Remote code execution in Schneider Electric SoMove Software and DTM Software Components

Published: 2018-03-07 11:07:12
Severity High
Patch available YES
Number of vulnerabilities 1
CVE ID CVE-2018-7239
CVSSv3 8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CWE ID CWE-427
Exploitation vector Network
Public exploit Not available
Vulnerable software SoMove
ATV12 DTM
ATV212 DTM
ATV31/312 DTM
ATV LIFT DTM
ATV61 DTM
ATV71 DTM
ATV32 DTM
AltivarDtmLibrary
ATV9xx DTM
ATV6xx DTM
ATV340 DTM
ATV320 DTM
Vulnerable software versions SoMove -
ATV12 DTM -
ATV212 DTM -
ATV31/312 DTM -
ATV LIFT DTM -
ATV61 DTM -
ATV71 DTM -
ATV32 DTM -
AltivarDtmLibrary -
ATV9xx DTM -
ATV6xx DTM -
ATV340 DTM -
ATV320 DTM -
Vendor URL Schneider Electric

Security Advisory

1) Insecure DLL loading

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to insecure .dll loading mechanism when opening files. A remote attacker can place a file along with specially crafted .dll file on a remote SBM or WebDAV share, trick the victim into opening it and execute arbitrary code on the target system with privileges of the current victim.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Remediation

Install update from vendor's website.

External links

https://www.schneider-electric.com/en/download/document/SEVD-2018-060-01/

Back to List