SB2017070702 - Two vulnerabilities in Schneider Electric Ampla MES



SB2017070702 - Two vulnerabilities in Schneider Electric Ampla MES

Published: July 7, 2017

Security Bulletin ID SB2017070702
Severity
Low
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Local access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Cleartext transmission of sensitive information (CVE-ID: CVE-2017-9637)

The vulnerability allows a local attacker to obtain credentials on the target system.

The weakness exists due to cleartext transmission of sensitive information. When connectivity to third party databases is configured to use a SQL user name and password, a local attacker sniff details from the connection string.

Successful exploitation may result in compromise of credentials used to connect to third party databases.


2) Inadequate encryption strength (CVE-ID: CVE-2017-9635)

The vulnerability allows a local attacker to obtain credentials on the target system.

The weakness exists due to weakness in the password hashing algorithm. When Ampla MES users are configured to use Simple Security, a local attacker can reverse the user’s password.

Successful exploitation may result in compromise credentials of Ampla users configured with Simple Security.


Remediation

Install update from vendor's website.