry.com/kb/articleDetail?articleNumber=000082334\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-qnx-TOxjVPdL\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
}
}
GSD-2021-22156
Vulnerability from gsd - Updated: 2023-12-13 01:23{
"GSD": {
"alias": "CVE-2021-22156",
"description": "An integer overflow vulnerability in the calloc() function of the C runtime library of affected versions of BlackBerry\u00ae QNX Software Development Platform (SDP) version(s) 6.5.0SP1 and earlier, QNX OS for Medical 1.1 and earlier, and QNX OS for Safety 1.0.1 and earlier that could allow an attacker to potentially perform a denial of service or execute arbitrary code.",
"id": "GSD-2021-22156"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2021-22156"
],
"details": "An integer overflow vulnerability in the calloc() function of the C runtime library of affected versions of BlackBerry\u00ae QNX Software Development Platform (SDP) version(s) 6.5.0SP1 and earlier, QNX OS for Medical 1.1 and earlier, and QNX OS for Safety 1.0.1 and earlier that could allow an attacker to potentially perform a denial of service or execute arbitrary code.",
"id": "GSD-2021-22156",
"modified": "2023-12-13T01:23:24.842054Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secure@blackberry.com",
"ID": "CVE-2021-22156",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "BlackBerry QNX Software Development Platform (SDP), QNX OS for Medical and QNX OS for Safety",
"version": {
"version_data": [
{
"version_value": "QNX SDP 6.5.0 SP1 and earlier"
},
{
"version_value": "QNX OS for Medical 1.1 and earlier"
},
{
"version_value": "QNX OS for Safety 1.0.1 and earlier"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An integer overflow vulnerability in the calloc() function of the C runtime library of affected versions of BlackBerry\u00ae QNX Software Development Platform (SDP) version(s) 6.5.0SP1 and earlier, QNX OS for Medical 1.1 and earlier, and QNX OS for Safety 1.0.1 and earlier that could allow an attacker to potentially perform a denial of service or execute arbitrary code."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Denial of service or arbitrary code execution"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://support.blackberry.com/kb/articleDetail?articleNumber=000082334",
"refsource": "MISC",
"url": "https://support.blackberry.com/kb/articleDetail?articleNumber=000082334"
},
{
"name": "20210818 BlackBerry QNX-2021-001 Vulnerability Affecting Cisco Products: August 2021",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-qnx-TOxjVPdL"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:blackberry:qnx_software_development_platform:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "6.5.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:blackberry:qnx_software_development_platform:6.5.0:-:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:blackberry:qnx_software_development_platform:6.5.0:sp1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:blackberry:qnx_os_for_medical:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.1.1",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:blackberry:qnx_os_for_safety:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.0.2",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secure@blackberry.com",
"ID": "CVE-2021-22156"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "An integer overflow vulnerability in the calloc() function of the C runtime library of affected versions of BlackBerry\u00ae QNX Software Development Platform (SDP) version(s) 6.5.0SP1 and earlier, QNX OS for Medical 1.1 and earlier, and QNX OS for Safety 1.0.1 and earlier that could allow an attacker to potentially perform a denial of service or execute arbitrary code."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://support.blackberry.com/kb/articleDetail?articleNumber=000082334",
"refsource": "MISC",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://support.blackberry.com/kb/articleDetail?articleNumber=000082334"
},
{
"name": "20210818 BlackBerry QNX-2021-001 Vulnerability Affecting Cisco Products: August 2021",
"refsource": "CISCO",
"tags": [
"Third Party Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-qnx-TOxjVPdL"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
},
"lastModifiedDate": "2021-08-30T11:26Z",
"publishedDate": "2021-08-17T19:15Z"
}
}
}
CERTFR-2021-AVI-953
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Schneider. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| N/A | N/A | SCD6000 Industrial RTU version SCD6000 SY11012 11_M et antérieures | ||
| N/A | N/A | Modicon BMENOC 0311 | ||
| N/A | N/A | EVlink City (EVC1S22P4 / EVC1S7P4), EVlink Parking (EVW2 / EVF2 / EVP2PE), EVlink Smart Wallbox EVB1A toutes versions antérieures à R8 V3.4.0.2 | ||
| N/A | N/A | Modicon BMENOC 0321 | ||
| N/A | N/A | Modicon M580 | ||
| N/A | N/A | EcoStruxure™ Power Monitoring Expert versions V9.0 et antérieures | ||
| N/A | N/A | IGSS Data Collector (dc.exe) version 15.0.0.21320 et antérieures | ||
| N/A | N/A | APDU9xxx with NMC3 version V1.0.0.28 et antérieures | ||
| N/A | N/A | AP7xxxx and AP8xxx with NMC2 version V6.9.6 et antérieures | ||
| N/A | N/A | AP7xxx and AP8xxx with NMC3 version V1.1.0.3 et antérieures |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SCD6000 Industrial RTU version SCD6000 SY11012 11_M et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Modicon BMENOC 0311",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "EVlink City (EVC1S22P4 / EVC1S7P4), EVlink Parking (EVW2 / EVF2 / EVP2PE), EVlink Smart Wallbox EVB1A toutes versions ant\u00e9rieures \u00e0 R8 V3.4.0.2",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Modicon BMENOC 0321",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Modicon M580",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "EcoStruxure\u2122 Power Monitoring Expert versions V9.0 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "IGSS Data Collector (dc.exe) version 15.0.0.21320 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "APDU9xxx with NMC3 version V1.0.0.28 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "AP7xxxx and AP8xxx with NMC2 version V6.9.6 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "AP7xxx and AP8xxx with NMC3 version V1.1.0.3 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-35198",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35198"
},
{
"name": "CVE-2021-22725",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22725"
},
{
"name": "CVE-2019-6848",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6848"
},
{
"name": "CVE-2021-22156",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22156"
},
{
"name": "CVE-2021-22823",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22823"
},
{
"name": "CVE-2021-22818",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22818"
},
{
"name": "CVE-2021-22820",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22820"
},
{
"name": "CVE-2021-22821",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22821"
},
{
"name": "CVE-2021-22824",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22824"
},
{
"name": "CVE-2021-22822",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22822"
},
{
"name": "CVE-2019-6849",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6849"
},
{
"name": "CVE-2021-22825",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22825"
},
{
"name": "CVE-2021-44228",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44228"
},
{
"name": "CVE-2021-22724",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22724"
},
{
"name": "CVE-2020-28895",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28895"
},
{
"name": "CVE-2021-22826",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22826"
},
{
"name": "CVE-2019-6850",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6850"
},
{
"name": "CVE-2021-22827",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22827"
},
{
"name": "CVE-2021-22819",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22819"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-953",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-12-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSchneider. Certaines d\u0027entre elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de\nservice \u00e0 distance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Schneider",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-348-02 du 14 d\u00e9cembre 2021",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-348-02"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-348-01 du 14 d\u00e9cembre 2021",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-348-01"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider SSEVD-2021-348-03 du 14 d\u00e9cembre 2021",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-348-03"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2019-281-04 du 14 d\u00e9cembre 2021",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2019-281-04"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-348-04 du 14 d\u00e9cembre 2021",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-348-04"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-313-05 du 14 d\u00e9cembre 2021",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-313-05"
}
]
}
CERTFR-2022-AVI-328
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Schneider. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Schneider Electric | N/A | Modicon M262 Logic Controllers versions antérieures à V5.1.6.1 | ||
| Schneider Electric | N/A | MiCOM C264 versions antérieures à B5.118, D1.92, D4.38, D5.25I et D6.18 | ||
| Schneider Electric | N/A | PowerLogic ION7400 versions antérieures à 3.1.0 | ||
| Schneider Electric | N/A | EPC2000 toutes versions | ||
| Schneider Electric | N/A | EPack toutes versions | ||
| N/A | N/A | Easy Harmony GXU (gamme HMIGXU) Vijeo Designer Basic versions antérieures à 1.2.1 | ||
| Schneider Electric | N/A | nanodac versions antérieures à 10.02 | ||
| N/A | N/A | Versadac toutes versions | ||
| Schneider Electric | N/A | BMXNOR0200H RTU toutes versions | ||
| Schneider Electric | N/A | EPC3000 versions antérieures à V5.20 | ||
| Schneider Electric | N/A | Modicon M241/M251 Logic Controllers versions antérieures à V5.1.9.34 | ||
| Schneider Electric | N/A | SAGE RTU CPU C3414 version antérieures à C3414-500-S02K5_P5 de SAGE RTU CPU3414 | ||
| Schneider Electric | N/A | BMXNOE0100 (H) toutes versions | ||
| N/A | N/A | JACE-8000 versions antérieures à Niagara 4.10u1 | ||
| Schneider Electric | N/A | BMENOC0321, BMENOC0301, BMENOC0311, BMENOS0300 toutes versions | ||
| Schneider Electric | N/A | 6100A, 6180A, 6100XIO, 6180XIO, AeroDAQ toutes versions | ||
| Schneider Electric | N/A | Eurotherm E+PLC100 toutes versions | ||
| N/A | N/A | SCD6000 Industrial RTU versions antérieures à SY-1101207, et N de SCD6000 | ||
| Schneider Electric | N/A | Pro-face SP-5B00, SP-5B10, SP-5B90, gamme ST6000 (modèle GP-ProEX), gamme ET6000 versions antérieures à V4.09.350 | ||
| Schneider Electric | N/A | Momentum MDI (171CBU*), MC80 (BMKC8*), HART (BMEAH*),V1.50 toutes versions | ||
| N/A | N/A | BMECRA31210, BMXCRA31200, BMXCRA31210, 140CRA31200, 140CRA31908 toutes versions | ||
| Schneider Electric | N/A | BMXNOE0100, BMXNOE0110, BMXNGD0100, BMXNOC0401 toutes versions | ||
| Schneider Electric | N/A | Easergy MiCOM P40 toutes versions | ||
| N/A | N/A | Modicon M258/LMC058 Logic Controllers versions antérieures à 5.0.4.18 | ||
| Schneider Electric | N/A | Modicon Quantum CPU et Communication Modules toutes versions | ||
| N/A | N/A | Modicon Premium CPU et Communication Modules toutes versions | ||
| N/A | N/A | Easergy MiCOM P30 versions 660 à 674 | ||
| Schneider Electric | N/A | PowerLogic ION9000 versions antérieures à 3.1.0 | ||
| Schneider Electric | N/A | Easergy C5x (C52/C53) versions antérieures à 1.0.5 | ||
| Schneider Electric | N/A | gammes HMISTO et HMISTU/S5T toutes versions | ||
| Schneider Electric | N/A | PacDrive Eco/Pro/Pro2 Logic Controllers versions antérieures à V1.66.5.1 | ||
| Schneider Electric | N/A | Easergy P5 versions antérieures à 01.401.101 | ||
| Schneider Electric | N/A | CPU Modicon M580 (BMEP* et BMEH*), BMXNOM0200 toutes versions | ||
| N/A | N/A | BMXNOE0110 (H) toutes versions | ||
| Schneider Electric | N/A | Gammes Pro-face GP4000, LT4000M et GP4000H toutes versions | ||
| Schneider Electric | N/A | TCSEGPA23F14F, BMECXM0100 toutes versions | ||
| N/A | N/A | HMISCU Vijeo Designer versions V6.2SP11 et antérieures | ||
| N/A | N/A | PowerLogic PM8000 versions antérieures à 3.1.0 | ||
| N/A | N/A | PacDrive M toutes versions | ||
| N/A | N/A | Easy Harmony ET6 (gamme HMIET) Vijeo Designer Basic versions antérieures à 1.2.1 | ||
| N/A | N/A | Momentum ENT (170ENT11*) toutes versions | ||
| N/A | N/A | Gammes Pro-face GP4100, GP4000E et GP4000M toutes versions | ||
| Schneider Electric | N/A | BMXNOM0200 toutes versions | ||
| N/A | N/A | IGSS Data Server versions antérieures à 15.0.0.22074 | ||
| N/A | N/A | BMENOP0300, BMXNOR0200 toutes versions | ||
| Schneider Electric | N/A | Modicon LMC078 toutes versions | ||
| Schneider Electric | N/A | Harmony/ Magelis, gammes HMIGTU, HMIGTUX et HMIGK versions antérieures à 6.2 SP11 Multi HotFix 4 | ||
| Schneider Electric | Modicon M340 | Modicon M340 versions antérieures à 3.50 |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Modicon M262 Logic Controllers versions ant\u00e9rieures \u00e0 V5.1.6.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "MiCOM C264 versions ant\u00e9rieures \u00e0 B5.118, D1.92, D4.38, D5.25I et D6.18",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "PowerLogic ION7400 versions ant\u00e9rieures \u00e0 3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "EPC2000 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "EPack toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "Easy Harmony GXU (gamme HMIGXU) Vijeo Designer Basic versions ant\u00e9rieures \u00e0 1.2.1",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "nanodac versions ant\u00e9rieures \u00e0 10.02",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "Versadac toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "BMXNOR0200H RTU toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "EPC3000 versions ant\u00e9rieures \u00e0 V5.20",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "Modicon M241/M251 Logic Controllers versions ant\u00e9rieures \u00e0 V5.1.9.34",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "SAGE RTU CPU C3414 version ant\u00e9rieures \u00e0 C3414-500-S02K5_P5 de SAGE RTU CPU3414",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "BMXNOE0100 (H) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "JACE-8000 versions ant\u00e9rieures \u00e0 Niagara 4.10u1",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "BMENOC0321, BMENOC0301, BMENOC0311, BMENOS0300 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "6100A, 6180A, 6100XIO, 6180XIO, AeroDAQ toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "Eurotherm E+PLC100 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "SCD6000 Industrial RTU versions ant\u00e9rieures \u00e0 SY-1101207, et N de SCD6000",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Pro-face SP-5B00, SP-5B10, SP-5B90, gamme ST6000 (mod\u00e8le GP-ProEX), gamme ET6000 versions ant\u00e9rieures \u00e0 V4.09.350",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "Momentum MDI (171CBU*), MC80 (BMKC8*), HART (BMEAH*),V1.50 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "BMECRA31210, BMXCRA31200, BMXCRA31210, 140CRA31200, 140CRA31908 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "BMXNOE0100, BMXNOE0110, BMXNGD0100, BMXNOC0401 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "Easergy MiCOM P40 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "Modicon M258/LMC058 Logic Controllers versions ant\u00e9rieures \u00e0 5.0.4.18",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Modicon Quantum CPU et Communication Modules toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "Modicon Premium CPU et Communication Modules toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Easergy MiCOM P30 versions 660 \u00e0 674",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "PowerLogic ION9000 versions ant\u00e9rieures \u00e0 3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "Easergy C5x (C52/C53) versions ant\u00e9rieures \u00e0 1.0.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "gammes HMISTO et HMISTU/S5T toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "PacDrive Eco/Pro/Pro2 Logic Controllers versions ant\u00e9rieures \u00e0 V1.66.5.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "Easergy P5 versions ant\u00e9rieures \u00e0 01.401.101",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "CPU Modicon M580 (BMEP* et BMEH*), BMXNOM0200 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "BMXNOE0110 (H) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Gammes Pro-face GP4000, LT4000M et GP4000H toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "TCSEGPA23F14F, BMECXM0100 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "HMISCU Vijeo Designer versions V6.2SP11 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "PowerLogic PM8000 versions ant\u00e9rieures \u00e0 3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "PacDrive M toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Easy Harmony ET6 (gamme HMIET) Vijeo Designer Basic versions ant\u00e9rieures \u00e0 1.2.1",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Momentum ENT (170ENT11*) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Gammes Pro-face GP4100, GP4000E et GP4000M toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "BMXNOM0200 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "IGSS Data Server versions ant\u00e9rieures \u00e0 15.0.0.22074",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "BMENOP0300, BMXNOR0200 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Modicon LMC078 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "Harmony/ Magelis, gammes HMIGTU, HMIGTUX et HMIGK versions ant\u00e9rieures \u00e0 6.2 SP11 Multi HotFix 4",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "Modicon M340 versions ant\u00e9rieures \u00e0 3.50",
"product": {
"name": "Modicon M340",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-35198",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35198"
},
{
"name": "CVE-2021-22156",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22156"
},
{
"name": "CVE-2022-0222",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0222"
},
{
"name": "CVE-2020-28895",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28895"
},
{
"name": "CVE-2022-24324",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24324"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-328",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-04-12T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSchneider. Certaines d\u0027entre elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de\nservice \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Schneider",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2022-102-02 du 12 avril 2022",
"url": "https://download.schneider-electric.com/files?p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=SEVD-2022-102-02_Modicon_M340_Controller_and_Communication_Modules_Security_Notification.pdf\u0026p_Doc_Ref=SEVD-2022-102-02"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2022-102-01 du 12 avril 2022",
"url": "https://download.schneider-electric.com/files?p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=SEVD-2022-102-01_IGSS_Security_Notification.pdf\u0026p_Doc_Ref=SEVD-2022-102-01"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-313-05 du 09 novembre 2021 mis \u00e0 jour le 12 avril 2022",
"url": "https://download.schneider-electric.com/files?p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=SEVD-2021-313-05_Badalloc_Vulnerabilities_Security_Notification_V6.0.pdf\u0026p_Doc_Ref=SEVD-2021-313-05"
}
]
}
CERTFR-2021-AVI-953
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Schneider. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| N/A | N/A | SCD6000 Industrial RTU version SCD6000 SY11012 11_M et antérieures | ||
| N/A | N/A | Modicon BMENOC 0311 | ||
| N/A | N/A | EVlink City (EVC1S22P4 / EVC1S7P4), EVlink Parking (EVW2 / EVF2 / EVP2PE), EVlink Smart Wallbox EVB1A toutes versions antérieures à R8 V3.4.0.2 | ||
| N/A | N/A | Modicon BMENOC 0321 | ||
| N/A | N/A | Modicon M580 | ||
| N/A | N/A | EcoStruxure™ Power Monitoring Expert versions V9.0 et antérieures | ||
| N/A | N/A | IGSS Data Collector (dc.exe) version 15.0.0.21320 et antérieures | ||
| N/A | N/A | APDU9xxx with NMC3 version V1.0.0.28 et antérieures | ||
| N/A | N/A | AP7xxxx and AP8xxx with NMC2 version V6.9.6 et antérieures | ||
| N/A | N/A | AP7xxx and AP8xxx with NMC3 version V1.1.0.3 et antérieures |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SCD6000 Industrial RTU version SCD6000 SY11012 11_M et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Modicon BMENOC 0311",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "EVlink City (EVC1S22P4 / EVC1S7P4), EVlink Parking (EVW2 / EVF2 / EVP2PE), EVlink Smart Wallbox EVB1A toutes versions ant\u00e9rieures \u00e0 R8 V3.4.0.2",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Modicon BMENOC 0321",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Modicon M580",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "EcoStruxure\u2122 Power Monitoring Expert versions V9.0 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "IGSS Data Collector (dc.exe) version 15.0.0.21320 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "APDU9xxx with NMC3 version V1.0.0.28 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "AP7xxxx and AP8xxx with NMC2 version V6.9.6 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "AP7xxx and AP8xxx with NMC3 version V1.1.0.3 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-35198",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35198"
},
{
"name": "CVE-2021-22725",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22725"
},
{
"name": "CVE-2019-6848",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6848"
},
{
"name": "CVE-2021-22156",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22156"
},
{
"name": "CVE-2021-22823",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22823"
},
{
"name": "CVE-2021-22818",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22818"
},
{
"name": "CVE-2021-22820",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22820"
},
{
"name": "CVE-2021-22821",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22821"
},
{
"name": "CVE-2021-22824",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22824"
},
{
"name": "CVE-2021-22822",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22822"
},
{
"name": "CVE-2019-6849",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6849"
},
{
"name": "CVE-2021-22825",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22825"
},
{
"name": "CVE-2021-44228",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44228"
},
{
"name": "CVE-2021-22724",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22724"
},
{
"name": "CVE-2020-28895",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28895"
},
{
"name": "CVE-2021-22826",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22826"
},
{
"name": "CVE-2019-6850",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6850"
},
{
"name": "CVE-2021-22827",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22827"
},
{
"name": "CVE-2021-22819",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22819"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-953",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-12-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSchneider. Certaines d\u0027entre elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de\nservice \u00e0 distance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Schneider",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-348-02 du 14 d\u00e9cembre 2021",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-348-02"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-348-01 du 14 d\u00e9cembre 2021",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-348-01"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider SSEVD-2021-348-03 du 14 d\u00e9cembre 2021",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-348-03"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2019-281-04 du 14 d\u00e9cembre 2021",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2019-281-04"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-348-04 du 14 d\u00e9cembre 2021",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-348-04"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-313-05 du 14 d\u00e9cembre 2021",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-313-05"
}
]
}
CERTFR-2021-AVI-639
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les systèmes d'exploitation temps réel (RTOS, Real Time OS). Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance et un déni de service à distance.
Cette famille de vulnérabilités dans les RTOS a été découverte, décrite puis nommée « BadAlloc » par Microsoft, appellation donnée en raison de l’absence de vérification des entrées dans l’allocateur mémoire de tas. Ces vulnérabilités d'exécution de code à distance (RCE) sont référencées par 26 CVEs et affectent potentiellement un large éventail de domaines, de l'IoT grand public et médical à l'IoT industriel, aux technologies opérationnelles (OT) et aux systèmes de contrôle industriel. Une dizaine d’éditeurs sont concernés.
Solution
- Les intégrateurs de ces RTOS sont invités à prendre contact rapidement avec l’éditeur du produit affecté afin de corriger leurs propres solutions et diffuser le correctif ;
- Les utilisateurs d’équipements basés sur ces RTOS sont invités à prendre contact avec le fournisseur afin de mettre à jour les équipements affectés ;
- Il convient en outre d’appliquer les bonnes pratiques référencées
dans le guide ANSSI [1] et notamment celles ci-après.
- S’assurer que les appareils concernés ne sont pas accessibles depuis Internet.
- S’assurer que les systèmes ne se connectent qu'à des réseaux ou sous-réseaux isolés de confiance. Adopter une démarche de défense en profondeur permet de se protéger contre des menaces qui ne sont pas encore connues, de diminuer le périmètre sur lequel une menace est exercée ou d’en atténuer l’impact. Le simple cloisonnement des réseaux par des pare-feux ne suffit pas. D’autres mécanismes doivent l’accompagner et à différents niveaux (contrôle d’accès physique, durcissement des configurations, protection antivirale...).
- Inclure des mécanismes de détection et de surveillance des installations. Surveiller de façon permanente les appareils à la recherche de comportements anormaux ou non autorisés tels que la communication avec des hôtes locaux ou distants inconnus. Enfin la collecte des informations au travers des journaux d’alarmes et d’événements est indispensable aux analyses ultérieures. Ces journaux pourront dans certains cas apporter des éléments utiles et des preuves dans le cadre d’une enquête judiciaire.
- Réduire la surface d'attaque en éliminant les services sans utilité fonctionnelle ou non sécurisés.
