ID

VAR-201709-1220


CVE

CVE-2017-9957


TITLE

Schneider Electric U.motion Builder Software Vulnerabilities related to the use of hard-coded credentials

Trust: 0.8

sources: JVNDB: JVNDB-2017-008208

DESCRIPTION

A vulnerability exists in Schneider Electric's U.motion Builder software versions 1.2.1 and prior in which the web service contains a hidden system account with a hardcoded password. An attacker can use this information to log into the system with high-privilege credentials. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Schneider Electric U.motion Builder.The specific flaw exists within the configuration of the product. U.motion Builder is a generator product from Schneider Electric, France. An SQL-injection vulnerability 2. A directory-traversal vulnerability 3. An authentication bypass vulnerability 4. An information-disclosure vulnerability 5. A local code-execution vulnerability 6. A local denial-of-Service vulnerability 7. An information-disclosure vulnerability Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database, bypass authentication mechanism, obtain sensitive information, execute arbitrary code and perform unauthorized actions. Failed exploits can result in a denial-of-service condition

Trust: 3.24

sources: NVD: CVE-2017-9957 // JVNDB: JVNDB-2017-008208 // ZDI: ZDI-17-372 // CNVD: CNVD-2017-09462 // BID: 99344 // IVD: 8ba09e49-79c8-4425-b261-894ff692d38c

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: 8ba09e49-79c8-4425-b261-894ff692d38c // CNVD: CNVD-2017-09462

AFFECTED PRODUCTS

vendor:schneider electricmodel:u.motion builderscope:lteversion:1.2.1

Trust: 1.0

vendor:schneider electricmodel:u.motion builderscope:eqversion:1.2.1

Trust: 0.9

vendor:schneider electricmodel:u.motion builder softwarescope:lteversion:1.2.1

Trust: 0.8

vendor:schneider electricmodel:u.motion builderscope: - version: -

Trust: 0.7

vendor:schneidermodel:electric u.motion builderscope: - version: -

Trust: 0.6

vendor:u motion buildermodel: - scope:eqversion:*

Trust: 0.2

sources: IVD: 8ba09e49-79c8-4425-b261-894ff692d38c // ZDI: ZDI-17-372 // CNVD: CNVD-2017-09462 // BID: 99344 // JVNDB: JVNDB-2017-008208 // CNNVD: CNNVD-201706-1091 // NVD: CVE-2017-9957

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-9957
value: CRITICAL

Trust: 1.0

NVD: CVE-2017-9957
value: CRITICAL

Trust: 0.8

ZDI: ZDI-17-372
value: HIGH

Trust: 0.7

CNVD: CNVD-2017-09462
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201706-1091
value: HIGH

Trust: 0.6

IVD: 8ba09e49-79c8-4425-b261-894ff692d38c
value: HIGH

Trust: 0.2

nvd@nist.gov: CVE-2017-9957
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

ZDI: ZDI-17-372
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.7

CNVD: CNVD-2017-09462
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 8ba09e49-79c8-4425-b261-894ff692d38c
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

nvd@nist.gov: CVE-2017-9957
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: IVD: 8ba09e49-79c8-4425-b261-894ff692d38c // ZDI: ZDI-17-372 // CNVD: CNVD-2017-09462 // JVNDB: JVNDB-2017-008208 // CNNVD: CNNVD-201706-1091 // NVD: CVE-2017-9957

PROBLEMTYPE DATA

problemtype:CWE-798

Trust: 1.8

sources: JVNDB: JVNDB-2017-008208 // NVD: CVE-2017-9957

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201706-1091

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201706-1091

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-008208

PATCH

title:SEVD-2017-178-01url:https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet&p_File_Id=8203873940&p_File_Name=SEVD-2017-178-01+U.motion+Builder+Software.pdf&p_Reference=SEVD-2017-178-01

