ID

VAR-201709-1219


CVE

CVE-2017-9956


TITLE

Schneider Electric U.motion Builder Software Vulnerabilities related to the use of hard-coded credentials

Trust: 0.8

sources: JVNDB: JVNDB-2017-008207

DESCRIPTION

An authentication bypass vulnerability exists in Schneider Electric's U.motion Builder software versions 1.2.1 and prior in which the system contains a hard-coded valid session. An attacker can use that session ID as part of the HTTP cookie of a web request, resulting in authentication bypass. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of session management. The application has a hard-coded static session ID. U.motion Builder is a generator product from Schneider Electric, France. An SQL-injection vulnerability 2. A directory-traversal vulnerability 3. An information-disclosure vulnerability 5. A local code-execution vulnerability 6. A local denial-of-Service vulnerability 7. An information-disclosure vulnerability Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database, bypass authentication mechanism, obtain sensitive information, execute arbitrary code and perform unauthorized actions. Failed exploits can result in a denial-of-service condition

Trust: 3.24

sources: NVD: CVE-2017-9956 // JVNDB: JVNDB-2017-008207 // ZDI: ZDI-17-391 // CNVD: CNVD-2017-09480 // BID: 99344 // IVD: f1ba68b9-aec6-401e-ba62-c9fc06aedda1

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: f1ba68b9-aec6-401e-ba62-c9fc06aedda1 // CNVD: CNVD-2017-09480

AFFECTED PRODUCTS

vendor:schneider electricmodel:u.motion builderscope:lteversion:1.2.1

Trust: 1.0

vendor:schneider electricmodel:u.motion builderscope:eqversion:1.2.1

Trust: 0.9

vendor:schneider electricmodel:u.motion builder softwarescope:lteversion:1.2.1

Trust: 0.8

vendor:schneider electricmodel:u.motion builderscope: - version: -

Trust: 0.7

vendor:schneidermodel:electric u.motion builderscope: - version: -

Trust: 0.6

vendor:u motion buildermodel: - scope:eqversion:*

Trust: 0.2

sources: IVD: f1ba68b9-aec6-401e-ba62-c9fc06aedda1 // ZDI: ZDI-17-391 // CNVD: CNVD-2017-09480 // BID: 99344 // JVNDB: JVNDB-2017-008207 // CNNVD: CNNVD-201706-1092 // NVD: CVE-2017-9956

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-9956
value: HIGH

Trust: 1.0

NVD: CVE-2017-9956
value: HIGH

Trust: 0.8

ZDI: ZDI-17-391
value: HIGH

Trust: 0.7

CNVD: CNVD-2017-09480
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201706-1092
value: HIGH

Trust: 0.6

IVD: f1ba68b9-aec6-401e-ba62-c9fc06aedda1
value: HIGH

Trust: 0.2

nvd@nist.gov: CVE-2017-9956
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

ZDI: ZDI-17-391
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.7

CNVD: CNVD-2017-09480
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: f1ba68b9-aec6-401e-ba62-c9fc06aedda1
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

nvd@nist.gov: CVE-2017-9956
baseSeverity: HIGH
baseScore: 7.3
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: LOW
exploitabilityScore: 3.9
impactScore: 3.4
version: 3.0

Trust: 1.8

sources: IVD: f1ba68b9-aec6-401e-ba62-c9fc06aedda1 // ZDI: ZDI-17-391 // CNVD: CNVD-2017-09480 // JVNDB: JVNDB-2017-008207 // CNNVD: CNNVD-201706-1092 // NVD: CVE-2017-9956

PROBLEMTYPE DATA

problemtype:CWE-798

Trust: 1.8

sources: JVNDB: JVNDB-2017-008207 // NVD: CVE-2017-9956

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201706-1092

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201706-1092

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-008207

PATCH

title:SEVD-2017-178-01url:https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet&p_File_Id=8203873940&p_File_Name=SEVD-2017-178-01+U.motion+Builder+Software.pdf&p_Reference=SEVD-2017-178-01