[1] Guide de l'ANSSI sur la sécurité industrielle : https://www.ssi.gouv.fr/uploads/IMG/pdf/Guide_securite_industrielle_Version_finale.pdf
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| N/A | N/A | RIOT OS version 2020.01.1 | ||
| N/A | N/A | Texas Instruments SimpleLink-CC32XX versions antérieures à 4.10.03 | ||
| N/A | N/A | Media Tek LinkIt SDK versions antérieures à 4.6.1 | ||
| N/A | N/A | NXP MCUXpresso SDK versions antérieures à 2.8.2 | ||
| N/A | N/A | Texas Instruments SimpleLink MSP432E4XX | ||
| N/A | N/A | Windriver VxWorks versions antérieures à 7.0 | ||
| N/A | N/A | Micrium OS, versions antérieures à 5.10.1 | ||
| N/A | N/A | Texas Instruments SimpleLink-CC13XX versions antérieures à 4.40.00 | ||
| N/A | N/A | ARM CMSIS-RTOS2 versions antérieures à 2.1.3 | ||
| N/A | N/A | Micrium uC/OS: uC/LIB versions antérieures à 1.39.00 | ||
| N/A | N/A | Texas Instruments SimpleLink-CC26XX versions antérieures à 4.40.00 | ||
| N/A | N/A | NXP MQX versions antérieures à 5.1 | ||
| N/A | N/A | ARM Mbed OS version 6.3.0 | ||
| N/A | N/A | TencentOS-tiny, version 3.1.0 | ||
| N/A | N/A | Texas Instruments CC32XX versions antérieures à 4.40.00.07 | ||
| N/A | N/A | Redhat newlib versions antérieures à 4.0.0 | ||
| N/A | N/A | BlackBerry QNX SDP versions antérieures à 6.5.0SP1 sans le dernier correctif | ||
| N/A | N/A | BlackBerry QNX OS for Safety versions antérieures à 1.0.2 | ||
| N/A | N/A | ARM mbed-ualloc version 1.3.0 | ||
| Apache | N/A | Apache Nuttx OS version 9.1.0 | ||
| N/A | N/A | Uclibc-NG versions antérieures à 1.0.36 | ||
| Apache | N/A | Amazon FreeRTOS version 10.4.1 | ||
| N/A | N/A | BlackBerry QNX OS for Medical versions antérieures à 1.1.1 | ||
| Apache | N/A | Linux Zephyr RTOS versions antérieures à 2.5.0 | ||
| N/A | N/A | Zephyr Project RTOS versions antérieures à 2.5 | ||
| N/A | N/A | eCosCentric eCosPro RTOS versions 2.0.1 à 4.5.3 | ||
| N/A | N/A | Samsung Tizen RT RTOS versions antérieures à 3.0.GBB | ||
| N/A | N/A | Cesanta Software Mongoose OS version 2.17.0 | ||
| N/A | Google Cloud IoT Device SDK version 1.0.2 |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "RIOT OS version 2020.01.1",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Texas Instruments SimpleLink-CC32XX versions ant\u00e9rieures \u00e0 4.10.03",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Media Tek LinkIt SDK versions ant\u00e9rieures \u00e0 4.6.1",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "NXP MCUXpresso SDK versions ant\u00e9rieures \u00e0 2.8.2",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Texas Instruments SimpleLink MSP432E4XX",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Windriver VxWorks versions ant\u00e9rieures \u00e0 7.0",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Micrium OS, versions ant\u00e9rieures \u00e0 5.10.1",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Texas Instruments SimpleLink-CC13XX versions ant\u00e9rieures \u00e0 4.40.00",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "ARM CMSIS-RTOS2 versions ant\u00e9rieures \u00e0 2.1.3",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Micrium uC/OS: uC/LIB versions ant\u00e9rieures \u00e0 1.39.00",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Texas Instruments SimpleLink-CC26XX versions ant\u00e9rieures \u00e0 4.40.00",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "NXP MQX versions ant\u00e9rieures \u00e0 5.1",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "ARM Mbed OS version 6.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "TencentOS-tiny, version 3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Texas Instruments CC32XX versions ant\u00e9rieures \u00e0 4.40.00.07",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Redhat newlib versions ant\u00e9rieures \u00e0 4.0.0",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "BlackBerry QNX SDP versions ant\u00e9rieures \u00e0 6.5.0SP1 sans le dernier correctif",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "BlackBerry QNX OS for Safety versions ant\u00e9rieures \u00e0 1.0.2",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "ARM mbed-ualloc version 1.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Apache Nuttx OS version 9.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Apache",
"scada": false
}
}
},
{
"description": "Uclibc-NG versions ant\u00e9rieures \u00e0 1.0.36",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Amazon FreeRTOS version 10.4.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Apache",
"scada": false
}
}
},
{
"description": "BlackBerry QNX OS for Medical versions ant\u00e9rieures \u00e0 1.1.1",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Linux Zephyr RTOS versions ant\u00e9rieures \u00e0 2.5.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Apache",
"scada": false
}
}
},
{
"description": "Zephyr Project RTOS versions ant\u00e9rieures \u00e0 2.5",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "eCosCentric eCosPro RTOS versions 2.0.1 \u00e0 4.5.3",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Samsung Tizen RT RTOS versions ant\u00e9rieures \u00e0 3.0.GBB",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Cesanta Software Mongoose OS version 2.17.0",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Google Cloud IoT Device SDK version 1.0.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Google",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\n- Les int\u00e9grateurs de ces RTOS sont invit\u00e9s \u00e0 prendre contact\n rapidement avec l\u2019\u00e9diteur du produit affect\u00e9 afin de corriger leurs\n propres solutions et diffuser le correctif\u00a0;\n- Les utilisateurs d\u2019\u00e9quipements bas\u00e9s sur ces RTOS sont invit\u00e9s \u00e0\n prendre contact avec le fournisseur afin de mettre \u00e0 jour les\n \u00e9quipements affect\u00e9s\u00a0;\n- Il convient en outre d\u2019appliquer les bonnes pratiques r\u00e9f\u00e9renc\u00e9es\n dans le guide ANSSI \\[1\\] et notamment celles ci-apr\u00e8s.\n - S\u2019assurer que les appareils concern\u00e9s ne sont pas accessibles\n depuis Internet.\n - S\u2019assurer que les syst\u00e8mes ne se connectent qu\u0027\u00e0 des r\u00e9seaux ou\n sous-r\u00e9seaux isol\u00e9s de confiance. Adopter une d\u00e9marche de\n d\u00e9fense en profondeur permet de se prot\u00e9ger contre des menaces\n qui ne sont pas encore connues, de diminuer le p\u00e9rim\u00e8tre sur\n lequel une menace est exerc\u00e9e ou d\u2019en att\u00e9nuer l\u2019impact. Le\n simple cloisonnement des r\u00e9seaux par des pare-feux ne suffit\n pas. D\u2019autres m\u00e9canismes doivent l\u2019accompagner et \u00e0 diff\u00e9rents\n niveaux (contr\u00f4le d\u2019acc\u00e8s physique, durcissement des\n configurations, protection antivirale...).\n - Inclure des m\u00e9canismes de d\u00e9tection et de surveillance des\n installations. Surveiller de fa\u00e7on permanente les appareils \u00e0 la\n recherche de comportements anormaux ou non autoris\u00e9s tels que la\n communication avec des h\u00f4tes locaux ou distants inconnus. Enfin\n la collecte des informations au travers des journaux d\u2019alarmes\n et d\u2019\u00e9v\u00e9nements est indispensable aux analyses ult\u00e9rieures. Ces\n journaux pourront dans certains cas apporter des \u00e9l\u00e9ments utiles\n et des preuves dans le cadre d\u2019une enqu\u00eate judiciaire.\n - R\u00e9duire la surface d\u0027attaque en \u00e9liminant les services sans\n utilit\u00e9 fonctionnelle ou non s\u00e9curis\u00e9s.\n\n\\[1\\] Guide de l\u0027ANSSI sur la s\u00e9curit\u00e9 industrielle :\n\u003chttps://www.ssi.gouv.fr/uploads/IMG/pdf/Guide_securite_industrielle_Version_finale.pdf\u003e\n",
"cves": [
{
"name": "CVE-2021-27502",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27502"
},
{
"name": "CVE-2021-27504",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27504"
},
{
"name": "CVE-2020-35198",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35198"
},
{
"name": "CVE-2021-31572",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31572"
},
{
"name": "CVE-2021-22684",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22684"
},
{
"name": "CVE-2021-22680",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22680"
},
{
"name": "CVE-2021-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26461"
},
{
"name": "CVE-2021-27431",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27431"
},
{
"name": "CVE-2021-31571",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31571"
},
{
"name": "CVE-2021-22156",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22156"
},
{
"name": "CVE-2021-26706",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26706"
},
{
"name": "CVE-2021-27419",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27419"
},
{
"name": "CVE-2021-22636",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22636"
},
{
"name": "CVE-2021-27429",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27429"
},
{
"name": "CVE-2021-27433",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27433"
},
{
"name": "CVE-2021-27421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27421"
},
{
"name": "CVE-2021-27425",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27425"
},
{
"name": "CVE-2021-27417",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27417"
},
{
"name": "CVE-2021-3420",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3420"
},
{
"name": "CVE-2020-28895",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28895"
},
{
"name": "CVE-2021-27427",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27427"
},
{
"name": "CVE-2021-27439",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27439"
},
{
"name": "CVE-2020-13603",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13603"
},
{
"name": "CVE-2021-30636",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30636"
},
{
"name": "CVE-2021-27435",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27435"
},
{
"name": "CVE-2021-27411",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27411"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 BadAlloc icsa-21-119-04 du 20 mai 2021, mis \u00e0 jour le 17 ao\u00fbt 2021",
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-119-04"
}
],
"reference": "CERTFR-2021-AVI-639",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-08-18T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les syst\u00e8mes\nd\u0027exploitation temps r\u00e9el (*RTOS, Real Time OS*). Elles permettent \u00e0 un\nattaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance et un\nd\u00e9ni de service \u00e0 distance.\n\nCette famille de vuln\u00e9rabilit\u00e9s dans les *RTOS* a \u00e9t\u00e9 d\u00e9couverte,\nd\u00e9crite puis nomm\u00e9e \u00ab\u00a0BadAlloc\u00a0\u00bb par Microsoft, appellation donn\u00e9e en\nraison de l\u2019absence de v\u00e9rification des entr\u00e9es dans l\u2019allocateur\nm\u00e9moire de tas. Ces vuln\u00e9rabilit\u00e9s d\u0027ex\u00e9cution de code \u00e0 distance (RCE)\nsont r\u00e9f\u00e9renc\u00e9es par 26 CVEs et affectent potentiellement un large\n\u00e9ventail de domaines, de l\u0027IoT grand public et m\u00e9dical \u00e0 l\u0027IoT\nindustriel, aux technologies op\u00e9rationnelles (OT) et aux syst\u00e8mes de\ncontr\u00f4le industriel. Une dizaine d\u2019\u00e9diteurs sont concern\u00e9s.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans des syst\u00e8mes d\u0027exploitation temps r\u00e9el",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat newlib du 17 novembre 2020",
"url": "https://sourceware.org/git/?p=newlib-cygwin.git;a=commit;h=aa106b29a6a8a1b0df9e334704292cbc32f2d44e"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 ARM CMSIS RTOS2 du 24 juin 2021",
"url": "https://www.keil.com/pack/doc/CMSIS/RTOS2/html/rtos_revisionHistory.html"
},
{
"published_at": null,
"title": "\ufeffBulletin de s\u00e9curit\u00e9 BadAlloc icsa-21-119-04 du 20 mai 2021",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 ARM mbed du 22 mars 2021",
"url": "https://github.com/ARMmbed/mbed-os/pull/14408"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Zephyr Project RTOS du 23 mars 2021",
"url": "https://github.com/zephyrproject-rtos/zephyr/pull/31796"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Wind River VxWorks 20210319 du 19 mars 2021",
"url": "https://support2.windriver.com/index.php?page=security-notices\u0026on=view\u0026id=7048"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Wind River VxWorks 20210203 du 03 f\u00e9vrier 2021",
"url": "https://support2.windriver.com/index.php?page=cve\u0026on=view\u0026id=CVE-2020-28895"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 eCosCentric eCosPro RTOS 1002437 du 16 ao\u00fbt 2021",
"url": "https://bugzilla.ecoscentric.com/show_bug.cgi?id=1002437"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 FreeRTOS du 07 d\u00e9cembre 2020",
"url": "https://github.com/FreeRTOS/FreeRTOS-Kernel/pull/224"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 BlackBerry du 17 ao\u00fbt 2021",
"url": "https://support.blackberry.com/kb/articleDetail?articleNumber=000082334\u0026language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apache Nuttx OS du 21 juin 2021",
"url": "https://lists.apache.org/thread.html/r806fccf8b003ae812d807c6c7d97950d44ed29b2713418cbe3f2bddd%40%3Cdev.nuttx.apache.org%3E"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Texas Instruments TI-PSIRT-2020-100074 du 29 avril 2021",
"url": "https://www.ti.com/lit/an/swra709/swra709.pdf?ts=1629129702198"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Google Cloud IoT Device du 12 avril 2021",
"url": "https://github.com/GoogleCloudPlatform/iot-device-sdk-embedded-c/pull/119/files"
}
]
}
CERTFR-2021-AVI-639
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les systèmes d'exploitation temps réel (RTOS, Real Time OS). Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance et un déni de service à distance.
Cette famille de vulnérabilités dans les RTOS a été découverte, décrite puis nommée « BadAlloc » par Microsoft, appellation donnée en raison de l’absence de vérification des entrées dans l’allocateur mémoire de tas. Ces vulnérabilités d'exécution de code à distance (RCE) sont référencées par 26 CVEs et affectent potentiellement un large éventail de domaines, de l'IoT grand public et médical à l'IoT industriel, aux technologies opérationnelles (OT) et aux systèmes de contrôle industriel. Une dizaine d’éditeurs sont concernés.
Solution
- Les intégrateurs de ces RTOS sont invités à prendre contact rapidement avec l’éditeur du produit affecté afin de corriger leurs propres solutions et diffuser le correctif ;
- Les utilisateurs d’équipements basés sur ces RTOS sont invités à prendre contact avec le fournisseur afin de mettre à jour les équipements affectés ;
- Il convient en outre d’appliquer les bonnes pratiques référencées
dans le guide ANSSI [1] et notamment celles ci-après.
- S’assurer que les appareils concernés ne sont pas accessibles depuis Internet.
- S’assurer que les systèmes ne se connectent qu'à des réseaux ou sous-réseaux isolés de confiance. Adopter une démarche de défense en profondeur permet de se protéger contre des menaces qui ne sont pas encore connues, de diminuer le périmètre sur lequel une menace est exercée ou d’en atténuer l’impact. Le simple cloisonnement des réseaux par des pare-feux ne suffit pas. D’autres mécanismes doivent l’accompagner et à différents niveaux (contrôle d’accès physique, durcissement des configurations, protection antivirale...).
- Inclure des mécanismes de détection et de surveillance des installations. Surveiller de façon permanente les appareils à la recherche de comportements anormaux ou non autorisés tels que la communication avec des hôtes locaux ou distants inconnus. Enfin la collecte des informations au travers des journaux d’alarmes et d’événements est indispensable aux analyses ultérieures. Ces journaux pourront dans certains cas apporter des éléments utiles et des preuves dans le cadre d’une enquête judiciaire.
- Réduire la surface d'attaque en éliminant les services sans utilité fonctionnelle ou non sécurisés.
[1] Guide de l'ANSSI sur la sécurité industrielle : https://www.ssi.gouv.fr/uploads/IMG/pdf/Guide_securite_industrielle_Version_finale.pdf
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| N/A | N/A | RIOT OS version 2020.01.1 | ||
| N/A | N/A | Texas Instruments SimpleLink-CC32XX versions antérieures à 4.10.03 | ||
| N/A | N/A | Media Tek LinkIt SDK versions antérieures à 4.6.1 | ||
| N/A | N/A | NXP MCUXpresso SDK versions antérieures à 2.8.2 | ||
| N/A | N/A | Texas Instruments SimpleLink MSP432E4XX | ||
| N/A | N/A | Windriver VxWorks versions antérieures à 7.0 | ||
| N/A | N/A | Micrium OS, versions antérieures à 5.10.1 | ||
| N/A | N/A | Texas Instruments SimpleLink-CC13XX versions antérieures à 4.40.00 | ||
| N/A | N/A | ARM CMSIS-RTOS2 versions antérieures à 2.1.3 | ||
| N/A | N/A | Micrium uC/OS: uC/LIB versions antérieures à 1.39.00 | ||
| N/A | N/A | Texas Instruments SimpleLink-CC26XX versions antérieures à 4.40.00 | ||
| N/A | N/A | NXP MQX versions antérieures à 5.1 | ||
| N/A | N/A | ARM Mbed OS version 6.3.0 | ||
| N/A | N/A | TencentOS-tiny, version 3.1.0 | ||
| N/A | N/A | Texas Instruments CC32XX versions antérieures à 4.40.00.07 | ||
| N/A | N/A | Redhat newlib versions antérieures à 4.0.0 | ||
| N/A | N/A | BlackBerry QNX SDP versions antérieures à 6.5.0SP1 sans le dernier correctif | ||
| N/A | N/A | BlackBerry QNX OS for Safety versions antérieures à 1.0.2 | ||
| N/A | N/A | ARM mbed-ualloc version 1.3.0 | ||
| Apache | N/A | Apache Nuttx OS version 9.1.0 | ||
| N/A | N/A | Uclibc-NG versions antérieures à 1.0.36 | ||
| Apache | N/A | Amazon FreeRTOS version 10.4.1 | ||
| N/A | N/A | BlackBerry QNX OS for Medical versions antérieures à 1.1.1 | ||
| Apache | N/A | Linux Zephyr RTOS versions antérieures à 2.5.0 | ||
| N/A | N/A | Zephyr Project RTOS versions antérieures à 2.5 | ||
| N/A | N/A | eCosCentric eCosPro RTOS versions 2.0.1 à 4.5.3 | ||
| N/A | N/A | Samsung Tizen RT RTOS versions antérieures à 3.0.GBB | ||
| N/A | N/A | Cesanta Software Mongoose OS version 2.17.0 | ||
| N/A | Google Cloud IoT Device SDK version 1.0.2 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "RIOT OS version 2020.01.1",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Texas Instruments SimpleLink-CC32XX versions ant\u00e9rieures \u00e0 4.10.03",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Media Tek LinkIt SDK versions ant\u00e9rieures \u00e0 4.6.1",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "NXP MCUXpresso SDK versions ant\u00e9rieures \u00e0 2.8.2",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Texas Instruments SimpleLink MSP432E4XX",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Windriver VxWorks versions ant\u00e9rieures \u00e0 7.0",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Micrium OS, versions ant\u00e9rieures \u00e0 5.10.1",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Texas Instruments SimpleLink-CC13XX versions ant\u00e9rieures \u00e0 4.40.00",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "ARM CMSIS-RTOS2 versions ant\u00e9rieures \u00e0 2.1.3",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Micrium uC/OS: uC/LIB versions ant\u00e9rieures \u00e0 1.39.00",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Texas Instruments SimpleLink-CC26XX versions ant\u00e9rieures \u00e0 4.40.00",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "NXP MQX versions ant\u00e9rieures \u00e0 5.1",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "ARM Mbed OS version 6.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "TencentOS-tiny, version 3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Texas Instruments CC32XX versions ant\u00e9rieures \u00e0 4.40.00.07",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Redhat newlib versions ant\u00e9rieures \u00e0 4.0.0",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "BlackBerry QNX SDP versions ant\u00e9rieures \u00e0 6.5.0SP1 sans le dernier correctif",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "BlackBerry QNX OS for Safety versions ant\u00e9rieures \u00e0 1.0.2",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "ARM mbed-ualloc version 1.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Apache Nuttx OS version 9.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Apache",
"scada": false
}
}
},
{
"description": "Uclibc-NG versions ant\u00e9rieures \u00e0 1.0.36",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Amazon FreeRTOS version 10.4.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Apache",
"scada": false
}
}
},
{
"description": "BlackBerry QNX OS for Medical versions ant\u00e9rieures \u00e0 1.1.1",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Linux Zephyr RTOS versions ant\u00e9rieures \u00e0 2.5.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Apache",
"scada": false
}
}
},
{
"description": "Zephyr Project RTOS versions ant\u00e9rieures \u00e0 2.5",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "eCosCentric eCosPro RTOS versions 2.0.1 \u00e0 4.5.3",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Samsung Tizen RT RTOS versions ant\u00e9rieures \u00e0 3.0.GBB",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Cesanta Software Mongoose OS version 2.17.0",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Google Cloud IoT Device SDK version 1.0.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Google",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\n- Les int\u00e9grateurs de ces RTOS sont invit\u00e9s \u00e0 prendre contact\n rapidement avec l\u2019\u00e9diteur du produit affect\u00e9 afin de corriger leurs\n propres solutions et diffuser le correctif\u00a0;\n- Les utilisateurs d\u2019\u00e9quipements bas\u00e9s sur ces RTOS sont invit\u00e9s \u00e0\n prendre contact avec le fournisseur afin de mettre \u00e0 jour les\n \u00e9quipements affect\u00e9s\u00a0;\n- Il convient en outre d\u2019appliquer les bonnes pratiques r\u00e9f\u00e9renc\u00e9es\n dans le guide ANSSI \\[1\\] et notamment celles ci-apr\u00e8s.\n - S\u2019assurer que les appareils concern\u00e9s ne sont pas accessibles\n depuis Internet.\n - S\u2019assurer que les syst\u00e8mes ne se connectent qu\u0027\u00e0 des r\u00e9seaux ou\n sous-r\u00e9seaux isol\u00e9s de confiance. Adopter une d\u00e9marche de\n d\u00e9fense en profondeur permet de se prot\u00e9ger contre des menaces\n qui ne sont pas encore connues, de diminuer le p\u00e9rim\u00e8tre sur\n lequel une menace est exerc\u00e9e ou d\u2019en att\u00e9nuer l\u2019impact. Le\n simple cloisonnement des r\u00e9seaux par des pare-feux ne suffit\n pas. D\u2019autres m\u00e9canismes doivent l\u2019accompagner et \u00e0 diff\u00e9rents\n niveaux (contr\u00f4le d\u2019acc\u00e8s physique, durcissement des\n configurations, protection antivirale...).\n - Inclure des m\u00e9canismes de d\u00e9tection et de surveillance des\n installations. Surveiller de fa\u00e7on permanente les appareils \u00e0 la\n recherche de comportements anormaux ou non autoris\u00e9s tels que la\n communication avec des h\u00f4tes locaux ou distants inconnus. Enfin\n la collecte des informations au travers des journaux d\u2019alarmes\n et d\u2019\u00e9v\u00e9nements est indispensable aux analyses ult\u00e9rieures. Ces\n journaux pourront dans certains cas apporter des \u00e9l\u00e9ments utiles\n et des preuves dans le cadre d\u2019une enqu\u00eate judiciaire.\n - R\u00e9duire la surface d\u0027attaque en \u00e9liminant les services sans\n utilit\u00e9 fonctionnelle ou non s\u00e9curis\u00e9s.\n\n\\[1\\] Guide de l\u0027ANSSI sur la s\u00e9curit\u00e9 industrielle :\n\u003chttps://www.ssi.gouv.fr/uploads/IMG/pdf/Guide_securite_industrielle_Version_finale.pdf\u003e\n",
"cves": [
{
"name": "CVE-2021-27502",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27502"
},
{
"name": "CVE-2021-27504",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27504"
},
{
"name": "CVE-2020-35198",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35198"
},
{
"name": "CVE-2021-31572",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31572"
},
{
"name": "CVE-2021-22684",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22684"
},
{
"name": "CVE-2021-22680",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22680"
},
{
"name": "CVE-2021-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26461"
},
{
"name": "CVE-2021-27431",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27431"
},
{
"name": "CVE-2021-31571",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31571"
},
{
"name": "CVE-2021-22156",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22156"
},
{
"name": "CVE-2021-26706",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26706"
},
{
"name": "CVE-2021-27419",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27419"
},
{
"name": "CVE-2021-22636",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22636"
},
{
"name": "CVE-2021-27429",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27429"
},
{
"name": "CVE-2021-27433",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27433"
},
{
"name": "CVE-2021-27421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27421"
},
{
"name": "CVE-2021-27425",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27425"
},
{
"name": "CVE-2021-27417",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27417"
},
{
"name": "CVE-2021-3420",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3420"
},
{
"name": "CVE-2020-28895",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28895"
},
{
"name": "CVE-2021-27427",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27427"
},
{
"name": "CVE-2021-27439",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27439"
},
{
"name": "CVE-2020-13603",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13603"
},
{
"name": "CVE-2021-30636",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30636"
},
{
"name": "CVE-2021-27435",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27435"
},
{
"name": "CVE-2021-27411",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27411"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 BadAlloc icsa-21-119-04 du 20 mai 2021, mis \u00e0 jour le 17 ao\u00fbt 2021",
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-119-04"
}
],
