CVE-2018-7227 (GCVE-0-2018-7227)
Vulnerability from cvelistv5 – Published: 2018-03-09 23:00 – Updated: 2024-09-16 20:07
VLAI?
Summary
A vulnerability exists in Schneider Electric's Pelco Sarix Professional in all firmware versions prior to 3.29.67 which could allow retrieving of specially crafted URLs without authentication that can reveal sensitive information to an attacker.
Severity ?
No CVSS data available.
CWE
- Information Disclosure
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Schneider Electric SE | Pelco Sarix Professional |
Affected:
all firmware versions prior to 3.29.67
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T06:24:11.493Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.schneider-electric.com/en/download/document/SEVD-2018-058-01/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Pelco Sarix Professional",
"vendor": "Schneider Electric SE",
"versions": [
{
"status": "affected",
"version": "all firmware versions prior to 3.29.67"
}
]
}
],
"datePublic": "2018-03-01T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability exists in Schneider Electric\u0027s Pelco Sarix Professional in all firmware versions prior to 3.29.67 which could allow retrieving of specially crafted URLs without authentication that can reveal sensitive information to an attacker."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Information Disclosure",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-03-09T22:57:01",
"orgId": "076d1eb6-cfab-4401-b34d-6dfc2a413bdb",
"shortName": "schneider"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.schneider-electric.com/en/download/document/SEVD-2018-058-01/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cybersecurity@schneider-electric.com",
"DATE_PUBLIC": "2018-03-01T00:00:00",
"ID": "CVE-2018-7227",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Pelco Sarix Professional",
"version": {
"version_data": [
{
"version_value": "all firmware versions prior to 3.29.67"
}
]
}
}
]
},
"vendor_name": "Schneider Electric SE"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability exists in Schneider Electric\u0027s Pelco Sarix Professional in all firmware versions prior to 3.29.67 which could allow retrieving of specially crafted URLs without authentication that can reveal sensitive information to an attacker."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Information Disclosure"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.schneider-electric.com/en/download/document/SEVD-2018-058-01/",
"refsource": "CONFIRM",
"url": "https://www.schneider-electric.com/en/download/document/SEVD-2018-058-01/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "076d1eb6-cfab-4401-b34d-6dfc2a413bdb",
"assignerShortName": "schneider",
"cveId": "CVE-2018-7227",
"datePublished": "2018-03-09T23:00:00Z",
"dateReserved": "2018-02-19T00:00:00",
"dateUpdated": "2024-09-16T20:07:30.640Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2018-7227\",\"sourceIdentifier\":\"cybersecurity@se.com\",\"published\":\"2018-03-09T23:29:00.217\",\"lastModified\":\"2024-11-21T04:11:49.580\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability exists in Schneider Electric\u0027s Pelco Sarix Professional in all firmware versions prior to 3.29.67 which could allow retrieving of specially crafted URLs without authentication that can reveal sensitive information to an attacker.\"},{\"lang\":\"es\",\"value\":\"Existe una vulnerabilidad en Pelco Sarix Professional de Schneider Electric en todas las versiones de firmware anteriores a la 3.29.67 que podr\u00eda permitir la recuperaci\u00f3n de URL especialmente manipuladas sin autenticaci\u00f3n que puede revelar informaci\u00f3n sensible a un atacante.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-287\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:mps110-1_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.29.67\",\"matchCriteriaId\":\"E3EF4EC2-D25E-4EC1-8426-57FE421671CB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:mps110-1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"778C6B7B-4762-4FAA-820A-FBC8F908E1F9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:imps110-1er_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.29.67\",\"matchCriteriaId\":\"0665DC91-BE7B-422C-8669-0F954D125555\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:imps110-1er:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D366FB62-6A7A-4BD6-BDA4-11931C4EFD81\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:ibps110-1er_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.29.67\",\"matchCriteriaId\":\"E8755385-CDAD-48BB-9833-142598406FA1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:ibps110-1er:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DCEC508-8056-4655-95D6-8FD81FA83B53\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:imp1110-1_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.29.67\",\"matchCriteriaId\":\"2BD2C651-6BF4-4A5E-9006-B6683E0FB3F3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:imp1110-1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8585A047-D4D5-4EE9-A839-827D50F28E6F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:imp1110-1e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.29.67\",\"matchCriteriaId\":\"55DE8E5B-B037-4DA5-A41C-1162E57183A0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:imp1110-1e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