Trust: 0.8

title:This vulnerability is being disclosed publicly without a patch in accordance with the ZDI 120 day deadline.03/29/2016 - ZDI disclosed the vulnerability reports to ICS-CERT (with an expected 'due date' of 07/27/16).03/29/2016 - ICS-CERT acknowledged that they received them and "sent them on to our contacts at Schneider Electric, and will keep you informed of their progress. We are tracking these issues as ICS-VU-291195."08/24/2016 - ZDI sent a follow-up inquiry to ICS-CERT requesting the status.09/08/2016 - ICS-CERT replied requesting more information on one vulnerability report, but said of the others, "they have successfully validated the rest of the vulnerability reports. Unfortunately, they don't expect to have a patch ready until the end of this year." ICS-CERT suggested they would work with the vendor to try to bring this in.09/19/2016 - ZDI sent a follow-up inquiry to ICS-CERT asking if the vendor was anywhere closer.10/11/2016 - ZDI sent a follow-up inquiry to ICS-CERT asking if the vendor was anywhere closer and stressed potential 0-day.12/14/2016 - ZDI sent a follow-up inquiry to ICS-CERT requesting the status.06/02/2017 - ZDI sent a follow-up inquiry to ICS-CERT requesting the status.-- Mitigation:Given the nature of the vulnerability, the only salient mitigation strategy is to restrict interaction with the service to trusted machines. Only the clients and servers that have a legitimate procedural relationship with the service should be permitted to communicate with it. This could be accomplished in a number of ways, most notably with firewall rules/whitelisting. These features are available in the native Windows Firewall, as described in and numerous other Microsoft Knowledge Base articles.url:http://technet.microsoft.com/en-us/library/cc725770%28WS.10%29.aspx

Trust: 0.7

sources: ZDI: ZDI-17-391 // JVNDB: JVNDB-2017-008207

EXTERNAL IDS

db:NVDid:CVE-2017-9956

Trust: 3.5

db:SCHNEIDERid:SEVD-2017-178-01

Trust: 1.9

db:BIDid:99344

Trust: 1.9

db:ZDIid:ZDI-17-391

Trust: 1.3

db:ICS CERTid:ICSA-17-180-02

Trust: 1.1

db:CNVDid:CNVD-2017-09480

Trust: 0.8

db:CNNVDid:CNNVD-201706-1092

Trust: 0.8

db:JVNDBid:JVNDB-2017-008207

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-3582

Trust: 0.7

db:NSFOCUSid:37012

Trust: 0.6

db:IVDid:F1BA68B9-AEC6-401E-BA62-C9FC06AEDDA1

Trust: 0.2

sources: IVD: f1ba68b9-aec6-401e-ba62-c9fc06aedda1 // ZDI: ZDI-17-391 // CNVD: CNVD-2017-09480 // BID: 99344 // JVNDB: JVNDB-2017-008207 // CNNVD: CNNVD-201706-1092 // NVD: CVE-2017-9956

REFERENCES

url:http://www.schneider-electric.com/en/download/document/sevd-2017-178-01/

Trust: 1.9

url:http://www.securityfocus.com/bid/99344

Trust: 1.6

url:https://ics-cert.us-cert.gov/advisories/icsa-17-180-02

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-9956

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-9956

Trust: 0.8

url:http://technet.microsoft.com/en-us/library/cc725770%28ws.10%29.aspx

Trust: 0.7

url:http://www.zerodayinitiative.com/advisories/zdi-17-391/

Trust: 0.6

url:http://www.nsfocus.net/vulndb/37012

Trust: 0.6

url:http://www.schneider-electric.com/site/home/index.cfm/ww/?selectcountry=true

Trust: 0.3

sources: ZDI: ZDI-17-391 // CNVD: CNVD-2017-09480 // BID: 99344 // JVNDB: JVNDB-2017-008207 // CNNVD: CNNVD-201706-1092 // NVD: CVE-2017-9956

CREDITS

rgod

Trust: 0.7

sources: ZDI: ZDI-17-391

SOURCES

db:IVDid:f1ba68b9-aec6-401e-ba62-c9fc06aedda1
db:ZDIid:ZDI-17-391
db:CNVDid:CNVD-2017-09480
db:BIDid:99344
db:JVNDBid:JVNDB-2017-008207
db:CNNVDid:CNNVD-201706-1092
db:NVDid:CVE-2017-9956

LAST UPDATE DATE

2024-08-14T12:27:47.338000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-17-391date:2017-06-12T00:00:00
db:CNVDid:CNVD-2017-09480date:2017-06-14T00:00:00
db:BIDid:99344date:2017-06-30T00:00:00
db:JVNDBid:JVNDB-2017-008207date:2019-01-09T00:00:00
db:CNNVDid:CNNVD-201706-1092date:2017-09-30T00:00:00
db:NVDid:CVE-2017-9956date:2017-09-27T20:45:20.067

SOURCES RELEASE DATE

db:IVDid:f1ba68b9-aec6-401e-ba62-c9fc06aedda1date:2017-06-14T00:00:00
db:ZDIid:ZDI-17-391date:2017-06-12T00:00:00
db:CNVDid:CNVD-2017-09480date:2017-06-14T00:00:00
db:BIDid:99344date:2017-06-30T00:00:00
db:JVNDBid:JVNDB-2017-008207date:2017-10-12T00:00:00
db:CNNVDid:CNNVD-201706-1092date:2017-06-27T00:00:00
db:NVDid:CVE-2017-9956date:2017-09-26T01:29:03.837