"reference": "CERTFR-2021-AVI-639",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-08-18T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les syst\u00e8mes\nd\u0027exploitation temps r\u00e9el (*RTOS, Real Time OS*). Elles permettent \u00e0 un\nattaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance et un\nd\u00e9ni de service \u00e0 distance.\n\nCette famille de vuln\u00e9rabilit\u00e9s dans les *RTOS* a \u00e9t\u00e9 d\u00e9couverte,\nd\u00e9crite puis nomm\u00e9e \u00ab\u00a0BadAlloc\u00a0\u00bb par Microsoft, appellation donn\u00e9e en\nraison de l\u2019absence de v\u00e9rification des entr\u00e9es dans l\u2019allocateur\nm\u00e9moire de tas. Ces vuln\u00e9rabilit\u00e9s d\u0027ex\u00e9cution de code \u00e0 distance (RCE)\nsont r\u00e9f\u00e9renc\u00e9es par 26 CVEs et affectent potentiellement un large\n\u00e9ventail de domaines, de l\u0027IoT grand public et m\u00e9dical \u00e0 l\u0027IoT\nindustriel, aux technologies op\u00e9rationnelles (OT) et aux syst\u00e8mes de\ncontr\u00f4le industriel. Une dizaine d\u2019\u00e9diteurs sont concern\u00e9s.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans des syst\u00e8mes d\u0027exploitation temps r\u00e9el",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat newlib du 17 novembre 2020",
"url": "https://sourceware.org/git/?p=newlib-cygwin.git;a=commit;h=aa106b29a6a8a1b0df9e334704292cbc32f2d44e"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 ARM CMSIS RTOS2 du 24 juin 2021",
"url": "https://www.keil.com/pack/doc/CMSIS/RTOS2/html/rtos_revisionHistory.html"
},
{
"published_at": null,
"title": "\ufeffBulletin de s\u00e9curit\u00e9 BadAlloc icsa-21-119-04 du 20 mai 2021",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 ARM mbed du 22 mars 2021",
"url": "https://github.com/ARMmbed/mbed-os/pull/14408"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Zephyr Project RTOS du 23 mars 2021",
"url": "https://github.com/zephyrproject-rtos/zephyr/pull/31796"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Wind River VxWorks 20210319 du 19 mars 2021",
"url": "https://support2.windriver.com/index.php?page=security-notices\u0026on=view\u0026id=7048"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Wind River VxWorks 20210203 du 03 f\u00e9vrier 2021",
"url": "https://support2.windriver.com/index.php?page=cve\u0026on=view\u0026id=CVE-2020-28895"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 eCosCentric eCosPro RTOS 1002437 du 16 ao\u00fbt 2021",
"url": "https://bugzilla.ecoscentric.com/show_bug.cgi?id=1002437"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 FreeRTOS du 07 d\u00e9cembre 2020",
"url": "https://github.com/FreeRTOS/FreeRTOS-Kernel/pull/224"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 BlackBerry du 17 ao\u00fbt 2021",
"url": "https://support.blackberry.com/kb/articleDetail?articleNumber=000082334\u0026language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apache Nuttx OS du 21 juin 2021",
"url": "https://lists.apache.org/thread.html/r806fccf8b003ae812d807c6c7d97950d44ed29b2713418cbe3f2bddd%40%3Cdev.nuttx.apache.org%3E"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Texas Instruments TI-PSIRT-2020-100074 du 29 avril 2021",
"url": "https://www.ti.com/lit/an/swra709/swra709.pdf?ts=1629129702198"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Google Cloud IoT Device du 12 avril 2021",
"url": "https://github.com/GoogleCloudPlatform/iot-device-sdk-embedded-c/pull/119/files"
}
]
}
CERTFR-2022-AVI-328
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Schneider. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Schneider Electric | N/A | Modicon M262 Logic Controllers versions antérieures à V5.1.6.1 | ||
| Schneider Electric | N/A | MiCOM C264 versions antérieures à B5.118, D1.92, D4.38, D5.25I et D6.18 | ||
| Schneider Electric | N/A | PowerLogic ION7400 versions antérieures à 3.1.0 | ||
| Schneider Electric | N/A | EPC2000 toutes versions | ||
| Schneider Electric | N/A | EPack toutes versions | ||
| N/A | N/A | Easy Harmony GXU (gamme HMIGXU) Vijeo Designer Basic versions antérieures à 1.2.1 | ||
| Schneider Electric | N/A | nanodac versions antérieures à 10.02 | ||
| N/A | N/A | Versadac toutes versions | ||
| Schneider Electric | N/A | BMXNOR0200H RTU toutes versions | ||
| Schneider Electric | N/A | EPC3000 versions antérieures à V5.20 | ||
| Schneider Electric | N/A | Modicon M241/M251 Logic Controllers versions antérieures à V5.1.9.34 | ||
| Schneider Electric | N/A | SAGE RTU CPU C3414 version antérieures à C3414-500-S02K5_P5 de SAGE RTU CPU3414 | ||
| Schneider Electric | N/A | BMXNOE0100 (H) toutes versions | ||
| N/A | N/A | JACE-8000 versions antérieures à Niagara 4.10u1 | ||
| Schneider Electric | N/A | BMENOC0321, BMENOC0301, BMENOC0311, BMENOS0300 toutes versions | ||
| Schneider Electric | N/A | 6100A, 6180A, 6100XIO, 6180XIO, AeroDAQ toutes versions | ||
| Schneider Electric | N/A | Eurotherm E+PLC100 toutes versions | ||
| N/A | N/A | SCD6000 Industrial RTU versions antérieures à SY-1101207, et N de SCD6000 | ||
| Schneider Electric | N/A | Pro-face SP-5B00, SP-5B10, SP-5B90, gamme ST6000 (modèle GP-ProEX), gamme ET6000 versions antérieures à V4.09.350 | ||
| Schneider Electric | N/A | Momentum MDI (171CBU*), MC80 (BMKC8*), HART (BMEAH*),V1.50 toutes versions | ||
| N/A | N/A | BMECRA31210, BMXCRA31200, BMXCRA31210, 140CRA31200, 140CRA31908 toutes versions | ||
| Schneider Electric | N/A | BMXNOE0100, BMXNOE0110, BMXNGD0100, BMXNOC0401 toutes versions | ||
| Schneider Electric | N/A | Easergy MiCOM P40 toutes versions | ||
| N/A | N/A | Modicon M258/LMC058 Logic Controllers versions antérieures à 5.0.4.18 | ||
| Schneider Electric | N/A | Modicon Quantum CPU et Communication Modules toutes versions | ||
| N/A | N/A | Modicon Premium CPU et Communication Modules toutes versions | ||
| N/A | N/A | Easergy MiCOM P30 versions 660 à 674 | ||
| Schneider Electric | N/A | PowerLogic ION9000 versions antérieures à 3.1.0 | ||
| Schneider Electric | N/A | Easergy C5x (C52/C53) versions antérieures à 1.0.5 | ||
| Schneider Electric | N/A | gammes HMISTO et HMISTU/S5T toutes versions | ||
| Schneider Electric | N/A | PacDrive Eco/Pro/Pro2 Logic Controllers versions antérieures à V1.66.5.1 | ||
| Schneider Electric | N/A | Easergy P5 versions antérieures à 01.401.101 | ||
| Schneider Electric | N/A | CPU Modicon M580 (BMEP* et BMEH*), BMXNOM0200 toutes versions | ||
| N/A | N/A | BMXNOE0110 (H) toutes versions | ||
| Schneider Electric | N/A | Gammes Pro-face GP4000, LT4000M et GP4000H toutes versions | ||
| Schneider Electric | N/A | TCSEGPA23F14F, BMECXM0100 toutes versions | ||
| N/A | N/A | HMISCU Vijeo Designer versions V6.2SP11 et antérieures | ||
| N/A | N/A | PowerLogic PM8000 versions antérieures à 3.1.0 | ||
| N/A | N/A | PacDrive M toutes versions | ||
| N/A | N/A | Easy Harmony ET6 (gamme HMIET) Vijeo Designer Basic versions antérieures à 1.2.1 | ||
| N/A | N/A | Momentum ENT (170ENT11*) toutes versions | ||
| N/A | N/A | Gammes Pro-face GP4100, GP4000E et GP4000M toutes versions | ||
| Schneider Electric | N/A | BMXNOM0200 toutes versions | ||
| N/A | N/A | IGSS Data Server versions antérieures à 15.0.0.22074 | ||
| N/A | N/A | BMENOP0300, BMXNOR0200 toutes versions | ||
| Schneider Electric | N/A | Modicon LMC078 toutes versions | ||
| Schneider Electric | N/A | Harmony/ Magelis, gammes HMIGTU, HMIGTUX et HMIGK versions antérieures à 6.2 SP11 Multi HotFix 4 | ||
| Schneider Electric | Modicon M340 | Modicon M340 versions antérieures à 3.50 |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Modicon M262 Logic Controllers versions ant\u00e9rieures \u00e0 V5.1.6.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "MiCOM C264 versions ant\u00e9rieures \u00e0 B5.118, D1.92, D4.38, D5.25I et D6.18",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "PowerLogic ION7400 versions ant\u00e9rieures \u00e0 3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "EPC2000 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "EPack toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "Easy Harmony GXU (gamme HMIGXU) Vijeo Designer Basic versions ant\u00e9rieures \u00e0 1.2.1",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "nanodac versions ant\u00e9rieures \u00e0 10.02",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "Versadac toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "BMXNOR0200H RTU toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "EPC3000 versions ant\u00e9rieures \u00e0 V5.20",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "Modicon M241/M251 Logic Controllers versions ant\u00e9rieures \u00e0 V5.1.9.34",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "SAGE RTU CPU C3414 version ant\u00e9rieures \u00e0 C3414-500-S02K5_P5 de SAGE RTU CPU3414",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "BMXNOE0100 (H) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "JACE-8000 versions ant\u00e9rieures \u00e0 Niagara 4.10u1",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "BMENOC0321, BMENOC0301, BMENOC0311, BMENOS0300 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "6100A, 6180A, 6100XIO, 6180XIO, AeroDAQ toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "Eurotherm E+PLC100 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "SCD6000 Industrial RTU versions ant\u00e9rieures \u00e0 SY-1101207, et N de SCD6000",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Pro-face SP-5B00, SP-5B10, SP-5B90, gamme ST6000 (mod\u00e8le GP-ProEX), gamme ET6000 versions ant\u00e9rieures \u00e0 V4.09.350",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "Momentum MDI (171CBU*), MC80 (BMKC8*), HART (BMEAH*),V1.50 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "BMECRA31210, BMXCRA31200, BMXCRA31210, 140CRA31200, 140CRA31908 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "BMXNOE0100, BMXNOE0110, BMXNGD0100, BMXNOC0401 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "Easergy MiCOM P40 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "Modicon M258/LMC058 Logic Controllers versions ant\u00e9rieures \u00e0 5.0.4.18",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Modicon Quantum CPU et Communication Modules toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "Modicon Premium CPU et Communication Modules toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Easergy MiCOM P30 versions 660 \u00e0 674",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "PowerLogic ION9000 versions ant\u00e9rieures \u00e0 3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "Easergy C5x (C52/C53) versions ant\u00e9rieures \u00e0 1.0.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "gammes HMISTO et HMISTU/S5T toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "PacDrive Eco/Pro/Pro2 Logic Controllers versions ant\u00e9rieures \u00e0 V1.66.5.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "Easergy P5 versions ant\u00e9rieures \u00e0 01.401.101",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "CPU Modicon M580 (BMEP* et BMEH*), BMXNOM0200 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "BMXNOE0110 (H) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Gammes Pro-face GP4000, LT4000M et GP4000H toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "TCSEGPA23F14F, BMECXM0100 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "HMISCU Vijeo Designer versions V6.2SP11 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "PowerLogic PM8000 versions ant\u00e9rieures \u00e0 3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "PacDrive M toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Easy Harmony ET6 (gamme HMIET) Vijeo Designer Basic versions ant\u00e9rieures \u00e0 1.2.1",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Momentum ENT (170ENT11*) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Gammes Pro-face GP4100, GP4000E et GP4000M toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "BMXNOM0200 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "IGSS Data Server versions ant\u00e9rieures \u00e0 15.0.0.22074",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "BMENOP0300, BMXNOR0200 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Modicon LMC078 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "Harmony/ Magelis, gammes HMIGTU, HMIGTUX et HMIGK versions ant\u00e9rieures \u00e0 6.2 SP11 Multi HotFix 4",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "Modicon M340 versions ant\u00e9rieures \u00e0 3.50",
"product": {
"name": "Modicon M340",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-35198",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35198"
},
{
"name": "CVE-2021-22156",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22156"
},
{
"name": "CVE-2022-0222",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0222"
},
{
"name": "CVE-2020-28895",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28895"
},
{
"name": "CVE-2022-24324",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24324"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-328",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-04-12T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSchneider. Certaines d\u0027entre elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de\nservice \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Schneider",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2022-102-02 du 12 avril 2022",
"url": "https://download.schneider-electric.com/files?p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=SEVD-2022-102-02_Modicon_M340_Controller_and_Communication_Modules_Security_Notification.pdf\u0026p_Doc_Ref=SEVD-2022-102-02"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2022-102-01 du 12 avril 2022",
"url": "https://download.schneider-electric.com/files?p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=SEVD-2022-102-01_IGSS_Security_Notification.pdf\u0026p_Doc_Ref=SEVD-2022-102-01"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-313-05 du 09 novembre 2021 mis \u00e0 jour le 12 avril 2022",
"url": "https://download.schneider-electric.com/files?p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=SEVD-2021-313-05_Badalloc_Vulnerabilities_Security_Notification_V6.0.pdf\u0026p_Doc_Ref=SEVD-2021-313-05"
}
]
}
FKIE_CVE-2021-22156
Vulnerability from fkie_nvd - Published: 2021-08-17 19:15 - Updated: 2025-08-22 16:159.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| URL | Tags | ||
|---|---|---|---|
| secure@blackberry.com | https://support.blackberry.com/kb/articleDetail?articleNumber=000082334 | Patch, Vendor Advisory | |
| secure@blackberry.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-qnx-TOxjVPdL | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://support.blackberry.com/kb/articleDetail?articleNumber=000082334 | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-qnx-TOxjVPdL | Third Party Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| blackberry | qnx_software_development_platform | * | |
| blackberry | qnx_software_development_platform | 6.5.0 | |
| blackberry | qnx_software_development_platform | 6.5.0 | |
| blackberry | qnx_os_for_medical | * | |
| blackberry | qnx_os_for_safety | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:blackberry:qnx_software_development_platform:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F6FCB90F-1888-4350-A16E-5F4951F903B3",
"versionEndExcluding": "6.5.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:blackberry:qnx_software_development_platform:6.5.0:-:*:*:*:*:*:*",
"matchCriteriaId": "B18FCC7D-290C-4FC7-80B7-C678515E403C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:blackberry:qnx_software_development_platform:6.5.0:sp1:*:*:*:*:*:*",
"matchCriteriaId": "11F2C680-2F44-4CBC-BC7E-B608726302D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:blackberry:qnx_os_for_medical:*:*:*:*:*:*:*:*",
"matchCriteriaId": "75A18CC9-673C-4FA8-875E-08925D2A97AB",
"versionEndIncluding": "1.1.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:blackberry:qnx_os_for_safety:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4C6CE0A1-8E88-405B-BD6D-48FCD084CB07",
"versionEndIncluding": "1.0.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An integer overflow vulnerability in the calloc() function of the C runtime library of affected versions of BlackBerry\u00ae QNX Software Development Platform (SDP) version(s) 6.5.0SP1 and earlier, QNX OS for Medical 1.1 and earlier, and QNX OS for Safety 1.0.1 and earlier that could allow an attacker to potentially perform a denial of service or execute arbitrary code."
},
{
"lang": "es",
"value": "Una vulnerabilidad de desbordamiento de enteros en la funci\u00f3n calloc() de la biblioteca de tiempo de ejecuci\u00f3n C de las versiones afectadas de BlackBerry\u00ae QNX Software Development Platform (SDP) versi\u00f3n(es) 6.5.0SP1 y anteriores, QNX OS for Medical versiones 1.1 y anteriores, y QNX OS for Safety versiones 1.0.1 y anteriores, que podr\u00eda permitir a un atacante llevar a cabo potencialmente una denegaci\u00f3n de servicio o ejecutar c\u00f3digo arbitrario."
}
],
"id": "CVE-2021-22156",
"lastModified": "2025-08-22T16:15:33.777",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 6.0,
"source": "secure@blackberry.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-08-17T19:15:08.057",
"references": [
{
"source": "secure@blackberry.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://support.blackberry.com/kb/articleDetail?articleNumber=000082334"
},
{
"source": "secure@blackberry.com",
"tags": [
"Third Party Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-qnx-TOxjVPdL"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://support.blackberry.com/kb/articleDetail?articleNumber=000082334"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-qnx-TOxjVPdL"
}
],
"sourceIdentifier": "secure@blackberry.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-190"
}
],
"source": "secure@blackberry.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-190"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-X456-HHPH-F575
Vulnerability from github – Published: 2022-05-24 22:33 – Updated: 2025-08-22 18:31An integer overflow vulnerability in the calloc() function of the C runtime library of affected versions of BlackBerry® QNX Software Development Platform (SDP) version(s) 6.5.0SP1 and earlier, QNX OS for Medical 1.1 and earlier, and QNX OS for Safety 1.0.1 and earlier that could allow an attacker to potentially perform a denial of service or execute arbitrary code.
{
"affected": [],
"aliases": [
"CVE-2021-22156"
],
"database_specific": {
"cwe_ids": [
"CWE-190"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2021-08-17T19:15:00Z",
"severity": "CRITICAL"
},
"details": "An integer overflow vulnerability in the calloc() function of the C runtime library of affected versions of BlackBerry\u00ae QNX Software Development Platform (SDP) version(s) 6.5.0SP1 and earlier, QNX OS for Medical 1.1 and earlier, and QNX OS for Safety 1.0.1 and earlier that could allow an attacker to potentially perform a denial of service or execute arbitrary code.",
"id": "GHSA-x456-hhph-f575",
"modified": "2025-08-22T18:31:10Z",
"published": "2022-05-24T22:33:53Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22156"
},
{
"type": "WEB",
"url": "https://support.blackberry.com/kb/articleDetail?articleNumber=000082334"
},
{
"type": "WEB",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-qnx-TOxjVPdL"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
CISCO-SA-QNX-TOXJVPDL
Vulnerability from csaf_cisco - Published: 2021-08-18 16:00 - Updated: 2021-08-25 14:44Notes
{
"document": {
"acknowledgments": [
{
"summary": "This vulnerability was publicly disclosed by BlackBerry on August 17, 2021."
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"notes": [
{
"category": "summary",
"text": "On August 17, 2021, BlackBerry released a security advisory, QNX-2021-001 [\"https://support.blackberry.com/kb/articleDetail?articleNumber=000082334\"], that disclosed an integer overflow vulnerability in the following BlackBerry software releases:\r\n\r\nQNX Software Development Platform (SDP) \u2013 6.5.0SP1 and earlier\r\nQNX OS for Medical \u2013 1.1 and earlier\r\nQNX OS for Safety \u2013 1.0.1 and earlier\r\n\r\nA successful exploit could allow an attacker to execute arbitrary code or cause a denial of service (DoS).\r\n\r\nFor a description of this vulnerability, see QNX-2021-001 [\"https://support.blackberry.com/kb/articleDetail?articleNumber=000082334\"].\r\n\r\nThis advisory is available at the following link:\r\nhttps://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-qnx-TOxjVPdL [\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-qnx-TOxjVPdL\"]",
"title": "Summary"
},
{
"category": "general",
"text": "Cisco has completed its investigation into its product line to determine which products may be affected by this vulnerability. No products are known to be affected. The bugs are accessible through the Cisco Bug Search Tool [\"https://bst.cloudapps.cisco.com/bugsearch/bug/BUGID\"] and contain additional platform-specific information, including workarounds (if available) and fixed software releases.",
"title": "Vulnerable Products"
},
{
"category": "general",
"text": "The following Cisco products leverage the affected QNX software; however, Cisco has confirmed that the vulnerability is not exploitable on these platforms.\r\n\r\nRouting and Switching - Enterprise and Service Provider\r\n\r\nChannelized shared port adapters (SPAs) (CSCvz34866 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvz34866\"])\r\nCircuit Emulation over Packet (CEoP) SPAs (CSCvz34865 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvz34865\"])\r\nIOS XR 32-bit Software (CSCvz34871 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvz34871\"])\r\nNote: IOS XR 64-bit Software does not leverage QNX software.\r\nRF Gateway 10 (CSCvz34869 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvz34869\"])\r\n\r\nNo other Cisco products are known to be affected by this vulnerability.",
"title": "Products Confirmed Not Vulnerable"
},
{
"category": "general",
"text": "Any workarounds are documented in the product-specific Cisco bugs, which are identified in the Vulnerable Products [\"#vp\"] section of this advisory.",
"title": "Workarounds"
},
{
"category": "general",
"text": "For information about fixed software releases [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"], consult the Cisco bugs identified in the Vulnerable Products [\"#vp\"] section of this advisory.\r\n\r\nWhen considering software upgrades [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"], customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page [\"https://www.cisco.com/go/psirt\"], to determine exposure and a complete upgrade solution.\r\n\r\nIn all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.",
"title": "Fixed Software"
},
{
"category": "general",
"text": "To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html\"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.",
"title": "Vulnerability Policy"
},
{
"category": "general",
"text": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of this vulnerability against Cisco products or services.",
"title": "Exploitation and Public Announcements"
},
{
"category": "general",
"text": "This vulnerability was publicly disclosed by BlackBerry on August 17, 2021.",
"title": "Source"
},
{
"category": "legal_disclaimer",
"text": "THIS DOCUMENT IS PROVIDED ON AN \"AS IS\" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.\r\n\r\nA standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.",
"title": "Legal Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "Emergency Support:\r\n+1 877 228 7302 (toll-free within North America)\r\n+1 408 525 6532 (International direct-dial)\r\nNon-emergency Support:\r\nEmail: psirt@cisco.com\r\nSupport requests that are received via e-mail are typically acknowledged within 48 hours.",
"issuing_authority": "Cisco product security incident response is the responsibility of the Cisco Product Security Incident Response Team (PSIRT). The Cisco PSIRT is a dedicated, global team that manages the receipt, investigation, and public reporting of security vulnerability information that is related to Cisco products and networks. The on-call Cisco PSIRT works 24x7 with Cisco customers, independent security researchers, consultants, industry organizations, and other vendors to identify possible security issues with Cisco products and networks.\r\nMore information can be found in Cisco Security Vulnerability Policy available at https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html",
"name": "Cisco",
"namespace": "https://wwww.cisco.com"
},
"references": [
{
"category": "self",
"summary": "BlackBerry QNX-2021-001 Vulnerability Affecting Cisco Products: August 2021",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-qnx-TOxjVPdL"
},
{
"category": "external",
"summary": "Cisco Security Vulnerability Policy",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html"
},
{
"category": "external",
"summary": "QNX-2021-001",
"url": "https://support.blackberry.com/kb/articleDetail?articleNumber=000082334"
},
{
"category": "external",
"summary": "QNX-2021-001",
"url": "https://support.blackberry.com/kb/articleDetail?articleNumber=000082334"
},
{
"category": "external",
"summary": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-qnx-TOxjVPdL",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-qnx-TOxjVPdL"
},
{
"category": "external",
"summary": "Cisco\u0026nbsp;Bug Search Tool",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/BUGID"
},
{
"category": "external",
"summary": "CSCvz34866",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvz34866"
},
{
"category": "external",
"summary": "CSCvz34865",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvz34865"
},
{
"category": "external",
"summary": "CSCvz34871",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvz34871"
},
{
"category": "external",
"summary": "CSCvz34869",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvz34869"
},
{
"category": "external",
"summary": "fixed software releases",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes"
},
{
"category": "external",
"summary": "considering software upgrades",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes"
},
{
"category": "external",
"summary": "Cisco\u0026nbsp;Security Advisories page",
"url": "https://www.cisco.com/go/psirt"
},
{
"category": "external",
"summary": "Security Vulnerability Policy",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html"
}
],
"title": "BlackBerry QNX-2021-001 Vulnerability Affecting Cisco Products: August 2021",
"tracking": {
"current_release_date": "2021-08-25T14:44:04+00:00",
"generator": {
"date": "2022-10-22T03:12:20+00:00",
"engine": {
"name": "TVCE"
}
},
"id": "cisco-sa-qnx-TOxjVPdL",
"initial_release_date": "2021-08-18T16:00:00+00:00",
"revision_history": [
{
"date": "2021-08-18T15:56:21+00:00",
"number": "1.0.0",
"summary": "Initial public release."