Trust: 0.8

title:This vulnerability is being disclosed publicly without a patch in accordance with the ZDI 120 day deadline.03/29/2016 - ZDI disclosed the vulnerability reports to ICS-CERT (with an expected 'due date' of 07/27/16).03/29/2016 - ICS-CERT acknowledged that they received them and "sent them on to our contacts at Schneider Electric, and will keep you informed of their progress. We are tracking these issues as ICS-VU-291195."08/24/2016 - ZDI sent a follow-up inquiry to ICS-CERT requesting the status.09/08/2016 - ICS-CERT replied requesting more information on one vulnerability report, but said of the others, "they have successfully validated the rest of the vulnerability reports. Unfortunately, they don't expect to have a patch ready until the end of this year." ICS-CERT suggested they would work with the vendor to try to bring this in.09/19/2016 - ZDI sent a follow-up inquiry to ICS-CERT asking if the vendor was anywhere closer.10/11/2016 - ZDI sent a follow-up inquiry to ICS-CERT asking if the vendor was anywhere closer and stressed potential 0-day.12/14/2016 - ZDI sent a follow-up inquiry to ICS-CERT requesting the status.06/02/2017 - ZDI sent a follow-up inquiry to ICS-CERT requesting the status.-- Mitigation:Given the nature of the vulnerability, the only salient mitigation strategy is to restrict interaction with the service to trusted machines. Only the clients and servers that have a legitimate procedural relationship with the service should be permitted to communicate with it. This could be accomplished in a number of ways, most notably with firewall rules/whitelisting. These features are available in the native Windows Firewall, as described in and numerous other Microsoft Knowledge Base articles.url:http://technet.microsoft.com/en-us/library/cc725770%28WS.10%29.aspx

Trust: 0.7

sources: ZDI: ZDI-17-372 // JVNDB: JVNDB-2017-008208

EXTERNAL IDS

db:NVDid:CVE-2017-9957

Trust: 3.5

db:SCHNEIDERid:SEVD-2017-178-01

Trust: 1.9

db:BIDid:99344

Trust: 1.9

db:ICS CERTid:ICSA-17-180-02

Trust: 1.7

db:ZDIid:ZDI-17-372

Trust: 1.3

db:CNVDid:CNVD-2017-09462

Trust: 0.8

db:CNNVDid:CNNVD-201706-1091

Trust: 0.8

db:JVNDBid:JVNDB-2017-008208

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-3643

Trust: 0.7

db:NSFOCUSid:37013

Trust: 0.6

db:IVDid:8BA09E49-79C8-4425-B261-894FF692D38C

Trust: 0.2

sources: IVD: 8ba09e49-79c8-4425-b261-894ff692d38c // ZDI: ZDI-17-372 // CNVD: CNVD-2017-09462 // BID: 99344 // JVNDB: JVNDB-2017-008208 // CNNVD: CNNVD-201706-1091 // NVD: CVE-2017-9957

REFERENCES

url:http://www.schneider-electric.com/en/download/document/sevd-2017-178-01/

Trust: 1.9

url:https://ics-cert.us-cert.gov/advisories/icsa-17-180-02

Trust: 1.7

url:http://www.securityfocus.com/bid/99344

Trust: 1.6

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-9957

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-9957

Trust: 0.8

url:http://technet.microsoft.com/en-us/library/cc725770%28ws.10%29.aspx

Trust: 0.7

url:http://www.zerodayinitiative.com/advisories/zdi-17-372/

Trust: 0.6

url:http://www.nsfocus.net/vulndb/37013

Trust: 0.6

url:http://www.schneider-electric.com/site/home/index.cfm/ww/?selectcountry=true

Trust: 0.3

sources: ZDI: ZDI-17-372 // CNVD: CNVD-2017-09462 // BID: 99344 // JVNDB: JVNDB-2017-008208 // CNNVD: CNNVD-201706-1091 // NVD: CVE-2017-9957

CREDITS

rgod

Trust: 0.7

sources: ZDI: ZDI-17-372

SOURCES

db:IVDid:8ba09e49-79c8-4425-b261-894ff692d38c
db:ZDIid:ZDI-17-372
db:CNVDid:CNVD-2017-09462
db:BIDid:99344
db:JVNDBid:JVNDB-2017-008208
db:CNNVDid:CNNVD-201706-1091
db:NVDid:CVE-2017-9957

LAST UPDATE DATE

2024-11-23T20:07:44.161000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-17-372date:2017-06-12T00:00:00
db:CNVDid:CNVD-2017-09462date:2017-06-14T00:00:00
db:BIDid:99344date:2017-06-30T00:00:00
db:JVNDBid:JVNDB-2017-008208date:2019-01-09T00:00:00
db:CNNVDid:CNNVD-201706-1091date:2017-09-30T00:00:00
db:NVDid:CVE-2017-9957date:2024-11-21T03:37:15.053

SOURCES RELEASE DATE

db:IVDid:8ba09e49-79c8-4425-b261-894ff692d38cdate:2017-06-14T00:00:00
db:ZDIid:ZDI-17-372date:2017-06-12T00:00:00
db:CNVDid:CNVD-2017-09462date:2017-06-14T00:00:00
db:BIDid:99344date:2017-06-30T00:00:00
db:JVNDBid:JVNDB-2017-008208date:2017-10-12T00:00:00
db:CNNVDid:CNNVD-201706-1091date:2017-06-27T00:00:00
db:NVDid:CVE-2017-9957date:2017-09-26T01:29:03.867