C54ECB2-48E2-4484-BDA3-3B1A2B4F64BA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:imp1110-1er_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.29.67\",\"matchCriteriaId\":\"11A4676C-101D-4E30-AE2B-473DE833415D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:imp1110-1er:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCE896FA-E8B0-43AD-B7D6-3606552A927A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:ibp1110-1er_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.29.67\",\"matchCriteriaId\":\"DAD29A69-4FAF-4F1C-90F7-75092BD34FA1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:ibp1110-1er:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43A50B71-9906-4CA8-8CCA-3ABEFE36DDF8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:imp219-1_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.29.67\",\"matchCriteriaId\":\"5E8F3C66-8C91-42DA-B3BC-7A799463420B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:imp219-1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9B0FA60-0C47-4874-BB4E-BD9C5392EE36\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:imp219-1e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.29.67\",\"matchCriteriaId\":\"A8CFD36A-AAAC-4EDA-B073-B5BA771D2F71\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:imp219-1e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C505935-2601-4858-9107-35ACCA09C5E2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:imp219-1er_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.29.67\",\"matchCriteriaId\":\"71B4BB85-B2E7-4890-B27F-D57C71E1C1DF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:imp219-1er:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83F91A7F-DB48-4431-9998-B45B04858905\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:ibp219-1er_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.29.67\",\"matchCriteriaId\":\"6228B511-D0D3-42A1-9D1B-259B1DB5C9C4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:ibp219-1er:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E4BE69D-0ED4-41E2-ACBD-F28EFE3F3678\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:imp319-1_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.29.67\",\"matchCriteriaId\":\"1D4FBCCA-2E0A-42B9-9BEA-F1AF08C5C3E7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:imp319-1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AEF2268-8C80-43DE-A26B-D76DEE72A20C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:imp319-1e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.29.67\",\"matchCriteriaId\":\"608DC472-5B55-45A6-AB2D-DC775A6903B1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:imp319-1e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"679FC4B1-2BAE-42DC-BC98-80F34DC40E57\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:ibp319-1er_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.29.67\",\"matchCriteriaId\":\"4D566BF6-12A1-4AFC-B627-C47A87704517\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:ibp319-1er:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDEA40CA-2138-46EB-AAF6-6F0997D8D9E0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:imp519-1_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.29.67\",\"matchCriteriaId\":\"53029C82-C2E9-443A-BE4E-3E6A7C774876\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:imp519-1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5457D7DC-990F-47BA-BDAF-4224B1D8367C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:imp319-1er_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.29.67\",\"matchCriteriaId\":\"C894428E-3ADA-4FE7-B4D3-AC94C297F097\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:imp319-1er:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A093D08-9339-4F5E-8DC3-7335F64B0058\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:imp519-1e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.29.67\",\"matchCriteriaId\":\"CA8D3D7B-C9E3-4F81-82EB-E5FB385B8F40\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:imp519-1e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9940495-9135-414B-9266-E8ADABDC27B5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:imp519-1er_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.29.67\",\"matchCriteriaId\":\"D6D3D3D8-B55F-473C-BB96-DAFF37434089\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:imp519-1er:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA8B8E07-5ED4-420C-A6B0-62D69BB809BB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:ibp519-1er_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.29.67\",\"matchCriteriaId\":\"AAC22F8F-58F4-43E5-B614-52DB1E67EE3F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:ibp519-1er:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D09F722A-5337-4891-A5A2-CAE3B4C562E6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:imps110-1e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.29.67\",\"matchCriteriaId\":\"ACDE10BC-5B87-4737-99BE-3BD018F2B6FF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:imps110-1e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA4F3354-111C-4C4A-88CE-8243BF9A1D26\"}]}]}],\"references\":[{\"url\":\"https://www.schneider-electric.com/en/download/document/SEVD-2018-058-01/\",\"source\":\"cybersecurity@se.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://www.schneider-electric.com/en/download/document/SEVD-2018-058-01/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…