},
{
"date": "2021-08-20T13:08:43+00:00",
"number": "1.1.0",
"summary": "Corrected broken link."
},
{
"date": "2021-08-23T16:23:07+00:00",
"number": "1.2.0",
"summary": "Added products under investigation."
},
{
"date": "2021-08-24T15:38:22+00:00",
"number": "1.3.0",
"summary": "Updated products under investigation and products confirmed not vulnerable."
},
{
"date": "2021-08-25T14:44:04+00:00",
"number": "1.4.0",
"summary": "Updated summary and affected products."
}
],
"status": "final",
"version": "1.4.0"
}
},
"vulnerabilities": [
{
"cve": "CVE-2021-22156",
"notes": [
{
"category": "general",
"text": "No additional information for this vulneraiblity is currently avaialbe.",
"title": "No Notes"
}
],
"remediations": [
{
"category": "none_available",
"details": "No remediation is available at this time."
}
],
"title": "QNX-2021-001 Vulnerability in the C Runtime Library Impacts BlackBerry QNX Software Development Platform (SDP), QNX OS for Medical, and QNX OS for Safety"
}
]
}
CVE-2021-22156
Vulnerability from csaf_se - Published: 2021-11-09 05:00 - Updated: 2025-09-09 04:00Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "We strongly recommend the following industry cybersecurity best practices.\n\n* Locate control and safety system networks and remote devices behind firewalls and isolate them from the business network.\n* Install physical controls so no unauthorized personnel can access your industrial control and safety systems, components, peripheral equipment, and networks.\n* Place all controllers in locked cabinets and never leave them in the \u201cProgram\u201d mode.\n* Never connect programming software to any network other than the network intended for that device.\n* Scan all methods of mobile data exchange with the isolated network such as CDs, USB drives, etc. before use in the terminals or any node connected to these networks.\n* Never allow mobile devices that have connected to any other network besides the intended network to connect to the safety or control networks without proper sanitation.\n* Minimize network exposure for all control system devices and systems and ensure that they are not accessible from the Internet.\n* When remote access is required, use secure methods, such as Virtual Private Networks (VPNs). Recognize that VPNs may have vulnerabilities and should be updated to the most current version available. Also, understand that VPNs are only as secure as the connected devices.\n\nFor more information refer to the Schneider Electric [Recommended Cybersecurity Best Practices](https://www.se.com/us/en/download/document/7EN52-0390/) document.",
"title": "General Security Recommendations"
},
{
"category": "general",
"text": "This document provides an overview of the identified vulnerability or vulnerabilities and actions required to mitigate. For more details and assistance on how to protect your installation, contact your local Schneider Electric representative or Schneider Electric Industrial Cybersecurity Services: https://www.se.com/ww/en/work/solutions/cybersecurity/. These organizations will be fully aware of this situation and can support you through the process.\n\nFor further information related to cybersecurity in Schneider Electric\u0027s products, visit the company\u0027s cybersecurity support portal page: https://www.se.com/ww/en/work/support/cybersecurity/overview.jsp",
"title": "For More Information"
},
{
"category": "legal_disclaimer",
"text": "THIS NOTIFICATION DOCUMENT, THE INFORMATION CONTAINED HEREIN, AND ANY MATERIALS LINKED FROM IT (COLLECTIVELY, THIS \u201cNOTIFICATION\u201d) ARE INTENDED TO HELP PROVIDE AN OVERVIEW OF THE IDENTIFIED SITUATION AND SUGGESTED MITIGATION ACTIONS, REMEDIATION, FIX, AND/OR GENERAL SECURITY RECOMMENDATIONS AND IS PROVIDED ON AN \u201cAS-IS\u201d BASIS WITHOUT WARRANTY OR GUARANTEE OF ANY KIND. SCHNEIDER ELECTRIC DISCLAIMS ALL WARRANTIES RELATING TO THIS NOTIFICATION, EITHER EXPRESS OR IMPLIED, INCLUDING WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. SCHNEIDER ELECTRIC MAKES NO WARRANTY THAT THE NOTIFICATION WILL RESOLVE THE IDENTIFIED SITUATION. IN NO EVENT SHALL SCHNEIDER ELECTRIC BE LIABLE FOR ANY DAMAGES OR LOSSES WHATSOEVER IN CONNECTION WITH THIS NOTIFICATION, INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF SCHNEIDER ELECTRIC HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. YOUR USE OF THIS NOTIFICATION IS AT YOUR OWN RISK, AND YOU ARE SOLELY LIABLE FOR ANY DAMAGES TO YOUR SYSTEMS OR ASSETS OR OTHER LOSSES THAT MAY RESULT FROM YOUR USE OF THIS NOTIFICATION. SCHNEIDER ELECTRIC RESERVES THE RIGHT TO UPDATE OR CHANGE THIS NOTIFICATION AT ANY TIME AND IN ITS SOLE DISCRETION",
"title": "LEGAL DISCLAIMER"
},
{
"category": "general",
"text": "Schneider\u0027s purpose is to create Impact by empowering all to make the most of our energy and resources, bridging progress and\r\nsustainability for all. We call this Life Is On.\n\nOur mission is to be the trusted partner in Sustainability and Efficiency.\n\nWe are a global industrial technology leader bringing world-leading expertise in electrification, automation and digitization to smart\r\nindustries, resilient infrastructure, future-proof data centers, intelligent buildings, and intuitive homes. Anchored by our deep\r\ndomain expertise, we provide integrated end-to-end lifecycle AI enabled Industrial IoT solutions with connected products, automation,\r\nsoftware and services, delivering digital twins to enable profitable growth for our customers.\n\nWe are a people company with an ecosystem of 150,000 colleagues and more than a million partners operating in over 100 countries\r\nto ensure proximity to our customers and stakeholders. We embrace diversity and inclusion in everything we do, guided by our\r\nmeaningful purpose of a sustainable future for all. \n\n www.se.com",
"title": "About Schneider Electric"
},
{
"category": "summary",
"text": "Schneider Electric is aware of multiple memory allocation vulnerabilities dubbed \u0027BadAlloc\u0027, disclosed by \nMicrosoft on April 29, 2021. The impact of a successful exploitation of the vulnerabilities may result in denial of \nservice, or remote code execution, depending on the context. \n\nSeptember 2025 Update: Corrected and updated affected versions for EPC2000, EPC3000, Eurotherm E+PLC400, Eurotherm Eycon 10/20 Visual Supervisor, Eurotherm T2550 PAC, and Eurotherm T2750 PAC.",
"title": "Overview"
},
{
"category": "details",
"text": "The complete list of affected real-time operating systems can be found here: https://us-cert.cisa.gov/ics/advisories/icsa-21-119-04",
"title": "Vulnerability Details"
},
{
"category": "other",
"text": "Schneider Electric has determined that the following offers are impacted and has provided remediations, for \nthose listed in the Available Remediations section, and recommended mitigations, for those in the Affected \nProducts section. \nPlease subscribe to the Schneider Electric security notification service to be informed of critical updates to this \nnotification, including information on affected products and remediation plans:\nhttps://www.se.com/ww/en/work/support/cybersecurity/security-notifications.jsp",
"title": "Affected Products, Remediations \u0026 Mitigations"
}
],
"publisher": {
"category": "vendor",
"contact_details": "cpcert@se.com",
"name": "Schneider Electric CPCERT",
"namespace": "https://www.se.com/ww/en/work/support/cybersecurity/security-notifications.jsp"
},
"references": [
{
"category": "self",
"summary": "BadAlloc Vulnerabilities - SEVD-2021-313-05 CSAF Version",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-313-05\u0026p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=sevd-2021-313-05.json"
},
{
"category": "self",
"summary": "BadAlloc Vulnerabilities - SEVD-2021-313-05 PDF Version",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-313-05\u0026p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=SEVD-2021-313-05_BadAlloc_Vulnerabilities_Security_Notification.pdf"
},
{
"category": "external",
"summary": "Recommended Cybersecurity Best Practices",
"url": "https://www.se.com/us/en/download/document/7EN52-0390/"
}
],
"title": "BadAlloc Vulnerabilities",
"tracking": {
"current_release_date": "2025-09-09T04:00:00.000Z",
"generator": {
"date": "2025-09-02T06:36:57.616Z",
"engine": {
"name": "Schneider Electric CSAF Generator",
"version": "1.2"
}
},
"id": "SEVD-2021-313-05",
"initial_release_date": "2021-11-09T05:00:00.000Z",
"revision_history": [
{
"date": "2021-11-09T05:00:00.000Z",
"number": "1.0.0",
"summary": "Original Release"
},
{
"date": "2021-11-17T06:30:00.000Z",
"number": "1.1.0",
"summary": "Fixed version number of PacDrive Eco/Pro/Pro2 Logic Controllers \ncorrected to v1.66.5.1."
},
{
"date": "2021-12-14T06:30:00.000Z",
"number": "2.0.0",
"summary": "Remediations added for SCD6000 Industrial RTU, PowerLogic \nION7400, PowerLogic ION8000, PowerLogic ION9000. Upon further \ninvestigation Tricon Communication Modules have been removed from \nlist of affected products and are not impacted by the Badalloc \nVulnerabilities."
},
{
"date": "2021-12-15T06:30:00.000Z",
"number": "3.0.0",
"summary": "Remediations added for PowerLogic ION9000."
},
{
"date": "2022-01-11T06:30:00.000Z",
"number": "4.0.0",
"summary": "Remediations added for Easergy P5, EPC3000, Harmony/ Magelis \nHMIGTU Series, HMIGTUX Series, HMIGK Series, nanodac, Pro-face \nSP-5B00, SP-5B10,SP-5B90,ST6000 Series (GP-ProEX model), \nET6000 Series in the Available Remediations section (page 1, 2, 4, and \n6). Updated versions affected to all versions for Pro-face GP4000 \nSeries, LT4000M Series, GP4000H Series in the Affected Versions\nsection. "
},
{
"date": "2022-01-13T06:30:00.000Z",
"number": "4.1.0",
"summary": "Moved back to affected products section: Harmony/ Magelis HMIGTU \nSeries, HMIGTUX Series, HMIGK Series. "
},
{
"date": "2022-02-08T06:30:00.000Z",
"number": "5.0.0",
"summary": "Available remediations for Easy Harmony ET6 (HMIET Series), Easy \nHarmony GXU (HMIGXU Series), Harmony/ Magelis (HMIGTU Series, \nHMIGTUX Series, HMIGK Series), Modicon M262 Logic Controllers, \nand Modicon M241/M251 Logic Controllers. Added Easergy MiCOM \nP30 and Easergy MiCOM P40 to the list of affected products."
},
{
"date": "2022-04-12T06:30:00.000Z",
"number": "6.0.0",
"summary": "Added remediations for Eurotherm E+PLC400, Eurotherm T2750 PAC \nand Modicon M340 CPU. Additionally, Eurotherm T2550 PAC and \nEurotherm Eycon 10/20 Visual Supervisor have been added as affected \nproducts to this security notification in the remediation section."
},
{
"date": "2022-05-10T00:00:00.000Z",
"number": "7.0.0",
"summary": "Added a remediation for HMISCU, added the following affected models \nto the Easergy MiCOM P30 range: C434, P132, P139, P433, P435, \nP437, P532, P631, P632, P633, P634, Px36/8."
},
{
"date": "2022-06-13T18:30:00.000Z",
"number": "8.0.0",
"summary": "Added a remediation for EPC2000, v4.03 includes a fix. "
},
{
"date": "2022-06-14T18:30:00.000Z",
"number": "9.0.0",
"summary": "Remediation added for Versadac. The previously added remediation for \nEPC2000 has been removed as v4.03 is not yet available, this \ndocument will be updated when it is released."
},
{
"date": "2022-08-09T06:30:00.000Z",
"number": "10.0.0",
"summary": "Remediations available for Modicon M580 CPU (BMEP* and BMEH*)\nand Pro-face GP4000 Series, GP4000H Series GP-Pro EX. "
},
{
"date": "2022-09-13T06:30:00.000Z",
"number": "11.0.0",
"summary": "Final Remediations available for Modicon M340 Modules \nBMXNOC0401 and BMXNOR0200H RTU, and Modicon MC80 \nController (BMKC8*). There is a mitigation available for Profibus \nRemote Master (TCSEGPA23F14F) and CANopen X80 \nCommunication Module (BMECXM0100)."
},
{
"date": "2022-10-11T00:00:00.000Z",
"number": "12.0.0",
"summary": "Easergy MiCOM P30 range P632 and P633 were added as affected \nmodels along with a remediation. Final mitigations were added for \nModicon Momentum ENT. Adding a clarification to the list of affected \nproducts by splitting Modicon M580 and Modicon M580 Safety CPU \nranges; the latest fix Modicon M580 v4.02 does not apply to the Safety \nrange of M580."
},
{
"date": "2022-11-08T00:00:00.000Z",
"number": "13.0.0",
"summary": "A remediation is now available for EPC2000."
},
{
"date": "2022-12-13T00:00:00.000Z",
"number": "14.0.0",
"summary": "The Modicon M580 SV4.02 firmware has been retracted for quality \nissues and is no longer available for download. Additional mitigations \nhave been introduced for Modicon M580 CPU and M580 CPU Safety, \nand we urge customers to deploy these mitigations to further reduce \nthe risk of potential exploitation of identified vulnerabilities."
},
{
"date": "2023-01-10T00:00:00.000Z",
"number": "15.0.0",
"summary": "There are remediations available for Easergy MiCOM P30 range and\nPro-face LT4000M Series. "
},
{
"date": "2023-02-14T00:00:00.000Z",
"number": "16.0.0",
"summary": "There is a remediation for Modicon M340 Ethernet Communication \nModules BMXNOE0100 (H) and BMXNOE0110 (H) products."
},
{
"date": "2023-03-14T06:30:00.000Z",
"number": "17.0.0",
"summary": "Remediations for the following products are now available: Easergy \nMiCOM P30 range models P139, P437, P439, P532, P631, P632, \nP633, P634, C434 (page 2), Modicon M580 CPU part numbers BMEP* \nand BMEH (page 7), and Modicon Momentum Unity M1E Processor \npart numbers 171CBU* (page 8). Mitigations for Easergy MiCOM P30 \nrange, models P138, P436, P438, P132, P433, P435 have been added."
},
{
"date": "2023-04-11T06:30:00.000Z",
"number": "18.0.0",
"summary": "Remediations are now available for Modicon M580 Ethernet \nCommunication Modules BMENOC*."
},
{
"date": "2023-05-09T06:30:00.000Z",
"number": "19.0.0",
"summary": "A remediation is now available for Modicon X80 Module (part number \nBMXNOM0200)."
},
{
"date": "2023-07-11T00:00:00.000Z",
"number": "20.0.0",
"summary": "A remediation is now available for HART IO X80 Module (part number \nBMEAHI0812, BMEAHO0412)."
},
{
"date": "2024-03-12T00:00:00.000Z",
"number": "21.0.0",
"summary": "Easergy MiCOM P30 range models 139 and 436 were added to \nAffected Products."
},
{
"date": "2024-08-13T00:00:00.000Z",
"number": "22.0.0",
"summary": "A remediation is available on Modicon M580 CPU Safety."
},
{
"date": "2024-09-10T00:00:00.000Z",
"number": "23.0.0",
"summary": "A remediation is available on HMISTU (page 4)."
},
{
"date": "2024-11-12T00:00:00.000Z",
"number": "24.0.0",
"summary": "Changes have been made to the Easergy MiCOM P30 remediation \ndescription and we have added model P638 to the list of Easergy \nMiCOM P30s with a remediation."
},
{
"date": "2025-01-14T00:00:00.000Z",
"number": "25.0.0",
"summary": "A remediation is available for Modicon X80 module, part number \nBMENOS0300 (Page 10)."
},
{
"date": "2025-04-08T04:00:00.000Z",
"number": "26.0.0",
"summary": "A remediation is available for BMECRA31210, BMXCRA31200, \nBMXCRA31210 (Page 13) and mitigations for this product have been \nupdated. "
},
{
"date": "2025-08-12T04:00:00.000Z",
"number": "27.0.0",
"summary": "Remediations are available for 140CRA31200 (Quantum RIO Drop), \n140CRA31908 (M580 Quantum S908 RIO Drop Adapter) (Page 13), \nand BMENOP0300 (Page 14)."
},
{
"date": "2025-09-09T04:00:00.000Z",
"number": "28.0.0",
"summary": "Corrected and updated affected versions for EPC2000, EPC3000, Eurotherm E+PLC400, Eurotherm Eycon 10/20 Visual Supervisor, Eurotherm T2550 PAC, and Eurotherm T2750 PAC."
