Multiple vulnerabilities in Schneider Electric products



Published: 2018-05-24 | Updated: 2018-05-28
Risk Low
Patch available YES
Number of vulnerabilities 3
CVE-ID CVE-2016-10395
CVE-2016-2177
CVE-2017-5571
CWE-ID CWE-125
CWE-119
CWE-494
CWE-601
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Energy Expert
Server applications / SCADA systems

StruxureWare Power Monitoring Expert
Server applications / SCADA systems

EcoStruxure Power Monitoring Expert
Server applications / SCADA systems

CitectHistorian
Server applications / SCADA systems

Vijeo Historian
Server applications / SCADA systems

SCADA Expert Vijeo Citect
Server applications / SCADA systems

CitectSCADA
Server applications / SCADA systems

EcoStruxure Power SCADA Operations
Server applications / SCADA systems

EcoStruxure Modicon Builder
Server applications / SCADA systems

PlantStruxure PES
Server applications / SCADA systems

Citect Anywhere
Server applications / SCADA systems

Vendor Schneider Electric

Security Bulletin

This security bulletin contains information about 3 vulnerabilities.

1) Out-of-bounds read

EUVDB-ID: #VU13021

Risk: Low

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2016-10395

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The vulnerability exists due to out-of-bounds memory read. A remote attacker can trigger memory corruption and cause the service to crash.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Energy Expert: All versions

StruxureWare Power Monitoring Expert: 8.0 - 8.1

EcoStruxure Power Monitoring Expert: 8.2

: All versions

External links

http://ics-cert.us-cert.gov/advisories/ICSA-18-144-01


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Integer overflow in ssl3_get_client_hello()

EUVDB-ID: #VU24

Risk: Medium

CVSSv3.1: 4.6 [AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2016-2177

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to cause denial of service conditions on the target system.
The vulnerability exists due to a boundary error in ssl3_get_client_hello() function. A remote attacker can cause integer overflow by sending specially crafted data and crash the service.
Successful exploitation of this vulnerability may cause the target service to crash.

Mitigation

Install update from vendor's website.

Vulnerable software versions

StruxureWare Power Monitoring Expert: 8.0 - 8.1

EcoStruxure Power Monitoring Expert: 8.2

CitectHistorian: 4.40 - 2016

Vijeo Historian: 4.40 - 4.50

SCADA Expert Vijeo Citect: 7.30 - 7.40

CitectSCADA: 7.30 - 2016

EcoStruxure Power SCADA Operations: All versions

Energy Expert: All versions

EcoStruxure Modicon Builder: All versions

PlantStruxure PES: All versions

Citect Anywhere: All versions

External links

http://ics-cert.us-cert.gov/advisories/ICSA-18-144-01


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Open redirect

EUVDB-ID: #VU13020

Risk: Low

CVSSv3.1: 5.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-5571

CWE-ID: CWE-601 - URL Redirection to Untrusted Site ('Open Redirect')

Exploit availability: No

Description

The vulnerability allows a remote unauthenticated attacker to redirect the target user to external websites.

The weakness exists due to open redirect in lmadmin component. A remote attacker can use a specially crafted image link, trick the victim into opening it and redirect users to malicious website.

Mitigation

Install update from vendor's website.

Vulnerable software versions

StruxureWare Power Monitoring Expert: 8.0 - 8.1

EcoStruxure Power Monitoring Expert: 8.2

CitectHistorian: 4.40 - 2016

Vijeo Historian: 4.40 - 4.50

SCADA Expert Vijeo Citect: 7.30 - 7.40

CitectSCADA: 7.30 - 2016

EcoStruxure Power SCADA Operations: All versions

Energy Expert: All versions

EcoStruxure Modicon Builder: All versions

PlantStruxure PES: All versions

Citect Anywhere: All versions

External links

http://ics-cert.us-cert.gov/advisories/ICSA-18-144-01


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###