}
],
"status": "final",
"version": "28.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c1.0.5",
"product": {
"name": "Schneider Electric Easergy C5x Versions prior to 1.0.5",
"product_id": "1",
"product_identification_helper": {
"model_numbers": [
"C52",
"C53"
]
}
}
},
{
"category": "product_version",
"name": "1.0.5",
"product": {
"name": "Schneider Electric Easergy C5x Version 1.0.5",
"product_id": "2"
}
}
],
"category": "product_name",
"name": "Easergy"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=660|\u003c=674",
"product": {
"name": "Schneider Electric Easergy MiCOM P30 v660 to v674",
"product_id": "3",
"product_identification_helper": {
"model_numbers": [
"P138",
"P139",
"P436",
"P437",
"P438",
"P439",
"P532",
"P631",
"P632",
"P633",
"P634",
"C434"
]
}
}
},
{
"category": "product_version_range",
"name": "\u003e=675",
"product": {
"name": "Schneider Electric Easergy MiCOM P30 Version 675 and later",
"product_id": "4"
}
},
{
"category": "product_version_range",
"name": "\u003e=660|\u003c=674",
"product": {
"name": "Schneider Electric Easergy MiCOM P30 v660 to v674",
"product_id": "5",
"product_identification_helper": {
"model_numbers": [
"P638"
]
}
}
},
{
"category": "product_version",
"name": "676.701",
"product": {
"name": "Schneider Electric Easergy MiCOM P30 Version 676.701",
"product_id": "6",
"product_identification_helper": {
"model_numbers": [
"P638"
]
}
}
},
{
"category": "product_version_range",
"name": "\u003e=660|\u003c=674",
"product": {
"name": "Schneider Electric Easergy MiCOM P30 v660 to v674",
"product_id": "7",
"product_identification_helper": {
"model_numbers": [
"P132",
"P433",
"P435"
]
}
}
},
{
"category": "product_version_range",
"name": "\u003e=660|\u003c=674",
"product": {
"name": "Schneider Electric Easergy MiCOM P30 v660 to v674",
"product_id": "188",
"product_identification_helper": {
"model_numbers": [
"Px36",
"Px38"
]
}
}
}
],
"category": "product_name",
"name": "Easergy MiCOM P30"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c01.401.101",
"product": {
"name": "Schneider Electric Easergy P5 Versions prior to 01.401.101",
"product_id": "8"
}
},
{
"category": "product_version",
"name": "01.401.101",
"product": {
"name": "Schneider Electric Easergy P5 Version 01.401.101",
"product_id": "9"
}
}
],
"category": "product_name",
"name": "Easergy P5"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c4.03",
"product": {
"name": "Schneider Electric Eurotherm EPC2000 Versions prior to v4.03",
"product_id": "10"
}
},
{
"category": "product_version",
"name": "4.03",
"product": {
"name": "Schneider Electric Eurotherm EPC2000 Version 4.03",
"product_id": "11"
}
}
],
"category": "product_name",
"name": "EPC2000"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c5.20",
"product": {
"name": "Schneider Electric Eurotherm EPC3000 Versions prior to v5.20",
"product_id": "12"
}
},
{
"category": "product_version",
"name": "5.20",
"product": {
"name": "Schneider Electric Eurotherm EPC3000 Version 5.20",
"product_id": "13"
}
}
],
"category": "product_name",
"name": "EPC3000"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Schneider Electric Eurotherm E+PLC100 All Versions",
"product_id": "22"
}
}
],
"category": "product_name",
"name": "E+PLC100"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c1.4.0.0",
"product": {
"name": "Schneider Electric Eurotherm E+PLC400 Versions prior to v1.4.0.0",
"product_id": "23"
}
},
{
"category": "product_version",
"name": "1.4.0.0",
"product": {
"name": "Schneider Electric Eurotherm E+PLC400 Version 1.4.0.0",
"product_id": "24"
}
}
],
"category": "product_name",
"name": "E+PLC400"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c7.3",
"product": {
"name": "Schneider Electric Eurotherm Eycon 10/20 Visual Supervisor Versions prior to 7.3",
"product_id": "25"
}
},
{
"category": "product_version",
"name": "7.3",
"product": {
"name": "Schneider Electric Eurotherm Eycon 10/20 Visual Supervisor Version 7.3",
"product_id": "26"
}
}
],
"category": "product_name",
"name": "Eycon 10/20 Visual Supervisor"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c8.2",
"product": {
"name": "Schneider Electric Eurotherm T2550 PAC Versions prior to 8.2",
"product_id": "27"
}
},
{
"category": "product_version",
"name": "8.2",
"product": {
"name": "Schneider Electric Eurotherm T2550 PAC Version 8.2",
"product_id": "28"
}
}
],
"category": "product_name",
"name": "T2550 PAC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c6.3",
"product": {
"name": "Schneider Electric Eurotherm T2750 PAC Versions prior to 6.3",
"product_id": "29"
}
},
{
"category": "product_version",
"name": "6.3",
"product": {
"name": "Schneider Electric Eurotherm T2750 PAC Version 6.3",
"product_id": "30"
}
}
],
"category": "product_name",
"name": "T2750 PAC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.02",
"product": {
"name": "Schneider Electric Eurotherm nanodac Versions prior to 10.02",
"product_id": "122"
}
},
{
"category": "product_version",
"name": "10.02",
"product": {
"name": "Schneider Electric Eurotherm nanodac Version 10.02",
"product_id": "123"
}
}
],
"category": "product_name",
"name": "nanodac"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c2.43",
"product": {
"name": "Schneider Electric Eurotherm Versadac Scalable Data Recorder Versions prior to 2.43",
"product_id": "173"
}
},
{
"category": "product_version",
"name": "2.43",
"product": {
"name": "Schneider Electric Eurotherm Versadac Version 2.43",
"product_id": "174"
}
}
],
"category": "product_name",
"name": "Versadac Scalable Data Recorder"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Schneider Electric Eurotherm 6100A All Versions",
"product_id": "196"
}
}
],
"category": "product_name",
"name": "6100A"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Schneider Electric Eurotherm 6180A All Versions",
"product_id": "197"
}
}
],
"category": "product_name",
"name": "6180A"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Schneider Electric Eurotherm 6100XIO All Versions",
"product_id": "198"
}
}
],
"category": "product_name",
"name": "6100XIO"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Schneider Electric Eurotherm 6180XIO All Versions",
"product_id": "199"
}
}
],
"category": "product_name",
"name": "6180XIO"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Schneider Electric Eurotherm AeroDAQ All Versions",
"product_id": "200"
}
}
],
"category": "product_name",
"name": "AeroDAQ"
}
],
"category": "product_family",
"name": "Eurotherm"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c1.2.1",
"product": {
"name": "Schneider Electric Vijeo Designer Basic Versions prior to 1.2.1",
"product_id": "14"
}
},
{
"category": "product_version",
"name": "1.2.1",
"product": {
"name": "Schneider Electric Vijeo Designer Basic Version 1.2.1",
"product_id": "15"
}
}
],
"category": "product_name",
"name": "Vijeo Designer Basic"
},
{
"branches": [
{
"category": "product_name",
"name": "ET6 (HMIET Series)",
"product": {
"name": "Schneider Electric Easy Harmony ET6 (HMIET Series)",
"product_id": "16"
}
},
{
"category": "product_name",
"name": "GXU (HMIGXU Series)",
"product": {
"name": "Schneider Electric Easy Harmony GXU (HMIGXU Series)",
"product_id": "19"
}
}
],
"category": "product_family",
"name": "Easy Harmony"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c6.2 SP11 Multi HotFix 4",
"product": {
"name": "Schneider Electric Vijeo Designer Versions prior to 6.2 SP11 Multi HotFix 4",
"product_id": "31"
}
},
{
"category": "product_version",
"name": "6.2 SP11 Multi HotFix 4",
"product": {
"name": "Schneider Electric Vijeo Designer Version 6.2 SP11 Multi HotFix 4",
"product_id": "32"
}
},
{
"category": "product_version_range",
"name": "\u003e=6.2 SP11 Multi HotFix 4",
"product": {
"name": "Schneider Electric Vijeo Designer Version 6.2 SP11 Multi HotFix 4 (or above)",
"product_id": "33"
}
},
{
"category": "product_version_range",
"name": "\u003c6.2 SP12",
"product": {
"name": "Schneider Electric Vijeo Designer Versions prior to 6.2 SP12",
"product_id": "47"
}
},
{
"category": "product_version",
"name": "6.2 SP12",
"product": {
"name": "Schneider Electric Vijeo Designer Version 6.2 SP12",
"product_id": "48"
}
},
{
"category": "product_version_range",
"name": "\u003e=6.2 SP12",
"product": {
"name": "Schneider Electric Vijeo Designer Versions 6.2 SP12 (or above)",
"product_id": "49"
}
},
{
"category": "product_version_range",
"name": "\u003c6.3 SP1",
"product": {
"name": "Schneider Electric Vijeo Designer Versions prior to v6.3 SP1",
"product_id": "54"
}
},
{
"category": "product_version",
"name": "6.3 SP1",
"product": {
"name": "Schneider Electric Vijeo Designer Version 6.3 SP1",
"product_id": "55"
}
},
{
"category": "product_version_range",
"name": "\u003e=6.3 SP1",
"product": {
"name": "Schneider Electric Vijeo Designer Version 6.3 SP1 (or above)",
"product_id": "56"
}
}
],
"category": "product_name",
"name": "Vijeo Designer"
},
{
"branches": [
{
"category": "product_name",
"name": "HMIGTU Series",
"product": {
"name": "Schneider Electric Harmony/ Magelis HMIGTU Series",
"product_id": "34"
}
},
{
"category": "product_name",
"name": "HMIGTUX Series",
"product": {
"name": "Schneider Electric Harmony/ Magelis HMIGTUX Series",
"product_id": "35"
}
},
{
"category": "product_name",
"name": "HMIGK Series",
"product": {
"name": "Schneider Electric Harmony/ Magelis HMIGK Series",
"product_id": "36"
}
}
],
"category": "product_family",
"name": "Harmony/ Magelis"
},
{
"category": "product_name",
"name": "HMISCU",
"product": {
"name": "Schneider Electric HMISCU",
"product_id": "46"
}
},
{
"category": "product_name",
"name": "HMISTU Series",
"product": {
"name": "Schneider Electric HMISTU Series",
"product_id": "53"
}
},
{
"category": "product_family",
"name": "TAC I/A Series",
"product": {
"name": "Schneider Electric TAC I/A Series",
"product_id": "60"
}
},
{
"category": "product_name",
"name": "JACE-8000",
"product": {
"name": "Schneider Electric JACE-8000",
"product_id": "61"
}
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c4.10u1",
"product": {
"name": "Schneider Electric Niagara Framework Versions prior to v4.10u1",
"product_id": "62"
}
},
{
"category": "product_version",
"name": "4.10u1",
"product": {
"name": "Schneider Electric Niagara Framework Version 4.10u1",
"product_id": "65"
}
}
],
"category": "product_name",
"name": "Niagara Framework"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=B5.x|\u003cB5.118",
"product": {
"name": "Schneider Electric MiCOM C264 Versions greater than or equal to B5.x and prior to B5.118",
"product_id": "67"
}
},
{
"category": "product_version",
"name": "B5.118",
"product": {
"name": "Schneider Electric MiCOM C264 Version B5.118",
"product_id": "68"
}
},
{
"category": "product_version_range",
"name": "\u003e=D1.x|\u003cD1.92",
"product": {
"name": "Schneider Electric MiCOM C264 Versions greater than or equal to D1.x and prior to D1.92",
"product_id": "69"
}
},
{
"category": "product_version",
"name": "D1.92",
"product": {
"name": "Schneider Electric MiCOM C264 Version D1.92",
"product_id": "70"
}
},
{
"category": "product_version_range",
"name": "\u003e=D4.x|\u003cD4.38",
"product": {
"name": "Schneider Electric MiCOM C264 Versions greater than or equal to D4.x and prior to D4.38",
"product_id": "71"
}
},
{
"category": "product_version",
"name": "D4.38",
"product": {
"name": "Schneider Electric MiCOM C264 Version D4.38",
"product_id": "72"
}
},
{
"category": "product_version_range",
"name": "\u003e=D5.x|\u003cD5.25I",
"product": {
"name": "Schneider Electric MiCOM C264 Versions greater than or equal to D5.x and prior to D5.25I",
"product_id": "73"
}
},
{
"category": "product_version",
"name": "D5.25I",
"product": {
"name": "Schneider Electric MiCOM C264 Version D5.25I",
"product_id": "74"
}
},
{
"category": "product_version_range",
"name": "\u003e=D6.x|\u003cD6.18",
"product": {
"name": "Schneider Electric MiCOM C264 Versions greater than or equal to D6.x and prior to D6.18",
"product_id": "75"
}
},
{
"category": "product_version",
"name": "D6.18",
"product": {
"name": "Schneider Electric MiCOM C264 Version D6.18",
"product_id": "76"
}
}
],
"category": "product_name",
"name": "MiCOM C264"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c5.1.9.34",
"product": {
"name": "Schneider Electric Modicon M241 Logic Controllers Versions prior to 5.1.9.34",
"product_id": "77"
}
},
{
"category": "product_version_range",
"name": "\u003e=5.1.9.34",
"product": {
"name": "Schneider Electric Modicon M241 Logic Controllers Version 5.1.9.34 or greater",
"product_id": "78"
}
}
],
"category": "product_name",
"name": "Modicon M241 Logic Controllers"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c5.1.9.34",
"product": {
"name": "Schneider Electric Modicon M251 Logic Controllers Versions prior to 5.1.9.34",
"product_id": "79"
}
},
{
"category": "product_version_range",
"name": "\u003e=5.1.9.34",
"product": {
"name": "Schneider Electric Modicon M251 Logic Controllers Version 5.1.9.34 or greater",
"product_id": "80"
}
}
],
"category": "product_name",
"name": "Modicon M251 Logic Controllers"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c5.1.6.1",
"product": {
"name": "Schneider Electric Modicon M262 Logic Controllers Versions prior to 5.1.6.1",
"product_id": "81"
}
},
{
"category": "product_version_range",
"name": "\u003e=5.1.6.1",
"product": {
"name": "Schneider Electric Modicon M262 Logic Controllers Version 5.1.6.1 or greater",
"product_id": "82"
}
}
],
"category": "product_name",
"name": "Modicon M262 Logic Controllers"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c5.0.4.18",
"product": {
"name": "Schneider Electric Modicon M258 Logic Controllers Versions prior to 5.0.4.18",
"product_id": "83"
}
},
{
"category": "product_version",
"name": "5.0.4.18",
"product": {
"name": "Schneider Electric Modicon M258 Logic Controllers Version 5.0.4.18",
"product_id": "84"
}
}
],
"category": "product_name",
"name": "Modicon M258 Logic Controllers"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c5.0.4.18",
"product": {
"name": "Schneider Electric Modicon LMC058 Logic Controllers Versions prior to 5.0.4.18",
"product_id": "85"
}
},
{
"category": "product_version",
"name": "5.0.4.18",
"product": {
"name": "Schneider Electric Modicon LMC058 Logic Controllers Version 5.0.4.18",
"product_id": "86"
}
}
],
"category": "product_name",
"name": "Modicon LMC058 Logic Controllers"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c2.11",
"product": {
"name": "Schneider Electric Modicon M340 Module BMXNOC0401 Versions prior to v2.11",
"product_id": "87"
}
},
{
"category": "product_version",
"name": "2.11",
"product": {
"name": "Schneider Electric Modicon M340 Module BMXNOC0401 Version v2.11",
"product_id": "88"
}
}
],
"category": "product_name",
"name": "BMXNOC0401"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c1.7 IR24",
"product": {
"name": "Schneider Electric Modicon M340 Module BMXNOR0200 (H) RTU Versions prior to v1.7 IR24",
"product_id": "93"
}
},
{
"category": "product_version",
"name": "1.7 IR24",
"product": {
"name": "Schneider Electric Modicon M340 Module BMXNOR0200 (H) RTU Version 1.7 IR24",
"product_id": "94"
}
}
],
"category": "product_name",
"name": "BMXNOR0200 (H) RTU"
}
],
"category": "product_family",
"name": "Modicon M340 Module"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cSV3.50",
"product": {
"name": "Schneider Electric Modicon M340 Ethernet Communication Modules BMXNOE0100 (H) Versions prior to SV3.50",
"product_id": "89"
}
},
{
"category": "product_version",
"name": "SV3.50",
"product": {
"name": "Schneider Electric Modicon M340 Ethernet Communication Modules BMXNOE0100 (H) Version SV3.50",
"product_id": "90"
}
}
],
"category": "product_name",
"name": "BMXNOE0100 (H)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cSV6.70",
"product": {
"name": "Schneider Electric Modicon M340 Ethernet Communication Modules BMXNOE0110 (H) Versions prior to SV6.70",
"product_id": "91"
}
},
{
"category": "product_version",
"name": "SV6.70",
"product": {
"name": "Schneider Electric Modicon M340 Ethernet Communication Modules BMXNOE0110 (H) Version SV6.70",
"product_id": "92"
}
}
],
"category": "product_name",
"name": "BMXNOE0110 (H)"
}
],
"category": "product_family",
"name": "Modicon M340 Ethernet Communication Modules"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c3.50",
"product": {
"name": "Schneider Electric Modicon M340 CPU Versions prior to 3.50",
"product_id": "95",
"product_identification_helper": {
"model_numbers": [
"BMXP34*"
]
}
}
},
{
"category": "product_version",
"name": "3.50",
"product": {
"name": "Schneider Electric Modicon M340 CPU Version 3.50",
"product_id": "96",
"product_identification_helper": {
"model_numbers": [
"BMXP34*"
]
}
}
}
],
"category": "product_name",
"name": "Modicon M340 CPU"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cSV4.10",
"product": {
"name": "Schneider Electric Modicon M580 CPU Versions prior to SV4.10",
"product_id": "97",
"product_identification_helper": {
"model_numbers": [
"BMEP*",
"BMEH*"
]
}
}
},
{
"category": "product_version",
"name": "SV4.10",
"product": {
"name": "Schneider Electric Modicon M580 CPU Version SV4.10",
"product_id": "98",
"product_identification_helper": {
"model_numbers": [
"BMEP*",
"BMEH*"
]
}
}
}
],
"category": "product_name",
"name": "Modicon M580 CPU"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cSV4.21",
"product": {
"name": "Schneider Electric Modicon M580 CPU Safety Versions prior to SV4.21",
"product_id": "99",
"product_identification_helper": {
"model_numbers": [
"BMEP58*S",
"BMEH58*S"
]
}
}
},
{
"category": "product_version",
"name": "SV4.21",
"product": {
"name": "Schneider Electric Modicon M580 CPU Safety Version SV4.21",
"product_id": "100",
"product_identification_helper": {
"model_numbers": [
"BMEP58*S",
"BMEH58*S"
]
}
}
}
],
"category": "product_name",
"name": "Modicon M580 CPU Safety"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=16.0 HF001",
"product": {
"name": "Schneider Electric EcoStruxure\u2122 Control Expert Versions greater than or equal to 16.0 HF001",
"product_id": "201"
}
}
],
"category": "product_name",
"name": "EcoStruxure\u2122 Control Expert"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cSV2.21",
"product": {
"name": "Schneider Electric Modicon M580 Ethernet Communication Modules BMENOC0301 Versions prior to SV2.21",
"product_id": "101"
}
},
{
"category": "product_version",
"name": "SV2.21",
"product": {
"name": "Schneider Electric Modicon M580 Ethernet Communication Modules BMENOC0301 Version SV2.21",
"product_id": "102"
}
}
],
"category": "product_name",
"name": "BMENOC0301"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cSV2.21",
"product": {
"name": "Schneider Electric Modicon M580 Ethernet Communication Modules BMENOC0311 Versions prior to SV2.21",
"product_id": "103"
}
},
{
"category": "product_version",
"name": "SV2.21",
"product": {
"name": "Schneider Electric Modicon M580 Ethernet Communication Modules BMENOC0311 Version SV2.21",
"product_id": "104"
}
}
],
"category": "product_name",
"name": "BMENOC0311"
}
],
"category": "product_family",
"name": "Modicon M580 Ethernet Communication Modules"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cSV1.09",
"product": {
"name": "Schneider Electric Modicon M580 NOC Control BMENOC0321 Versions prior to SV1.09",
"product_id": "105"
}
},
{
"category": "product_version",
"name": "SV1.09",
"product": {
"name": "Schneider Electric Modicon M580 NOC Control BMENOC0321 Version SV1.09",
"product_id": "106"
}
}
],
"category": "product_name",
"name": "BMENOC0321"
}
],
"category": "product_name",
"name": "Modicon M580 NOC Control"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cSV1.5",
"product": {
"name": "Schneider Electric HART X80 Module BMEAHI0812 Versions prior to SV1.5",
"product_id": "107"
}
},
{
"category": "product_version",
"name": "SV1.5",
"product": {
"name": "Schneider Electric HART X80 Module BMEAHI0812 Version SV1.5",
"product_id": "108"
}
}
],
"category": "product_name",
"name": "BMEAHI0812"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cSV1.5",
"product": {
"name": "Schneider Electric HART X80 Module BMEAHO0412 Versions prior to SV1.5",
"product_id": "109"
}
},
{
"category": "product_version",
"name": "SV1.5",
"product": {
"name": "Schneider Electric HART X80 Module BMEAHO0412 Version SV1.5",
"product_id": "110"
}
}
],
"category": "product_name",
"name": "BMEAHO0412"
}
],
"category": "product_family",
"name": "HART IO X80 Module"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c1.8",
"product": {
"name": "Schneider Electric Modicon MC80 Controller Versions prior to v1.8",
"product_id": "111",
"product_identification_helper": {
"model_numbers": [
"BMKC8*"
]
}
}
},
{
"category": "product_version",
"name": "1.8",
"product": {
"name": "Schneider Electric Modicon MC80 Controller Version v1.8",
"product_id": "112",
"product_identification_helper": {
"model_numbers": [
"BMKC80"
]
}
}
}
],
"category": "product_name",
"name": "Modicon MC80 Controller"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Schneider Electric Modicon Momentum ENT All Versions",
"product_id": "113",
"product_identification_helper": {
"model_numbers": [
"170ENT11*"
]
}
}
}
],
"category": "product_name",
"name": "Modicon Momentum ENT"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cSV2.6",
"product": {
"name": "Schneider Electric Modicon Momentum Unity M1E Processor Versions prior to SV2.6",
"product_id": "114",
"product_identification_helper": {
"model_numbers": [
"171CBU*"
]
}
}
},
{
"category": "product_version",
"name": "SV2.6",
"product": {
"name": "Schneider Electric Modicon Momentum Unity M1E Processor Version SV2.6",
"product_id": "115",
"product_identification_helper": {
"model_numbers": [
"171CBU*"
]
}
}
}
],
"category": "product_name",
"name": "Modicon Momentum Unity M1E Processor"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Schneider Electric Modicon Quantum CPU and Communication Modules All Versions",
"product_id": "116"
}
}
],
"category": "product_name",
"name": "Modicon Quantum CPU and Communication Modules"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Schneider Electric Modicon Premium CPU and Communication Modules All Versions",
"product_id": "117"
}
}
],
"category": "product_name",
"name": "Modicon Premium CPU and Communication Modules"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c1.60",
"product": {
"name": "Schneider Electric Modicon X80 Module BMXNOM0200 Versions prior to v1.60",
"product_id": "118"
}
},
{
"category": "product_version",
"name": "1.60",
"product": {
"name": "Schneider Electric Modicon X80 Module BMXNOM0200 Version 1.60",
"product_id": "119"
}
}
],
"category": "product_name",
"name": "BMXNOM0200"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c1.04",
"product": {
"name": "Schneider Electric Modicon X80 Module BMENOS0300 Versions prior to v1.04",
"product_id": "120"
}
},
{
"category": "product_version",
"name": "1.04",
"product": {
"name": "Schneider Electric Modicon X80 Module BMENOS0300 Version 1.04",
"product_id": "121"
}
}
],
"category": "product_name",
"name": "BMENOS0300"
}
],
"category": "product_family",
"name": "Modicon X80 Module"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c1.66.5.1",
"product": {
"name": "Schneider Electric PacDrive Eco Logic Controllers Versions prior to 1.66.5.1",
"product_id": "124"
}
},
{
"category": "product_version",
"name": "1.66.5.1",
"product": {
"name": "Schneider Electric PacDrive Eco Logic Controllers Version 1.66.5.1",
"product_id": "125"
}
}
],
"category": "product_name",
"name": "PacDrive Eco Logic Controllers"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c1.66.5.1",
"product": {
"name": "Schneider Electric PacDrive Pro Logic Controllers Versions prior to 1.66.5.1",
"product_id": "126"
}
},
{
"category": "product_version",
"name": "1.66.5.1",
"product": {
"name": "Schneider Electric PacDrive Pro Logic Controllers Version 1.66.5.1",
"product_id": "127"
}
}
],
"category": "product_name",
"name": "PacDrive Pro Logic Controllers"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c1.66.5.1",
"product": {
"name": "Schneider Electric PacDrive Pro2 Logic Controllers Versions prior to 1.66.5.1",
"product_id": "128"
}
},
{
"category": "product_version",
"name": "1.66.5.1",
"product": {
"name": "Schneider Electric PacDrive Pro2 Logic Controllers Version 1.66.5.1",
"product_id": "129"
}
}
],
"category": "product_name",
"name": "PacDrive Pro2 Logic Controllers"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Schneider Electric PacDrive M Logic Controller All Versions",
"product_id": "130"
}
}
],
"category": "product_name",
"name": "PacDrive M Logic Controller"
}
],
"category": "product_family",
"name": "PacDrive"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c3.1",
"product": {
"name": "Schneider Electric PowerLogic ION7400 Versions prior to v3.1",
"product_id": "131"
}
},
{
"category": "product_version",
"name": "3.1",
"product": {
"name": "Schneider Electric PowerLogic ION7400 Version 3.1",
"product_id": "132"
}
}
],
"category": "product_name",
"name": "ION7400"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c3.1",
"product": {
"name": "Schneider Electric PowerLogic PM8000 Versions prior to v3.1",
"product_id": "133"
}
},
{
"category": "product_version",
"name": "3.1",
"product": {
"name": "Schneider Electric PowerLogic PM8000 Version 3.1",
"product_id": "134"
}
}
],
"category": "product_name",
"name": "PM8000"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c3.1",
"product": {
"name": "Schneider Electric PowerLogic ION9000 Versions prior to v3.1",
"product_id": "135"
}
},
{
"category": "product_version_range",
"name": "3.1",
"product": {
"name": "Schneider Electric PowerLogic ION9000 Version 3.1",
"product_id": "136"
}
}
],
"category": "product_name",
"name": "ION9000"
}
],
"category": "product_family",
"name": "PowerLogic"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c4.09.350",
"product": {
"name": "Schneider Electric Pro-face GP-Pro EX Versions prior to 4.09.350",
"product_id": "137"
}
},
{
"category": "product_version_range",
"name": "\u003e=4.09.350",
"product": {
"name": "Schneider Electric Pro-face GP-Pro EX Version 4.09.350 or later",
"product_id": "138"
}
},
{
"category": "product_version_range",
"name": "\u003c4.09.450",
"product": {
"name": "Schneider Electric Pro-face GP-Pro EX Versions prior to 4.09.450",
"product_id": "147"
}
},
{
"category": "product_version_range",
"name": "\u003e=4.09.450",
"product": {
"name": "Schneider Electric Pro-face GP-Pro EX Version 4.09.450 or later",
"product_id": "148"
}
},
{
"category": "product_version_range",
"name": "\u003c4.09.400",
"product": {
"name": "Schneider Electric Pro-face GP-Pro EX Versions prior to 4.09.400",
"product_id": "149"
}
},
{
"category": "product_version_range",
"name": "\u003e=4.09.400",
"product": {
"name": "Schneider Electric Pro-face GP-Pro EX Version 4.09.400 or later",
"product_id": "150"
}
}
],
"category": "product_name",
"name": "GP-Pro EX"
},
{
"category": "product_name",
"name": "SP-5B00",
"product": {
"name": "Schneider Electric Pro-face SP-5B00",
"product_id": "139"
}
},
{
"category": "product_name",
"name": "SP-5B10",
"product": {
"name": "Schneider Electric Pro-face SP-5B10",
"product_id": "140"
}
},
{
"category": "product_name",
"name": "SP-5B90",
"product": {
"name": "Schneider Electric Pro-face SP-5B90",
"product_id": "141"
}
},
{
"category": "product_name",
"name": "ST6000 Series",
"product": {
"name": "Schneider Electric Pro-face ST6000 Series (GP-ProEX model)",
"product_id": "142"
}
},
{
"category": "product_name",
"name": "ET6000 Series",
"product": {
"name": "Schneider Electric Pro-face ET6000 Series",
"product_id": "143"
}
},
{
"category": "product_name",
"name": "LT4000M Series",
"product": {
"name": "Schneider Electric Pro-face LT4000M Series",
"product_id": "144"
}
},
{
"category": "product_name",
"name": "GP4000 Series",
"product": {
"name": "Schneider Electric Pro-face GP4000 Series",
"product_id": "145"
}
},
{
"category": "product_name",
"name": "GP4000H Series",
"product": {
"name": "Schneider Electric Pro-face GP4000H Series",
"product_id": "146"
}
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Schneider Electric Pro-face GP4100 Series All Versions",
"product_id": "193"
}
}
],
"category": "product_name",
"name": "GP4100 Series"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Schneider Electric Pro-face GP4000E Series All Versions",
"product_id": "194"
}
}
],
"category": "product_name",
"name": "GP4000E Series"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Schneider Electric Pro-face GP4000M Series All Versions",
"product_id": "195"
}
}
],
"category": "product_name",
"name": "GP4000M Series"
}
],
"category": "product_family",
"name": "Pro-face"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Schneider Electric Profibus Remote Master TCSEGPA23F14F All Versions",
"product_id": "167"
}
}
],
"category": "product_name",
"name": "TCSEGPA23F14F"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Schneider Electric Profibus Remote Master BMECXM0100 All Versions",
"product_id": "168"
}
}
],
"category": "product_name",
"name": "BMECXM0100"
}
],
"category": "product_family",
"name": "Profibus Remote Master"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cSY-1101207_N",
"product": {
"name": "Schneider Electric SCD6000 Industrial RTU Versions prior to SY-1101207_N",
"product_id": "169"
}
},
{
"category": "product_version",
"name": "SY-1101207_N",
"product": {
"name": "Schneider Electric SCD6000 Industrial RTU Version SY-1101207_N",
"product_id": "170"
}
}
],
"category": "product_name",
"name": "SCD6000 Industrial RTU"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cC3414-500-S02K5_P5",
"product": {
"name": "Schneider Electric SAGE RTU CPU C3414 Versions prior to C3414-500-S02K5_P5",
"product_id": "171"
}
},
{
"category": "product_version",
"name": "C3414-500-S02K5_P5",
"product": {
"name": "Schneider Electric SAGE RTU CPU C3414 Version C3414-500-S02K5_P5",
"product_id": "172"
}
}
],
"category": "product_name",
"name": "SAGE RTU CPU C3414"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cSV02.80",
"product": {
"name": "Schneider Electric BMECRA31210 Versions prior to SV02.80",
"product_id": "175"
}
},
{
"category": "product_version",
"name": "SV02.80",
"product": {
"name": "Schneider Electric BMECRA31210 Version SV02.80",
"product_id": "176"
}
}
],
"category": "product_name",
"name": "BMECRA31210"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cSV02.80",
"product": {
"name": "Schneider Electric BMXCRA31200 Versions prior to SV02.80",
"product_id": "177"
}
},
{
"category": "product_version",
"name": "SV02.80",
"product": {
"name": "Schneider Electric BMXCRA31200 Version SV02.80",
"product_id": "178"
}
}
],
"category": "product_name",
"name": "BMXCRA31200"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cSV02.80",
"product": {
"name": "Schneider Electric BMXCRA31210 Versions prior to SV02.80",
"product_id": "179"
}
},
{
"category": "product_version",
"name": "SV02.80",
"product": {
"name": "Schneider Electric BMXCRA31210 Version SV02.80",
"product_id": "180"
}
}
],
"category": "product_name",
"name": "BMXCRA31210"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c02.80",
"product": {
"name": "Schneider Electric 140CRA31200 (Quantum RIO Drop) Versions prior to V02.80",
"product_id": "181"
}
},
{
"category": "product_version_range",
"name": "02.80",
"product": {
"name": "Schneider Electric 140CRA31200 (Quantum RIO Drop) Version 02.80",
"product_id": "182"
}
}
],
"category": "product_name",
"name": "140CRA31200 (Quantum RIO Drop)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c02.80",
"product": {
"name": "Schneider Electric 140CRA31908 (M580 Quantum S908 RIO Drop Adapter) Versions prior to V02.80",
"product_id": "183"
}
},
{
"category": "product_version_range",
"name": "02.80",
"product": {
"name": "Schneider Electric 140CRA31908 (M580 Quantum S908 RIO Drop Adapter) Version 02.80",
"product_id": "184"
}
}
],
"category": "product_name",
"name": "140CRA31908 (M580 Quantum S908 RIO Drop Adapter)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c02.80",
"product": {
"name": "Schneider Electric BMENOP0300 Versions prior to SV2.6",
"product_id": "185"
}
},
{
"category": "product_version_range",
"name": "SV2.6",
"product": {
"name": "Schneider Electric BMENOP0300 Version SV2.6",
"product_id": "186"
}
}
],
"category": "product_name",
"name": "BMENOP0300"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Schneider Electric BMXNGD0100 All Versions",
"product_id": "187"
}
}
],
"category": "product_name",
"name": "BMXNGD0100"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Schneider Electric Easergy MiCOM P40 All Versions",
"product_id": "189"
}
}
],
"category": "product_name",
"name": "Easergy MiCOM P40"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Schneider Electric EPack All Versions",
"product_id": "190"
}
}
],
"category": "product_name",
"name": "EPack"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Schneider Electric HMISTO5 Series All Versions",
"product_id": "191"
}
}
],
"category": "product_name",
"name": "HMISTO5 Series"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Schneider Electric Modicon LMC078 All Versions",
"product_id": "192"
}
}
],
"category": "product_name",
"name": "Modicon LMC078"
}
],
"category": "vendor",
"name": "Schneider Electric"
}
],
"relationships": [
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Vijeo Designer Basic Versions prior to 1.2.1 installed on Schneider Electric Easy Harmony ET6 (HMIET Series)",
"product_id": "17"
},
"product_reference": "14",
"relates_to_product_reference": "16"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Vijeo Designer Basic Version 1.2.1 installed on Schneider Electric Easy Harmony ET6 (HMIET Series)",
"product_id": "18"
},
"product_reference": "15",
"relates_to_product_reference": "16"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Vijeo Designer Basic Versions prior to 1.2.1 installed on Schneider Electric Easy Harmony GXU (HMIGXU Series)",
"product_id": "20"
},
"product_reference": "14",
"relates_to_product_reference": "19"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Vijeo Designer Basic Version 1.2.1 installed on Schneider Electric Easy Harmony GXU (HMIGXU Series)",
"product_id": "21"
},
"product_reference": "15",
"relates_to_product_reference": "19"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Vijeo Designer Versions prior to 6.2 SP11 Multi HotFix 4 installed on Schneider Electric Harmony/ Magelis HMIGTU Series",
"product_id": "37"
},
"product_reference": "31",
"relates_to_product_reference": "34"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Vijeo Designer Version 6.2 SP11 Multi HotFix 4 installed on Schneider Electric Harmony/ Magelis HMIGTU Series",
"product_id": "38"
},
"product_reference": "32",
"relates_to_product_reference": "34"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Vijeo Designer Version 6.2 SP11 Multi HotFix 4 (or above) installed on Schneider Electric Harmony/ Magelis HMIGTU Series",
"product_id": "39"
},
"product_reference": "33",
"relates_to_product_reference": "34"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Vijeo Designer Versions prior to 6.2 SP11 Multi HotFix 4 installed on Schneider Electric Harmony/ Magelis HMIGTUX Series",
"product_id": "40"
},
"product_reference": "31",
"relates_to_product_reference": "35"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Vijeo Designer Version 6.2 SP11 Multi HotFix 4 installed on Schneider Electric Harmony/ Magelis HMIGTUX Series",
"product_id": "41"
},
"product_reference": "32",
"relates_to_product_reference": "35"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Vijeo Designer Version 6.2 SP11 Multi HotFix 4 (or above) installed on Schneider Electric Harmony/ Magelis HMIGTUX Series",
"product_id": "42"
},
"product_reference": "33",
"relates_to_product_reference": "35"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Vijeo Designer Versions prior to 6.2 SP11 Multi HotFix 4 installed on Schneider Electric Harmony/ Magelis HMIGK Series",
"product_id": "43"
},
"product_reference": "31",
"relates_to_product_reference": "36"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Vijeo Designer Version 6.2 SP11 Multi HotFix 4 installed on Schneider Electric Harmony/ Magelis HMIGK Series",
"product_id": "44"
},
"product_reference": "32",
"relates_to_product_reference": "36"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Vijeo Designer Version 6.2 SP11 Multi HotFix 4 (or above) installed on Schneider Electric Harmony/ Magelis HMIGK Series",
"product_id": "45"
},
"product_reference": "33",
"relates_to_product_reference": "36"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Vijeo Designer Versions prior to 6.2 SP12 installed on Schneider Electric HMISCU",
"product_id": "50"
},
"product_reference": "47",
"relates_to_product_reference": "46"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Vijeo Designer Version 6.2 SP12 installed on Schneider Electric HMISCU",
"product_id": "51"
},
"product_reference": "48",
"relates_to_product_reference": "46"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Vijeo Designer Versions 6.2 SP12 (or above) installed on Schneider Electric HMISCU",
"product_id": "52"
},
"product_reference": "49",
"relates_to_product_reference": "46"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Vijeo Designer Versions prior to v6.3 SP1 installed on Schneider Electric HMISTU Series",
"product_id": "57"
},
"product_reference": "54",
"relates_to_product_reference": "53"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Vijeo Designer Version 6.3 SP1 installed on Schneider Electric HMISTU Series",
"product_id": "58"
},
"product_reference": "55",
"relates_to_product_reference": "53"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Vijeo Designer Version 6.3 SP1 (or above) installed on Schneider Electric HMISTU Series",
"product_id": "59"
},
"product_reference": "56",
"relates_to_product_reference": "53"
},
{
"category": "optional_component_of",
"full_product_name": {
"name": "Schneider Electric JACE-8000 optional component of Schneider Electric TAC I/A Series",
"product_id": "63"
},
"product_reference": "61",
"relates_to_product_reference": "60"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Niagara Framework Versions prior to v4.10u1 installed on JACE-8000 optional component of Schneider Electric TAC I/A Series",
"product_id": "64"
},
"product_reference": "62",
"relates_to_product_reference": "63"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Niagara Framework Version 4.10u1 installed on JACE-8000 optional component of Schneider Electric TAC I/A Series",
"product_id": "66"
},
"product_reference": "65",
"relates_to_product_reference": "63"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Pro-face GP-Pro EX Versions prior to 4.09.350 installed on Schneider Electric Pro-face SP-5B00",
"product_id": "151"
},
"product_reference": "137",
"relates_to_product_reference": "139"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Pro-face GP-Pro EX Versions prior to 4.09.350 installed on Schneider Electric Pro-face SP-5B10",
"product_id": "152"
},
"product_reference": "137",
"relates_to_product_reference": "140"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Pro-face GP-Pro EX Versions prior to 4.09.350 installed on Schneider Electric Pro-face SP-5B90",
"product_id": "153"
},
"product_reference": "137",
"relates_to_product_reference": "141"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Pro-face GP-Pro EX Versions prior to 4.09.350 installed on Schneider Electric Pro-face ST6000 Series (GP-ProEX model)",
"product_id": "154"
},
"product_reference": "137",
"relates_to_product_reference": "142"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Pro-face GP-Pro EX Versions prior to 4.09.350 installed on Schneider Electric Pro-face ET6000 Series",
"product_id": "155"
},
"product_reference": "137",
"relates_to_product_reference": "143"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Pro-face GP-Pro EX Version 4.09.350 or later installed on Schneider Electric Pro-face SP-5B00",
"product_id": "156"
},
"product_reference": "138",
"relates_to_product_reference": "139"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Pro-face GP-Pro EX Version 4.09.350 or later installed on Schneider Electric Pro-face SP-5B10",
"product_id": "157"
},
"product_reference": "138",
"relates_to_product_reference": "140"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Pro-face GP-Pro EX Version 4.09.350 or later installed on Schneider Electric Pro-face SP-5B90",
"product_id": "158"
},
"product_reference": "138",
"relates_to_product_reference": "141"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Pro-face GP-Pro EX Version 4.09.350 or later installed on Schneider Electric Pro-face ST6000 Series (GP-ProEX model)",
"product_id": "159"
},
"product_reference": "138",
"relates_to_product_reference": "142"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Pro-face GP-Pro EX Version 4.09.350 or later installed on Schneider Electric Pro-face ET6000 Series",
"product_id": "160"
},
"product_reference": "138",
"relates_to_product_reference": "143"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Pro-face GP-Pro EX Versions prior to 4.09.450 installed on Schneider Electric Pro-face LT4000M Series",
"product_id": "161"
},
"product_reference": "147",
"relates_to_product_reference": "144"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Pro-face GP-Pro EX Version 4.09.450 or later installed on Schneider Electric Pro-face LT4000M Series",
"product_id": "162"
},
"product_reference": "148",
"relates_to_product_reference": "144"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Pro-face GP-Pro EX Versions prior to 4.09.400 installed on Schneider Electric Pro-face GP4000 Series",
"product_id": "163"
},
"product_reference": "149",
"relates_to_product_reference": "145"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Pro-face GP-Pro EX Versions prior to 4.09.400 installed on Schneider Electric Pro-face GP4000H Series",
"product_id": "164"
},
"product_reference": "149",
"relates_to_product_reference": "146"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Pro-face GP-Pro EX Version 4.09.400 or later installed on Schneider Electric Pro-face GP4000 Series",
"product_id": "165"
},
"product_reference": "150",
"relates_to_product_reference": "145"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Pro-face GP-Pro EX Version 4.09.400 or later installed on Schneider Electric Pro-face GP4000H Series",
"product_id": "166"
},
"product_reference": "150",
"relates_to_product_reference": "146"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Modicon M580 CPU Safety Version SV4.21 installed on Schneider Electric EcoStruxure\u2122 Control Expert Versions greater than or equal to 16.0 HF001",
"product_id": "202"
},
"product_reference": "100",
"relates_to_product_reference": "201"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"urls": [
"https://us-cert.cisa.gov/ics/advisories/icsa-21-119-04"
]
}
],
"cve": "CVE-2020-35198",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "description",
"text": "An issue was discovered in Wind River VxWorks 7. The memory allocator has a possible integer overflow in calculating a memory block\u0027s size to be allocated by calloc(). As a result, the actual memory allocated is smaller than the buffer size specified by the arguments, leading to memory corruption.",
"title": "CVE Description"
}
],
"product_status": {
"fixed": [
"2",
"4",
"6",
"11",
"13",
"18",
"21",
"24",
"26",
"28",
"30",
"38",
"39",
"41",
"42",
"44",
"45",
"51",
"52",
"58",
"59",
"68",
"70",
"72",
"74",
"76",
"78",
"80",
"82",
"84",
"86",
"88",
"90",
"92",
"94",
"96",
"98",
"102",
"104",
"106",
"108",
"110",
"112",
"115",
"119",
"121",
"123",
"125",
"127",
"129",
"132",
"134",
"136",
"156",
"157",
"158",
"159",
"160",
"162",
"165",
"166",
"170",
"172",
"174",
"176",
"178",
"180",
"182",
"184",
"186",
"202"
],
"known_affected": [
"1",
"3",
"5",
"7",
"10",
"12",
"17",
"20",
"22",
"23",
"25",
"27",
"29",
"37",
"40",
"43",
"50",
"57",
"67",
"69",
"71",
"73",
"75",
"77",
"79",
"81",
"83",
"85",
"87",
"89",
"91",
"93",
"95",
"97",
"99",
"101",
"103",
"105",
"107",
"109",
"111",
"113",
"114",
"116",
"117",
"118",
"120",
"122",
"124",
"126",
"128",
"130",
"131",
"133",
"135",
"151",
"152",
"153",
"154",
"155",
"161",
"163",
"164",
"167",
"168",
"169",
"171",
"173",
"175",
"177",
"179",
"181",
"183",
"185",
"187",
"188",
"190",
"191",
"192",
"193",
"194",
"195",
"196",
"197",
"198",
"199",
"200"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Version 1.0.5 of Easergy C5 includes a fix for these vulnerabilities and \nis available through Schneider Electric regional DPACs.",
"product_ids": [
"1"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "Easergy MiCOM P638 Version 676.701 of the P30 firmware includes a fix for these vulnerabilities and is available on request from Schneider Electric\u2019s Customer Care",
"product_ids": [
"5"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "All other Easergy MiCOM P30 Models: Version 675 and later of the P30 firmware includes a fix for these vulnerabilities and is available on request from Schneider Electric\u2019s Customer Care Center.",
"product_ids": [
"3"
],
"restart_required": {
"category": "none"
}
},
{
"category": "mitigation",
"details": "Customers should immediately apply the following mitigations to reduce the risk of exploit: \u2022 Use relays only in a protected environment to minimize network exposure and ensure that they are not accessible from outside. \u2022 Disable unused network protocol interfaces. \u2022 Use firewalls to protect and separate the control system network from other networks. \u2022 Activate and apply user management and password features. ",
"product_ids": [
"7"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "Version 4.03 of the EPC2000 includes a fix for these vulnerabilities and is available for download here:https://www.eurotherm.com/?wpdmdl=137741",
"product_ids": [
"10"
],
"restart_required": {
"category": "none"
},
"url": "https://www.eurotherm.com/?wpdmdl=137741"
},
{
"category": "vendor_fix",
"details": "Version 5.20 of the EPC3000 includes a fix for these vulnerabilities and is available for download here:https://www.eurotherm.com/?wpdmdl=89545 Device will reboot automatically after upgrade.",
"product_ids": [
"12"
],
"restart_required": {
"category": "system"
},
"url": "https://www.eurotherm.com/?wpdmdl=89545"
},
{
"category": "vendor_fix",
"details": "Version 1.2.1 of Vijeo Designer Basic includes a fix for these vulnerabilities. Please contact your Schneider Electric\u2019s Customer Care Center to obtain the installer. To complete the update, connect to Harmony HMI and download the firmware using Vijeo Designer Basic V1.2.1.",
"product_ids": [
"17",
"20"
],
"restart_required": {
"category": "none"
}
},
{
"category": "no_fix_planned",
"details": "The E+PLC100 product has reached its end of life and is no longer supported.",
"product_ids": [
"22"
],
"restart_required": {
"category": "none"
}
},
{
"category": "mitigation",
"details": "Customers should immediately apply the following mitigations to reduce the risk of exploit:\u2022 Setup network segmentation and implement a firewall to block all unauthorized access to the device.\u2022 Configure the Access Control List following the recommendations of the device user manual.\u2022 Setup a VPN between the E+PLC100 device and any remote visualization workstations running the E+PLC tools.\u2022 Activate and apply user management and password features. Limit the access to both development and control system by physical means, operating system features, etc.",
"product_ids": [
"22"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "Version 1.4.0.0 of the E+PLC400 firmware is available and includes a fix for these vulnerabilities. Please contact the Eurotherm Support team to obtain the firmware update. Please be sure to include the following when contacting the support team:\u2022 End Username, Company, and Email Address\u2022 Serial numbers of the devices to be upgraded\u2022 Current E+PLC400 firmware version",
"product_ids": [
"23"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "Version 1.4.0.0 of the E+PLC400 firmware is available and includes a fix for these vulnerabilities. Please contact the Eurotherm Support team to obtain the firmware update. Please be sure to include the following when contacting the support team:\u2022 End Username, Company, and Email Address\u2022 Serial numbers of the devices to be upgraded\u2022 Current E+PLC400 firmware versionVersion 7.3 of the Eycon firmware is available and includes a fix for these vulnerabilities. Access to the patch can be obtained through the following link: https://partners.eurotherm.com/member-login",
"product_ids": [
"25"
],
"restart_required": {
"category": "none"
},
"url": "https://partners.eurotherm.com/member-login"
},
{
"category": "vendor_fix",
"details": "Version 8.2 of the T2550 firmware is available and includes a fix for these vulnerabilities. Access to the patch can be obtained through the following link: https://partners.eurotherm.com/member-login ",
"product_ids": [
"27"
],
"restart_required": {
"category": "none"
},
"url": "https://partners.eurotherm.com/member-login"
},
{
"category": "vendor_fix",
"details": "Version 6.3 of the T2750 firmware is available and includes a fix for these vulnerabilities. Access to the patch can be obtained through the following link:https://partners.eurotherm.com/member-login",
"product_ids": [
"29"
],
"restart_required": {
"category": "none"
},
"url": "https://partners.eurotherm.com/member-login"
},
{
"category": "vendor_fix",
"details": "Version 6.2 SP11 Multi HotFix 4 of Vijeo Designer includes a fix for these vulnerabilities and can be updated through the Schneider Electric Software Update (SESU) application. On the engineering workstation, update to V6.2 SP11 Multi HotFix 4 (or above) of Vijeo Designer.To complete the update, connect to Harmony HMI and download the project file using Vijeo Designer V6.2 SP11 Multi HotFix 4.",
"product_ids": [
"37",
"40",
"43"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "Version 6.2 SP12 of Vijeo Designer includes a fix for these vulnerabilities and can be updated through the Schneider Electric Software Update (SESU) application. On the engineering workstation, update to V6.2 SP12 (or above) of Vijeo Designer. To complete the update, connect to Harmony HMI and download the project file using Vijeo Designer V6.2 SP12.",
"product_ids": [
"50"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "Version 6.3 SP1 of Vijeo Designer includes a fix for these vulnerabilities and can be updated through the Schneider Electric Software Update (SESU) application. https://www.se.com/ww/en/product-range/1054-vijeo-designer-hmi-software/#software-and-firmware On the engineering workstation, update to V6.3 SP1 (or above) of Vijeo Designer. To complete the update, connect to Harmony HMI and download the project file using Vijeo Designer V6.3 SP1.",
"product_ids": [
"57"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/product-range/1054-vijeo-designer-hmi-software/#software-and-firmware"
},
{
"category": "vendor_fix",
"details": "Versions B5.118, D1.92, D4.38, D5.25I and D6.18 of MiCOM C264 include a fix for these vulnerabilities and are available through Schneider Electric regional DPACs.",
"product_ids": [
"67",
"69",
"71",
"73",
"75"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "Version 5.1.9.34 of Modicon M241/M251 Logic Controllers includes a fix for these vulnerabilities.On the engineering workstation, update to latest version of EcoStruxure Machine Expert: https://www.se.com/ww/en/product-range/2226-ecostruxure-machine-expert-somachine/?parent-subcategory-id=5140\u0026filter=business-1-industrial-automation-and-control To complete the update on Modicon M241/M251 Logic Controllers, update to firmware version V5.1.9.34 or higher available within EcoStruxure Machine Expert. A reboot is needed.",
"product_ids": [
"77",
"79"
],
"restart_required": {
"category": "system"
},
"url": "https://www.se.com/ww/en/product-range/2226-ecostruxure-machine-expert-somachine/?parent-subcategory-id=5140\u0026filter=business-1-industrial-automation-and-control"
},
{
"category": "vendor_fix",
"details": "Version 5.1.6.1 of Modicon M262 Logic Controllers includes a fix for these vulnerabilities.On the engineering workstation, update to latest version of EcoStruxure Machine Expert: https://www.se.com/ww/en/product-range/2226-ecostruxure-machine-expert-somachine/?parent-subcategory-id=5140\u0026filter=business-1-industrial-automation-and-controlTo complete the update on Modicon M262 Logic Controllers, update to firmware version V5.1.6.1 or higher available within EcoStruxure Machine Expert. A reboot is needed.",
"product_ids": [
"81"
],
"restart_required": {
"category": "system"
},
"url": "https://www.se.com/ww/en/product-range/2226-ecostruxure-machine-expert-somachine/?parent-subcategory-id=5140\u0026filter=business-1-industrial-automation-and-control"
},
{
"category": "vendor_fix",
"details": "Firmware Version 5.0.4.18 of Modicon M258/LMC058 logic controllers includes a fix for these vulnerabilities and can be updated through Schneider Electric Software Update (SESU) application.",
"product_ids": [
"83",
"85"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "Version 2.11 of BMXNOC0401 includes a fix for thesevulnerabilities and is available for download here:https://www.se.com/ww/en/product/BMXNOC0401/",
"product_ids": [
"87"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/product/BMXNOC0401/"
},
{
"category": "vendor_fix",
"details": "Version SV3.50 of BMXNOE0100 (H) includes a fix for thesevulnerabilities and is available for download here:https://www.se.com/ww/en/download/document/BMXNOE0100_SV_03.50/",
"product_ids": [
"89"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/download/document/BMXNOE0100_SV_03.50/"
},
{
"category": "vendor_fix",
"details": "Version SV6.70 of BMXNOE0110 (H) includes a fix for thesevulnerabilities and is available for download here:https://www.se.com/ww/en/download/document/BMXNOE0110_SV_06.70/",
"product_ids": [
"91"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/download/document/BMXNOE0110_SV_06.70/"
},
{
"category": "vendor_fix",
"details": "Version 1.7 IR24 of BMXNOR0200H includes a fix for thesevulnerabilities and is available for download here:https://www.se.com/ww/en/product/BMXNOR0200H/",
"product_ids": [
"93"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/product/BMXNOR0200H/"
},
{
"category": "vendor_fix",
"details": "Version 3.50 of Modicon M340 includes a fix for these vulnerabilities and is available for download here:https://www.se.com/ww/en/download/document/BMXP34xxxxx_SV_03.50/ ",
"product_ids": [
"95"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/download/document/BMXP34xxxxx_SV_03.50/"
},
{
"category": "vendor_fix",
"details": "Version SV4.10 includes a fix for these vulnerabilities and is available for download here: https://www.se.com/ww/en/download/document/BMEx58x0x0_SV04.10/",
"product_ids": [
"97"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/download/document/BMEx58x0x0_SV04.10/"
},
{
"category": "vendor_fix",
"details": "Version SV4.21 includes a fix for these vulnerabilities and is available for download here: https://www.se.com/ww/en/product-range/62098-modicon-m580-pac-controller/#software-and-firmware Important: customer needs to use version of EcoStruxure\u2122 Control Expert V16.0 HF001 minimum to connect with the latest version of M580 CPU Safety. The software is available for download here: https://www.se.com/ww/en/product-range/548-ecostruxure-control-expert-unity-pro/#software-and-firmware",
"product_ids": [
"99"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/product-range/62098-modicon-m580-pac-controller/#software-and-firmware"
},
{
"category": "vendor_fix",
"details": "Version SV2.21 includes a fix for these vulnerabilities and is available for download here: BMENOC 0301 - https://www.se.com/ww/en/download/document/BMENOC0301_SV_02.21/",
"product_ids": [
"101"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/download/document/BMENOC0301_SV_02.21/"
},
{
"category": "vendor_fix",
"details": "Version SV2.21 includes a fix for these vulnerabilities and is available for download here: BMENOC 0311 -https://www.se.com/ww/en/download/document/BMENOC0311_SV_02.21",
"product_ids": [
"103"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/download/document/BMENOC0311_SV_02.21"
},
{
"category": "vendor_fix",
"details": "Version SV1.09 includes a fix for these vulnerabilities and is available for download here:https://www.se.com/ww/en/download/document/BMENOC0321_SV_01.09",
"product_ids": [
"105"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/download/document/BMENOC0321_SV_01.09"
},
{
"category": "vendor_fix",
"details": "Version SV1.5 of HART X80 Module includes a fix for these vulnerabilities and is available for download here:https://www.se.com/ww/en/download/document/BMEAHO0412_Firmware_upgrade/",
"product_ids": [
"107",
"109"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/download/document/BMEAHO0412_Firmware_upgrade/"
},
{
"category": "vendor_fix",
"details": "Version 1.8 of MC80 Controller (BMKC80) includes a fix for these vulnerabilities and is available for download here: https://www.se.com/ww/en/product-range/62396-modicon-mc80/#software-and-firmware",
"product_ids": [
"111"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/product-range/62396-modicon-mc80/#software-and-firmware"
},
{
"category": "mitigation",
"details": "Customers should immediately apply the following mitigations to reduce the risk of exploit:\u2022 Setup network segmentation and implement a firewall to block all unauthorized access to the device.\u2022 Configure the Access Control List following the recommendations in the device user manual.\u2022 Setup a VPN between the Modicon PLC device and the remote engineering workstations.\u2022 Activate and apply user management and password features.\u2022 Limit the access to both development and control system by physical means, operating system features, etc.",
"product_ids": [
"113"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "Version SV2.6 includes a fix for these vulnerabilities and is available for download here: https://www.se.com/ww/en/download/document/Momentum_FW_update/ ",
"product_ids": [
"114"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/download/document/Momentum_FW_update/"
},
{
"category": "no_fix_planned",
"details": "Quantum and Premium offers have reached their end of life and are no longer supported.",
"product_ids": [
"116",
"117"
],
"restart_required": {
"category": "none"
}
},
{
"category": "mitigation",
"details": "Customers should immediately apply the following mitigations to reduce the risk of exploit:\u2022 Setup network segmentation and implement a firewall to block all unauthorized access to the device.\u2022 Setup a VPN between the Modicon PLC device and the remote engineering workstations.\u2022 Activate and apply user management and password features.\u2022 Limit the access to both development and control system by physical means, operating system features, etc.Customers should also consider upgrading to the latest product offering Modicon M580 ePAC.",
"product_ids": [
"116",
"117"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "Version 1.60 of BMXNOM0200 includes a fix for these vulnerabilities and is available for download here:https://www.se.com/ww/en/product/BMXNOM0200/ ",
"product_ids": [
"118"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/product/BMXNOM0200/"
},
{
"category": "vendor_fix",
"details": "Version 1.04 of BMENOS0300 includes a fix for these vulnerabilities and is available for download here:https://www.se.com/ww/en/product/BMENOS0300/",
"product_ids": [
"120"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/product/BMENOS0300/"
},
{
"category": "vendor_fix",
"details": "Version 10.02 of nanodac includes a fix for this vulnerability and is available for download here: https://www.eurotherm.com/?wpdmdl=28419 Device will reboot automatically after upgrade.",
"product_ids": [
"122"
],
"restart_required": {
"category": "system"
},
"url": "https://www.eurotherm.com/?wpdmdl=28419"
},
{
"category": "vendor_fix",
"details": "Firmware Version 1.66.5.1 of PacDrive Eco/Pro/Pro2 Logic Controllers includes a fix for these vulnerabilities and can be updated through the Schneider Electric Software Update (SESU) application.",
"product_ids": [
"124",
"126",
"128"
],
"restart_required": {
"category": "none"
}
},
{
"category": "no_fix_planned",
"details": "PacDrive M Logic Controller has reached its end of life and is no longer supported.",
"product_ids": [
"130"
],
"restart_required": {
"category": "none"
}
},
{
"category": "mitigation",
"details": "Customers should immediately apply the following mitigations to reduce the risk of exploit:\u2022 Use controllers and devices only in a protected environment to minimize network exposure and ensure that they are not accessible from outside,\u2022 Use firewalls to protect and separate the control system network from other networks,\u2022 Use VPN (Virtual Private Networks) tunnels if remote access is required,\u2022 Activate and apply user management and password features,\u2022 Limit the access to both development and control system by physical means, operating system features, etc.Customers should also consider upgrading to the latest product offering PacDrive Eco/Pro/Pro2 to resolve this issue.",
"product_ids": [
"130"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "Version 3.1 of PowerLogic ION7400 includes a fix for this vulnerability and is available for download here: https://www.se.com/ww/en/download/document/ION7400_meter_FW_v003.001.000/",
"product_ids": [
"131"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/download/document/ION7400_meter_FW_v003.001.000/"
},
{
"category": "vendor_fix",
"details": "Version 3.1 of PowerLogic PM8000 includes a fix for this vulnerability and is available for download here: https://www.se.com/ww/en/download/document/PM8000_meter_FW_v003.001.000/",
"product_ids": [
"133"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/download/document/PM8000_meter_FW_v003.001.000/"
},
{
"category": "vendor_fix",
"details": "Version 3.1 of PowerLogic ION9000 includes a fix for this vulnerability and is available for download here: https://www.se.com/ww/en/download/document/ION9000_meter_FW_v003.001.000/",
"product_ids": [
"135"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/download/document/ION9000_meter_FW_v003.001.000/"
},
{
"category": "mitigation",
"details": "If the update cannot be applied immediately, please follow the guidelines in Schneider Electric Recommended Cybersecurity Best Practices document to help mitigate the risk.",
"product_ids": [
"131",
"133",
"135"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "Version 4.09.350 of Pro-face GP-Pro EX includes a fix for these vulnerabilities and is available for download here: https://www.proface.com/en/download/trial/gpproex/v40 or update online via GP-Pro EX (refer to Help menu and select \u201cConfirm Update of GP-Pro EX\u201d).To complete the update, connect to Pro-face HMI and download the project file using GP-Pro EX V4.09.350 or later.",
"product_ids": [
"151",
"152",
"153",
"154",
"155"
],
"restart_required": {
"category": "none"
},
"url": "https://www.proface.com/en/download/trial/gpproex/v40"
},
{
"category": "vendor_fix",
"details": "Version 4.09.450 of Pro-face GP-Pro EX includes a fix for these vulnerabilities and is available for download here: https://www.proface.com/en/download/trial/gpproex/v40 or update online via GP-Pro EX (refer to Help menu and select \u201cConfirm Update of GP-Pro EX\u201d). To complete the update, connect to Pro-face HMI and download the project file using GP-Pro EX V4.09.400 or later.",
"product_ids": [
"161"
],
"restart_required": {
"category": "none"
},
"url": "https://www.proface.com/en/download/trial/gpproex/v40"
},
{
"category": "vendor_fix",
"details": "Version 4.09.400 of Pro-face GP-Pro EX includes a fix for these vulnerabilities and is available for download here: https://www.proface.com/en/download/trial/gpproex/v40 or update online via GP-Pro EX (refer to Help menu and select \u201cConfirm Update of GP-Pro EX\u201d). To complete the update, connect to Pro-face HMI and download the project file using GP-Pro EX V4.09.400 or later.",
"product_ids": [
"163",
"164"
],
"restart_required": {
"category": "none"
},
"url": "https://www.proface.com/en/download/trial/gpproex/v40"
},
{
"category": "mitigation",
"details": "Customers should immediately apply the mitigations found in the Cybersecurity Reference Manual linked below to reduce the risk of exploit: https://www.se.com/ww/en/download/document/EIO0000001999/",
"product_ids": [
"167",
"168"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/download/document/EIO0000001999/"
},
{
"category": "vendor_fix",
"details": "Version SY-1101207, Version N of SCD6000 firmware includes a fix for this vulnerability. Contact your local Customer Support to receive this firmware version. Reboot is required after installation.",
"product_ids": [
"169"
],
"restart_required": {
"category": "system"
}
},
{
"category": "vendor_fix",
"details": "Version C3414-500-S02K5_P5 of SAGE RTU CPU 3414 includes a fix for this vulnerability and is available for download here: https://www.sage-rtu.com/downloads.html Reboot of SAGE RTU is required after firmware upgrade.This fix applies a Wind River VxWorks (real-time operating system) patch to bring code libraries current to 6.9.4.12 RCPL3 revision. This corrects issues with overflow causing malloc/calloc to return valid pointer when it should return fail indication NULL pointer.",
"product_ids": [
"171"
],
"restart_required": {
"category": "system"
},
"url": "https://www.sage-rtu.com/downloads.html"
},
{
"category": "vendor_fix",
"details": "Version 2.43 of the Versadac scalable data recorder is available and includes a fix for these vulnerabilities.Access to the patch can be obtained through the following link: https://partners.eurotherm.com/member-login",
"product_ids": [
"173"
],
"restart_required": {
"category": "none"
},
"url": "https://partners.eurotherm.com/member-login"
},
{
"category": "vendor_fix",
"details": "Version SV02.80 of BMECRA31210, BMXCRA3120, BMXCRA31210 includes a fix for these vulnerabilities and is available for download here: https://www.se.com/ww/en/product-country-selector/?pageType=product\u0026sourceId=BMXCRA31210",
"product_ids": [
"175",
"177",
"179"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/product-country-selector/?pageType=product\u0026sourceId=BMXCRA31210"
},
{
"category": "vendor_fix",
"details": "Version V02.80 of 140CRA31200 includes a fix for these vulnerabilities and is available for download here: https://www.se.com/ww/en/product/140CRA31200/quantum-rio-drop-e-ip-1ch",
"product_ids": [
"181"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/product/140CRA31200/quantum-rio-drop-e-ip-1ch"
},
{
"category": "vendor_fix",
"details": "Version V02.80 of 140CRA31908 includes a fix for these vulnerabilities and is available for download here: https://www.se.com/ww/en/product/140CRA31908/m580-quantum-s908-rio-drop-adapter",
"product_ids": [
"183"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/product/140CRA31908/m580-quantum-s908-rio-drop-adapter"
},
{
"category": "vendor_fix",
"details": "Version SV2.6 of BMENOP0300 includes a fix for these vulnerabilities and is available for download here: https://www.se.com/ww/en/product-country-selector/?pageType=product\u0026sourceId=BMENOP0300",
"product_ids": [
"185"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/product-country-selector/?pageType=product\u0026sourceId=BMENOP0300"
},
{
"category": "mitigation",
"details": "Customers should immediately apply the following mitigations to reduce the risk of exploit:\u2022 Setup network segmentation and implement a firewall to block all unauthorized access to the device.\u2022 Configure the Access Control List following the recommendations of the device user manual.\u2022 Setup a VPN between the Modicon. Communication modules and the remote engineering workstations.\u2022 Activate and apply user management and password features.Limit the access to both development and control system by physical means, operating system features, etc.",
"product_ids": [
"187"
],
"restart_required": {
"category": "none"
}
},
{
"category": "mitigation",
"details": "Customers should immediately apply the following mitigations to reduce the risk of exploit: \u2022 Use relays only in a protected environment to minimize network exposure and ensure that they are not accessible from outside.\u2022 Disable unused network protocol interfaces.\u2022 Use firewalls to protect and separate the control system network from other networks.\u2022 Activate and apply user management and password features.\u2022 Limit the access to the system by physical means.",
"product_ids": [
"188"
],
"restart_required": {
"category": "none"
}
},
{
"category": "mitigation",
"details": "Customers should immediately apply the following mitigations to reduce the risk of exploit:\u2022 Setup network segmentation and implement a firewall to block all unauthorized access to the device.\u2022 Configure the Access Control List following the recommendations of the device user manual.\u2022 Setup a VPN between the EPack device and any remote visualization workstations running iTools.\u2022 Activate and apply user management and password features. Limit the access to both development and control system by physical means, operating system features, etc.",
"product_ids": [
"190"
],
"restart_required": {
"category": "none"
}
},
{
"category": "mitigation",
"details": "Customers should immediately apply the following mitigations to reduce the risk of exploit:\u2022 Locate control and safety system networks and remote devices behind firewalls and isolate them from the business network.\u2022 Install physical controls so no unauthorized personnel can access your industrial control and safety systems, components, peripheral equipment, and networks.\u2022 Minimize network exposure for all control system devices and systems and ensure that they are not accessible from the Internet.When remote access is required, use secure methods, such as the Vijeo Connect.",
"product_ids": [
"191"
],
"restart_required": {
"category": "none"
}
},
{
"category": "mitigation",
"details": "Customers should immediately apply the following mitigations to reduce the risk of exploit:\u2022 Use controllers and devices only in a protected environment to minimize network exposure and ensure that they are not accessible from outside,\u2022 Use firewalls to protect and separate the control system network from other networks,\u2022 Use VPN (Virtual Private Networks) tunnels if remote access is required,\u2022 Activate and apply user management and password features,\u2022 Limit the access to both development and control system by physical means, operating system features, etc.Customers should also consider upgrading to the latest product offering Modicon M262 to resolve this issue.",
"product_ids": [
"192"
],
"restart_required": {
"category": "none"
}
},
{
"category": "mitigation",
"details": "Customers should immediately apply the followingmitigations to reduce the risk of exploit:\u2022 Locate control and safety system networks and remote devices behind firewalls and isolate them from the business network.\u2022 Install physical controls so no unauthorized personnel can access your industrial control and safety systems, components, peripheral equipment,and networks.\u2022 Minimize network exposure for all control system devices and systems and ensure that they are not accessible from the Internet.\u2022 When remote access is required, use secure methods, such as the Pro-face Connect.Customers should also consider upgrading to the latest product offering to resolve this issue. Please contact your sales support about alternative products",
"product_ids": [
"193",
"194",
"195"
],
"restart_required": {
"category": "none"
}
},
{
"category": "mitigation",
"details": "Customers should immediately apply the following mitigations to reduce the risk of exploit:\u2022 Setup network segmentation and implement a firewall to block all unauthorized access to the device.\u2022 Configure the Access Control List following the recommendations of the device user manual.\u2022 Setup a VPN between the 6000-series device and any remote visualization workstations running Bridge.\u2022 Activate and apply user management and password features. Limit the access to both development and control system by physical means, operating system features, etc.",
"product_ids": [
"196",
"197",
"198",
"199",
"200"
],
"restart_required": {
"category": "none"
}
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"3",
"5",
"7",
"10",
"12",
"17",
"20",
"22",
"23",
"25",
"27",
"29",
"37",
"40",
"43",
"50",
"57",
"67",
"69",
"71",
"73",
"75",
"77",
"79",
"81",
"83",
"85",
"87",
"89",
"91",
"93",
"95",
"97",
"99",
"101",
"103",
"105",
"107",
"109",
"111",
"113",
"114",
"116",
"117",
"118",
"120",
"122",
"124",
"126",
"128",
"130",
"131",
"133",
"135",
"151",
"152",
"153",
"154",
"155",
"161",
"163",
"164",
"167",
"168",
"169",
"171",
"173",
"175",
"177",
"179",
"181",
"183",
"185",
"187",
"188",
"190",
"191",
"192",
"193",
"194",
"195",
"196",
"197",
"198",
"199",
"200"
]
}
],
"title": "CVE-2020-35198"
},
{
"acknowledgments": [
{
"urls": [
"https://us-cert.cisa.gov/ics/advisories/icsa-21-119-04"
]
}
],
"cve": "CVE-2020-28895",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "description",
"text": "In Wind River VxWorks, memory allocator has a possible overflow in calculating the memory block\u0027s size to be allocated by calloc(). As a result, the actual memory allocated is smaller than the buffer size specified by the arguments, leading to memory corruption.",
"title": "CVE Description"
}
],
"product_status": {
"fixed": [
"2",
"4",
"6",
"9",
"11",
"13",
"18",
"21",
"24",
"26",
"28",
"30",
"38",
"39",
"41",
"42",
"44",
"45",
"51",
"52",
"58",
"59",
"68",
"70",
"72",
"74",
"76",
"78",
"80",
"82",
"84",
"86",
"88",
"90",
"92",
"94",
"96",
"98",
"102",
"104",
"106",
"108",
"110",
"112",
"115",
"119",
"121",
"123",
"125",
"127",
"129",
"132",
"134",
"136",
"156",
"157",
"158",
"159",
"160",
"162",
"165",
"166",
"170",
"172",
"174",
"176",
"178",
"180",
"182",
"184",
"186",
"202"
],
"known_affected": [
"1",
"3",
"5",
"7",
"8",
"10",
"12",
"17",
"20",
"22",
"23",
"25",
"27",
"29",
"37",
"40",
"43",
"50",
"57",
"67",
"69",
"71",
"73",
"75",
"77",
"79",
"81",
"83",
"85",
"87",
"89",
"91",
"93",
"95",
"97",
"99",
"101",
"103",
"105",
"107",
"109",
"111",
"113",
"114",
"116",
"117",
"118",
"120",
"122",
"124",
"126",
"128",
"130",
"131",
"133",
"135",
"151",
"152",
"153",
"154",
"155",
"161",
"163",
"164",
"167",
"168",
"169",
"171",
"173",
"175",
"177",
"179",
"181",
"183",
"185",
"187",
"188",
"189",
"190",
"191",
"192",
"193",
"194",
"195",
"196",
"197",
"198",
"199",
"200"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Version 1.0.5 of Easergy C5 includes a fix for these vulnerabilities and \nis available through Schneider Electric regional DPACs.",
"product_ids": [
"1"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "Easergy MiCOM P638 Version 676.701 of the P30 firmware includes a fix for these vulnerabilities and is available on request from Schneider Electric\u2019s Customer Care",
"product_ids": [
"5"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "All other Easergy MiCOM P30 Models: Version 675 and later of the P30 firmware includes a fix for these vulnerabilities and is available on request from Schneider Electric\u2019s Customer Care Center.",
"product_ids": [
"3"
],
"restart_required": {
"category": "none"
}
},
{
"category": "mitigation",
"details": "Customers should immediately apply the following mitigations to reduce the risk of exploit: \u2022 Use relays only in a protected environment to minimize network exposure and ensure that they are not accessible from outside. \u2022 Disable unused network protocol interfaces. \u2022 Use firewalls to protect and separate the control system network from other networks. \u2022 Activate and apply user management and password features. ",
"product_ids": [
"7"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "Version 01.401.101 of Easergy P5 firmware includes a fix for this vulnerability and is available on request from Schneider Electric\u0027s Customer Care Center. ",
"product_ids": [
"8"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "Version 4.03 of the EPC2000 includes a fix for these vulnerabilities and is available for download here:https://www.eurotherm.com/?wpdmdl=137741",
"product_ids": [
"10"
],
"restart_required": {
"category": "none"
},
"url": "https://www.eurotherm.com/?wpdmdl=137741"
},
{
"category": "vendor_fix",
"details": "Version 5.20 of the EPC3000 includes a fix for these vulnerabilities and is available for download here:https://www.eurotherm.com/?wpdmdl=89545 Device will reboot automatically after upgrade.",
"product_ids": [
"12"
],
"restart_required": {
"category": "system"
},
"url": "https://www.eurotherm.com/?wpdmdl=89545"
},
{
"category": "vendor_fix",
"details": "Version 1.2.1 of Vijeo Designer Basic includes a fix for these vulnerabilities. Please contact your Schneider Electric\u2019s Customer Care Center to obtain the installer. To complete the update, connect to Harmony HMI and download the firmware using Vijeo Designer Basic V1.2.1.",
"product_ids": [
"17",
"20"
],
"restart_required": {
"category": "none"
}
},
{
"category": "no_fix_planned",
"details": "The E+PLC100 product has reached its end of life and is no longer supported.",
"product_ids": [
"22"
],
"restart_required": {
"category": "none"
}
},
{
"category": "mitigation",
"details": "Customers should immediately apply the following mitigations to reduce the risk of exploit:\u2022 Setup network segmentation and implement a firewall to block all unauthorized access to the device.\u2022 Configure the Access Control List following the recommendations of the device user manual.\u2022 Setup a VPN between the E+PLC100 device and any remote visualization workstations running the E+PLC tools.\u2022 Activate and apply user management and password features. Limit the access to both development and control system by physical means, operating system features, etc.",
"product_ids": [
"22"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "Version 1.4.0.0 of the E+PLC400 firmware is available and includes a fix for these vulnerabilities. Please contact the Eurotherm Support team to obtain the firmware update. Please be sure to include the following when contacting the support team:\u2022 End Username, Company, and Email Address\u2022 Serial numbers of the devices to be upgraded\u2022 Current E+PLC400 firmware version",
"product_ids": [
"23"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "Version 1.4.0.0 of the E+PLC400 firmware is available and includes a fix for these vulnerabilities. Please contact the Eurotherm Support team to obtain the firmware update. Please be sure to include the following when contacting the support team:\u2022 End Username, Company, and Email Address\u2022 Serial numbers of the devices to be upgraded\u2022 Current E+PLC400 firmware versionVersion 7.3 of the Eycon firmware is available and includes a fix for these vulnerabilities. Access to the patch can be obtained through the following link: https://partners.eurotherm.com/member-login",
"product_ids": [
"25"
],
"restart_required": {
"category": "none"
},
"url": "https://partners.eurotherm.com/member-login"
},
{
"category": "vendor_fix",
"details": "Version 8.2 of the T2550 firmware is available and includes a fix for these vulnerabilities. Access to the patch can be obtained through the following link: https://partners.eurotherm.com/member-login ",
"product_ids": [
"27"
],
"restart_required": {
"category": "none"
},
"url": "https://partners.eurotherm.com/member-login"
},
{
"category": "vendor_fix",
"details": "Version 6.3 of the T2750 firmware is available and includes a fix for these vulnerabilities. Access to the patch can be obtained through the following link:https://partners.eurotherm.com/member-login",
"product_ids": [
"29"
],
"restart_required": {
"category": "none"
},
"url": "https://partners.eurotherm.com/member-login"
},
{
"category": "vendor_fix",
"details": "Version 6.2 SP11 Multi HotFix 4 of Vijeo Designer includes a fix for these vulnerabilities and can be updated through the Schneider Electric Software Update (SESU) application. On the engineering workstation, update to V6.2 SP11 Multi HotFix 4 (or above) of Vijeo Designer.To complete the update, connect to Harmony HMI and download the project file using Vijeo Designer V6.2 SP11 Multi HotFix 4.",
"product_ids": [
"37",
"40",
"43"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "Version 6.2 SP12 of Vijeo Designer includes a fix for these vulnerabilities and can be updated through the Schneider Electric Software Update (SESU) application. On the engineering workstation, update to V6.2 SP12 (or above) of Vijeo Designer. To complete the update, connect to Harmony HMI and download the project file using Vijeo Designer V6.2 SP12.",
"product_ids": [
"50"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "Version 6.3 SP1 of Vijeo Designer includes a fix for these vulnerabilities and can be updated through the Schneider Electric Software Update (SESU) application. https://www.se.com/ww/en/product-range/1054-vijeo-designer-hmi-software/#software-and-firmware On the engineering workstation, update to V6.3 SP1 (or above) of Vijeo Designer. To complete the update, connect to Harmony HMI and download the project file using Vijeo Designer V6.3 SP1.",
"product_ids": [
"57"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/product-range/1054-vijeo-designer-hmi-software/#software-and-firmware"
},
{
"category": "vendor_fix",
"details": "Versions B5.118, D1.92, D4.38, D5.25I and D6.18 of MiCOM C264 include a fix for these vulnerabilities and are available through Schneider Electric regional DPACs.",
"product_ids": [
"67",
"69",
"71",
"73",
"75"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "Version 5.1.9.34 of Modicon M241/M251 Logic Controllers includes a fix for these vulnerabilities.On the engineering workstation, update to latest version of EcoStruxure Machine Expert: https://www.se.com/ww/en/product-range/2226-ecostruxure-machine-expert-somachine/?parent-subcategory-id=5140\u0026filter=business-1-industrial-automation-and-control To complete the update on Modicon M241/M251 Logic Controllers, update to firmware version V5.1.9.34 or higher available within EcoStruxure Machine Expert. A reboot is needed.",
"product_ids": [
"77",
"79"
],
"restart_required": {
"category": "system"
},
"url": "https://www.se.com/ww/en/product-range/2226-ecostruxure-machine-expert-somachine/?parent-subcategory-id=5140\u0026filter=business-1-industrial-automation-and-control"
},
{
"category": "vendor_fix",
"details": "Version 5.1.6.1 of Modicon M262 Logic Controllers includes a fix for these vulnerabilities.On the engineering workstation, update to latest version of EcoStruxure Machine Expert: https://www.se.com/ww/en/product-range/2226-ecostruxure-machine-expert-somachine/?parent-subcategory-id=5140\u0026filter=business-1-industrial-automation-and-controlTo complete the update on Modicon M262 Logic Controllers, update to firmware version V5.1.6.1 or higher available within EcoStruxure Machine Expert. A reboot is needed.",
"product_ids": [
"81"
],
"restart_required": {
"category": "system"
},
"url": "https://www.se.com/ww/en/product-range/2226-ecostruxure-machine-expert-somachine/?parent-subcategory-id=5140\u0026filter=business-1-industrial-automation-and-control"
},
{
"category": "vendor_fix",
"details": "Firmware Version 5.0.4.18 of Modicon M258/LMC058 logic controllers includes a fix for these vulnerabilities and can be updated through Schneider Electric Software Update (SESU) application.",
"product_ids": [
"83",
"85"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "Version 2.11 of BMXNOC0401 includes a fix for thesevulnerabilities and is available for download here:https://www.se.com/ww/en/product/BMXNOC0401/",
"product_ids": [
"87"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/product/BMXNOC0401/"
},
{
"category": "vendor_fix",
"details": "Version SV3.50 of BMXNOE0100 (H) includes a fix for thesevulnerabilities and is available for download here:https://www.se.com/ww/en/download/document/BMXNOE0100_SV_03.50/",
"product_ids": [
"89"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/download/document/BMXNOE0100_SV_03.50/"
},
{
"category": "vendor_fix",
"details": "Version SV6.70 of BMXNOE0110 (H) includes a fix for thesevulnerabilities and is available for download here:https://www.se.com/ww/en/download/document/BMXNOE0110_SV_06.70/",
"product_ids": [
"91"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/download/document/BMXNOE0110_SV_06.70/"
},
{
"category": "vendor_fix",
"details": "Version 1.7 IR24 of BMXNOR0200H includes a fix for thesevulnerabilities and is available for download here:https://www.se.com/ww/en/product/BMXNOR0200H/",
"product_ids": [
"93"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/product/BMXNOR0200H/"
},
{
"category": "vendor_fix",
"details": "Version 3.50 of Modicon M340 includes a fix for these vulnerabilities and is available for download here:https://www.se.com/ww/en/download/document/BMXP34xxxxx_SV_03.50/ ",
"product_ids": [
"95"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/download/document/BMXP34xxxxx_SV_03.50/"
},
{
"category": "vendor_fix",
"details": "Version SV4.10 includes a fix for these vulnerabilities and is available for download here: https://www.se.com/ww/en/download/document/BMEx58x0x0_SV04.10/",
"product_ids": [
"97"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/download/document/BMEx58x0x0_SV04.10/"
},
{
"category": "vendor_fix",
"details": "Version SV4.21 includes a fix for these vulnerabilities and is available for download here: https://www.se.com/ww/en/product-range/62098-modicon-m580-pac-controller/#software-and-firmware Important: customer needs to use version of EcoStruxure\u2122 Control Expert V16.0 HF001 minimum to connect with the latest version of M580 CPU Safety. The software is available for download here: https://www.se.com/ww/en/product-range/548-ecostruxure-control-expert-unity-pro/#software-and-firmware",
"product_ids": [
"99"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/product-range/62098-modicon-m580-pac-controller/#software-and-firmware"
},
{
"category": "vendor_fix",
"details": "Version SV2.21 includes a fix for these vulnerabilities and is available for download here: BMENOC 0301 - https://www.se.com/ww/en/download/document/BMENOC0301_SV_02.21/",
"product_ids": [
"101"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/download/document/BMENOC0301_SV_02.21/"
},
{
"category": "vendor_fix",
"details": "Version SV2.21 includes a fix for these vulnerabilities and is available for download here: BMENOC 0311 -https://www.se.com/ww/en/download/document/BMENOC0311_SV_02.21",
"product_ids": [
"103"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/download/document/BMENOC0311_SV_02.21"
},
{
"category": "vendor_fix",
"details": "Version SV1.09 includes a fix for these vulnerabilities and is available for download here:https://www.se.com/ww/en/download/document/BMENOC0321_SV_01.09",
"product_ids": [
"105"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/download/document/BMENOC0321_SV_01.09"
},
{
"category": "vendor_fix",
"details": "Version SV1.5 of HART X80 Module includes a fix for these vulnerabilities and is available for download here:https://www.se.com/ww/en/download/document/BMEAHO0412_Firmware_upgrade/",
"product_ids": [
"107",
"109"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/download/document/BMEAHO0412_Firmware_upgrade/"
},
{
"category": "vendor_fix",
"details": "Version 1.8 of MC80 Controller (BMKC80) includes a fix for these vulnerabilities and is available for download here: https://www.se.com/ww/en/product-range/62396-modicon-mc80/#software-and-firmware",
"product_ids": [
"111"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/product-range/62396-modicon-mc80/#software-and-firmware"
},
{
"category": "mitigation",
"details": "Customers should immediately apply the following mitigations to reduce the risk of exploit:\u2022 Setup network segmentation and implement a firewall to block all unauthorized access to the device.\u2022 Configure the Access Control List following the recommendations in the device user manual.\u2022 Setup a VPN between the Modicon PLC device and the remote engineering workstations.\u2022 Activate and apply user management and password features.\u2022 Limit the access to both development and control system by physical means, operating system features, etc.",
"product_ids": [
"113"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "Version SV2.6 includes a fix for these vulnerabilities and is available for download here: https://www.se.com/ww/en/download/document/Momentum_FW_update/ ",
"product_ids": [
"114"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/download/document/Momentum_FW_update/"
},
{
"category": "no_fix_planned",
"details": "Quantum and Premium offers have reached their end of life and are no longer supported.",
"product_ids": [
"116",
"117"
],
"restart_required": {
"category": "none"
}
},
{
"category": "mitigation",
"details": "Customers should immediately apply the following mitigations to reduce the risk of exploit:\u2022 Setup network segmentation and implement a firewall to block all unauthorized access to the device.\u2022 Setup a VPN between the Modicon PLC device and the remote engineering workstations.\u2022 Activate and apply user management and password features.\u2022 Limit the access to both development and control system by physical means, operating system features, etc.Customers should also consider upgrading to the latest product offering Modicon M580 ePAC.",
"product_ids": [
"116",
"117"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "Version 1.60 of BMXNOM0200 includes a fix for these vulnerabilities and is available for download here:https://www.se.com/ww/en/product/BMXNOM0200/ ",
"product_ids": [
"118"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/product/BMXNOM0200/"
},
{
"category": "vendor_fix",
"details": "Version 1.04 of BMENOS0300 includes a fix for these vulnerabilities and is available for download here:https://www.se.com/ww/en/product/BMENOS0300/",
"product_ids": [
"120"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/product/BMENOS0300/"
},
{
"category": "vendor_fix",
"details": "Version 10.02 of nanodac includes a fix for this vulnerability and is available for download here: https://www.eurotherm.com/?wpdmdl=28419 Device will reboot automatically after upgrade.",
"product_ids": [
"122"
],
"restart_required": {
"category": "system"
},
"url": "https://www.eurotherm.com/?wpdmdl=28419"
},
{
"category": "vendor_fix",
"details": "Firmware Version 1.66.5.1 of PacDrive Eco/Pro/Pro2 Logic Controllers includes a fix for these vulnerabilities and can be updated through the Schneider Electric Software Update (SESU) application.",
"product_ids": [
"124",
"126",
"128"
],
"restart_required": {
"category": "none"
}
},
{
"category": "no_fix_planned",
"details": "PacDrive M Logic Controller has reached its end of life and is no longer supported.",
"product_ids": [
"130"
],
"restart_required": {
"category": "none"
}
},
{
"category": "mitigation",
"details": "Customers should immediately apply the following mitigations to reduce the risk of exploit:\u2022 Use controllers and devices only in a protected environment to minimize network exposure and ensure that they are not accessible from outside,\u2022 Use firewalls to protect and separate the control system network from other networks,\u2022 Use VPN (Virtual Private Networks) tunnels if remote access is required,\u2022 Activate and apply user management and password features,\u2022 Limit the access to both development and control system by physical means, operating system features, etc.Customers should also consider upgrading to the latest product offering PacDrive Eco/Pro/Pro2 to resolve this issue.",
"product_ids": [
"130"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "Version 3.1 of PowerLogic ION7400 includes a fix for this vulnerability and is available for download here: https://www.se.com/ww/en/download/document/ION7400_meter_FW_v003.001.000/",
"product_ids": [
"131"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/download/document/ION7400_meter_FW_v003.001.000/"
},
{
"category": "vendor_fix",
"details": "Version 3.1 of PowerLogic PM8000 includes a fix for this vulnerability and is available for download here: https://www.se.com/ww/en/download/document/PM8000_meter_FW_v003.001.000/",
"product_ids": [
"133"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/download/document/PM8000_meter_FW_v003.001.000/"
},
{
"category": "vendor_fix",
"details": "Version 3.1 of PowerLogic ION9000 includes a fix for this vulnerability and is available for download here: https://www.se.com/ww/en/download/document/ION9000_meter_FW_v003.001.000/",
"product_ids": [
"135"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/download/document/ION9000_meter_FW_v003.001.000/"
},
{
"category": "mitigation",
"details": "If the update cannot be applied immediately, please follow the guidelines in Schneider Electric Recommended Cybersecurity Best Practices document to help mitigate the risk.",
"product_ids": [
"131",
"133",
"135"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "Version 4.09.350 of Pro-face GP-Pro EX includes a fix for these vulnerabilities and is available for download here: https://www.proface.com/en/download/trial/gpproex/v40 or update online via GP-Pro EX (refer to Help menu and select \u201cConfirm Update of GP-Pro EX\u201d).To complete the update, connect to Pro-face HMI and download the project file using GP-Pro EX V4.09.350 or later.",
"product_ids": [
"151",
"152",
"153",
"154",
"155"
],
"restart_required": {
"category": "none"
},
"url": "https://www.proface.com/en/download/trial/gpproex/v40"
},
{
"category": "vendor_fix",
"details": "Version 4.09.450 of Pro-face GP-Pro EX includes a fix for these vulnerabilities and is available for download here: https://www.proface.com/en/download/trial/gpproex/v40 or update online via GP-Pro EX (refer to Help menu and select \u201cConfirm Update of GP-Pro EX\u201d). To complete the update, connect to Pro-face HMI and download the project file using GP-Pro EX V4.09.400 or later.",
"product_ids": [
"161"
],
"restart_required": {
"category": "none"
},
"url": "https://www.proface.com/en/download/trial/gpproex/v40"
},
{
"category": "vendor_fix",
"details": "Version 4.09.400 of Pro-face GP-Pro EX includes a fix for these vulnerabilities and is available for download here: https://www.proface.com/en/download/trial/gpproex/v40 or update online via GP-Pro EX (refer to Help menu and select \u201cConfirm Update of GP-Pro EX\u201d). To complete the update, connect to Pro-face HMI and download the project file using GP-Pro EX V4.09.400 or later.",
"product_ids": [
"163",
"164"
],
"restart_required": {
"category": "none"
},
"url": "https://www.proface.com/en/download/trial/gpproex/v40"
},
{
"category": "mitigation",
"details": "Customers should immediately apply the mitigations found in the Cybersecurity Reference Manual linked below to reduce the risk of exploit: https://www.se.com/ww/en/download/document/EIO0000001999/",
"product_ids": [
"167",
"168"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/download/document/EIO0000001999/"
},
{
"category": "vendor_fix",
"details": "Version SY-1101207, Version N of SCD6000 firmware includes a fix for this vulnerability. Contact your local Customer Support to receive this firmware version. Reboot is required after installation.",
"product_ids": [
"169"
],
"restart_required": {
"category": "system"
}
},
{
"category": "vendor_fix",
"details": "Version C3414-500-S02K5_P5 of SAGE RTU CPU 3414 includes a fix for this vulnerability and is available for download here: https://www.sage-rtu.com/downloads.html Reboot of SAGE RTU is required after firmware upgrade.This fix applies a Wind River VxWorks (real-time operating system) patch to bring code libraries current to 6.9.4.12 RCPL3 revision. This corrects issues with overflow causing malloc/calloc to return valid pointer when it should return fail indication NULL pointer.",
"product_ids": [
"171"
],
"restart_required": {
"category": "system"
},
"url": "https://www.sage-rtu.com/downloads.html"
},
{
"category": "vendor_fix",
"details": "Version 2.43 of the Versadac scalable data recorder is available and includes a fix for these vulnerabilities.Access to the patch can be obtained through the following link: https://partners.eurotherm.com/member-login",
"product_ids": [
"173"
],
"restart_required": {
"category": "none"
},
"url": "https://partners.eurotherm.com/member-login"
},
{
"category": "vendor_fix",
"details": "Version SV02.80 of BMECRA31210, BMXCRA3120, BMXCRA31210 includes a fix for these vulnerabilities and is available for download here: https://www.se.com/ww/en/product-country-selector/?pageType=product\u0026sourceId=BMXCRA31210",
"product_ids": [
"175",
"177",
"179"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/product-country-selector/?pageType=product\u0026sourceId=BMXCRA31210"
},
{
"category": "vendor_fix",
"details": "Version V02.80 of 140CRA31200 includes a fix for these vulnerabilities and is available for download here: https://www.se.com/ww/en/product/140CRA31200/quantum-rio-drop-e-ip-1ch",
"product_ids": [
"181"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/product/140CRA31200/quantum-rio-drop-e-ip-1ch"
},
{
"category": "vendor_fix",
"details": "Version V02.80 of 140CRA31908 includes a fix for these vulnerabilities and is available for download here: https://www.se.com/ww/en/product/140CRA31908/m580-quantum-s908-rio-drop-adapter",
"product_ids": [
"183"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/product/140CRA31908/m580-quantum-s908-rio-drop-adapter"
},
{
"category": "vendor_fix",
"details": "Version SV2.6 of BMENOP0300 includes a fix for these vulnerabilities and is available for download here: https://www.se.com/ww/en/product-country-selector/?pageType=product\u0026sourceId=BMENOP0300",
"product_ids": [
"185"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/product-country-selector/?pageType=product\u0026sourceId=BMENOP0300"
},
{
"category": "mitigation",
"details": "Customers should immediately apply the following mitigations to reduce the risk of exploit:\u2022 Setup network segmentation and implement a firewall to block all unauthorized access to the device.\u2022 Configure the Access Control List following the recommendations of the device user manual.\u2022 Setup a VPN between the Modicon. Communication modules and the remote engineering workstations.\u2022 Activate and apply user management and password features.Limit the access to both development and control system by physical means, operating system features, etc.",
"product_ids": [
"187"
],
"restart_required": {
"category": "none"
}
},
{
"category": "mitigation",
"details": "Customers should immediately apply the following mitigations to reduce the risk of exploit: \u2022 Use relays only in a protected environment to minimize network exposure and ensure that they are not accessible from outside.\u2022 Disable unused network protocol interfaces.\u2022 Use firewalls to protect and separate the control system network from other networks.\u2022 Activate and apply user management and password features.\u2022 Limit the access to the system by physical means.",
"product_ids": [
"188",
"189"
],
"restart_required": {
"category": "none"
}
},
{
"category": "mitigation",
"details": "Customers should immediately apply the following mitigations to reduce the risk of exploit:\u2022 Setup network segmentation and implement a firewall to block all unauthorized access to the device.\u2022 Configure the Access Control List following the recommendations of the device user manual.\u2022 Setup a VPN between the EPack device and any remote visualization workstations running iTools.\u2022 Activate and apply user management and password features. Limit the access to both development and control system by physical means, operating system features, etc.",
"product_ids": [
"190"
],
"restart_required": {
"category": "none"
}
},
{
"category": "mitigation",
"details": "Customers should immediately apply the following mitigations to reduce the risk of exploit:\u2022 Locate control and safety system networks and remote devices behind firewalls and isolate them from the business network.\u2022 Install physical controls so no unauthorized personnel can access your industrial control and safety systems, components, peripheral equipment, and networks.\u2022 Minimize network exposure for all control system devices and systems and ensure that they are not accessible from the Internet.When remote access is required, use secure methods, such as the Vijeo Connect.",
"product_ids": [
"191"
],
"restart_required": {
"category": "none"
}
},
{
"category": "mitigation",
"details": "Customers should immediately apply the following mitigations to reduce the risk of exploit:\u2022 Use controllers and devices only in a protected environment to minimize network exposure and ensure that they are not accessible from outside,\u2022 Use firewalls to protect and separate the control system network from other networks,\u2022 Use VPN (Virtual Private Networks) tunnels if remote access is required,\u2022 Activate and apply user management and password features,\u2022 Limit the access to both development and control system by physical means, operating system features, etc.Customers should also consider upgrading to the latest product offering Modicon M262 to resolve this issue.",
"product_ids": [
"192"
],
"restart_required": {
"category": "none"
}
},
{
"category": "mitigation",
"details": "Customers should immediately apply the followingmitigations to reduce the risk of exploit:\u2022 Locate control and safety system networks and remote devices behind firewalls and isolate them from the business network.\u2022 Install physical controls so no unauthorized personnel can access your industrial control and safety systems, components, peripheral equipment,and networks.\u2022 Minimize network exposure for all control system devices and systems and ensure that they are not accessible from the Internet.\u2022 When remote access is required, use secure methods, such as the Pro-face Connect.Customers should also consider upgrading to the latest product offering to resolve this issue. Please contact your sales support about alternative products",
"product_ids": [
"193",
"194",
"195"
],
"restart_required": {
"category": "none"
}
},
{
"category": "mitigation",
"details": "Customers should immediately apply the following mitigations to reduce the risk of exploit:\u2022 Setup network segmentation and implement a firewall to block all unauthorized access to the device.\u2022 Configure the Access Control List following the recommendations of the device user manual.\u2022 Setup a VPN between the 6000-series device and any remote visualization workstations running Bridge.\u2022 Activate and apply user management and password features. Limit the access to both development and control system by physical means, operating system features, etc.",
"product_ids": [
"196",
"197",
"198",
"199",
"200"
],
"restart_required": {
"category": "none"
}
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"1",
"3",
"5",
"7",
"8",
"10",
"12",
"17",
"20",
"22",
"23",
"25",
"27",
"29",
"37",
"40",
"43",
"50",
"57",
"67",
"69",
"71",
"73",
"75",
"77",
"79",
"81",
"83",
"85",
"87",
"89",
"91",
"93",
"95",
"97",
"99",
"101",
"103",
"105",
"107",
"109",
"111",
"113",
"114",
"116",
"117",
"118",
"120",
"122",
"124",
"126",
"128",
"130",
"131",
"133",
"135",
"151",
"152",
"153",
"154",
"155",
"161",
"163",
"164",
"167",
"168",
"169",
"171",
"173",
"175",
"177",
"179",
"181",
"183",
"185",
"187",
"188",
"189",
"190",
"191",
"192",
"193",
"194",
"195",
"196",
"197",
"198",
"199",
"200"
]
}
],
"title": "CVE-2020-28895"
},
{
"acknowledgments": [
{
"urls": [
"https://us-cert.cisa.gov/ics/advisories/icsa-21-119-04"
]
}
],
"cve": "CVE-2021-22156",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "description",
"text": "An integer overflow vulnerability in the calloc() function of the C runtime library of affected versions of BlackBerry\u00ae QNX Software Development Platform (SDP) version(s) 6.5.0SP1 and earlier, QNX OS for Medical 1.1 and earlier, and QNX OS for Safety 1.0.1 and earlier that could allow an attacker to potentially perform a denial of service or execute arbitrary code.",
"title": "CVE Description"
}
],
"product_status": {
"fixed": [
"66"
],
"known_affected": [
"64"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Updates have been released to address the identified vulnerability Customers are urged to upgrade to Niagara 4.10u1.\nThese updates are available on the Schneider Electric Exchange https://ecoxpert.se.com/ or by contacting your sales support channel or by contacting the Schneider Electric support team at productsupport.NAM-BMS@schneider-electric.com It is important that all TAC I/A Series Niagara customers for all supported platforms update their systems with these releases to mitigate risk. If you have any questions, please contact your Schneider Electric support team at productsupport.NAM-BMS@schneider-electric.com. As always, we highly recommend that TAC I/A Series Niagara customers running on an unsupported platform (such as Niagara G3/AX) take action to update their systems to a supported platform, ideally the 4.10u1 release of Niagara Framework. In addition to updating your system, Schneider Electric recommends that customers with affected products take the following steps to protect themselves:\n\u2022 Review and validate the list of users who are authorized and who can authenticate to Niagara.\n\u2022 Allow only trained and trusted persons to have physical access to the system, including devices that have connection to the system though the Ethernet port.\n\u2022 Consider using a VPN or other means to ensure secure remote connections into the network where the system is located, If remote connections are enabled.\n\u2022 Sign all modules and program objects provided by third-party teams. \nReview the Niagara Hardening Guide https://community.exchange.se.com/t5/Building-Automation-Knowledge/I-A-Series-Niagara-4-Hardening-Guide-Tips-to-Secure-an-I-A/ta-p/159287 for techniques on securing your installation.",
"product_ids": [
"64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"64"
]
}
],
"title": "CVE-2021-22156"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.