Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2020-7531 (GCVE-0-2020-7531)
Vulnerability from cvelistv5 – Published: 2020-09-16 15:40 – Updated: 2024-08-04 09:33- CWE-284 - Improper Access Control
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | SCADAPack 7x Remote Connect V3.6.3.574 and prior. |
Affected:
SCADAPack 7x Remote Connect V3.6.3.574 and prior.
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T09:33:19.506Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.se.com/ww/en/download/document/SEVD-2020-252-01/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "SCADAPack 7x Remote Connect V3.6.3.574 and prior.",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "SCADAPack 7x Remote Connect V3.6.3.574 and prior."
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A CWE-284 Improper Access Control vulnerability exists in SCADAPack 7x Remote Connect (V3.6.3.574 and prior) which allows an attacker to place executables in a specific folder and run code whenever RemoteConnect is executed by the user."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-284",
"description": "CWE-284 Improper Access Control",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-09-16T15:40:39.000Z",
"orgId": "076d1eb6-cfab-4401-b34d-6dfc2a413bdb",
"shortName": "schneider"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.se.com/ww/en/download/document/SEVD-2020-252-01/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cybersecurity@schneider-electric.com",
"ID": "CVE-2020-7531",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "SCADAPack 7x Remote Connect V3.6.3.574 and prior.",
"version": {
"version_data": [
{
"version_value": "SCADAPack 7x Remote Connect V3.6.3.574 and prior."
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A CWE-284 Improper Access Control vulnerability exists in SCADAPack 7x Remote Connect (V3.6.3.574 and prior) which allows an attacker to place executables in a specific folder and run code whenever RemoteConnect is executed by the user."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-284 Improper Access Control"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.se.com/ww/en/download/document/SEVD-2020-252-01/",
"refsource": "MISC",
"url": "https://www.se.com/ww/en/download/document/SEVD-2020-252-01/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "076d1eb6-cfab-4401-b34d-6dfc2a413bdb",
"assignerShortName": "schneider",
"cveId": "CVE-2020-7531",
"datePublished": "2020-09-16T15:40:39.000Z",
"dateReserved": "2020-01-21T00:00:00.000Z",
"dateUpdated": "2024-08-04T09:33:19.506Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2020-7531",
"date": "2026-04-16",
"epss": "0.00176",
"percentile": "0.39114"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2020-7531\",\"sourceIdentifier\":\"cybersecurity@se.com\",\"published\":\"2020-09-16T16:15:15.497\",\"lastModified\":\"2024-11-21T05:37:19.403\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A CWE-284 Improper Access Control vulnerability exists in SCADAPack 7x Remote Connect (V3.6.3.574 and prior) which allows an attacker to place executables in a specific folder and run code whenever RemoteConnect is executed by the user.\"},{\"lang\":\"es\",\"value\":\"Se presenta una vulnerabilidad de Control de Acceso Inapropiado CWE-284, en SCADAPack 7x Remote Connect (versiones V3.6.3.574 y anteriores) que permite a un atacante colocar archivos ejecutables en una carpeta espec\u00edfica y ejecutar c\u00f3digo cada vez que el usuario ejecuta RemoteConnect\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"cybersecurity@se.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-284\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:schneider-electric:scadapack_7x_remote_connect:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.6.3.574\",\"matchCriteriaId\":\"3412A93E-4C9E-4B0E-9798-201E04241A34\"}]}]}],\"references\":[{\"url\":\"https://www.se.com/ww/en/download/document/SEVD-2020-252-01/\",\"source\":\"cybersecurity@se.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.se.com/ww/en/download/document/SEVD-2020-252-01/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
FKIE_CVE-2020-7531
Vulnerability from fkie_nvd - Published: 2020-09-16 16:15 - Updated: 2024-11-21 05:37| Vendor | Product | Version | |
|---|---|---|---|
| schneider-electric | scadapack_7x_remote_connect | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:schneider-electric:scadapack_7x_remote_connect:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3412A93E-4C9E-4B0E-9798-201E04241A34",
"versionEndIncluding": "3.6.3.574",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A CWE-284 Improper Access Control vulnerability exists in SCADAPack 7x Remote Connect (V3.6.3.574 and prior) which allows an attacker to place executables in a specific folder and run code whenever RemoteConnect is executed by the user."
},
{
"lang": "es",
"value": "Se presenta una vulnerabilidad de Control de Acceso Inapropiado CWE-284, en SCADAPack 7x Remote Connect (versiones V3.6.3.574 y anteriores) que permite a un atacante colocar archivos ejecutables en una carpeta espec\u00edfica y ejecutar c\u00f3digo cada vez que el usuario ejecuta RemoteConnect"
}
],
"id": "CVE-2020-7531",
"lastModified": "2024-11-21T05:37:19.403",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2020-09-16T16:15:15.497",
"references": [
{
"source": "cybersecurity@se.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.se.com/ww/en/download/document/SEVD-2020-252-01/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.se.com/ww/en/download/document/SEVD-2020-252-01/"
}
],
"sourceIdentifier": "cybersecurity@se.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-284"
}
],
"source": "cybersecurity@se.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CNVD-2021-28294
Vulnerability from cnvd - Published: 2021-04-15厂商已发布了漏洞修复程序,请及时关注更新: https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet&p_File_Name=SEVD-2020-252-01_SCADAPack_RemoteConnect_and_Security_Administrator.pdf&p_Doc_Ref=SEVD-2020-252-01
| Name | Schneider Electric SCADAPack 7x Remote Connect <=3.6.3.574 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2020-7531",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2020-7531"
}
},
"description": "SCADAPack\u662f\u6cd5\u56fd\u65bd\u8010\u5fb7\uff08schneider-electric\uff09\u7684\u4e00\u6b3e\u667a\u80fd\u73b0\u573a\u63a7\u5236\u5668\u8be5\u63a7\u5236\u5668\u7ed3\u5408\u4e86\u8fdc\u7a0b\u7ec8\u7aef\u63a7\u5236\uff08RTU\uff09\u7684\u76d1\u63a7\u901a\u8baf\u80fd\u529b\uff0c\u53ef\u7f16\u7a0b\u903b\u8f91\u63a7\u5236\u5668\uff08PLC\uff09\u7684\u5904\u7406\u548c\u6570\u636e\u8bb0\u5f55\u529f\u80fd\uff0c\u4e3a\u9700\u8981\u81ea\u52a8\u76d1\u63a7\u548c\u81ea\u4e3b\u63a7\u5236\u7684\u8fdc\u7a0b\u8fc7\u7a0b\u63d0\u4f9b\u5353\u8d8a\u7684\u529f\u80fd\u3002\n\n SCADAPack 7x Remote Connect 3.6.3.574\u7248\u672c\u53ca\u66f4\u9ad8\u7248\u672c\u5b58\u5728\u8bbf\u95ee\u63a7\u5236\u9519\u8bef\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7f51\u7edc\u7cfb\u7edf\u6216\u4ea7\u54c1\u672a\u6b63\u786e\u9650\u5236\u6765\u81ea\u672a\u6388\u6743\u89d2\u8272\u7684\u8d44\u6e90\u8bbf\u95ee\u3002\u653b\u51fb\u8005\u5229\u7528\u8be5\u6f0f\u6d1e\u5728\u7528\u6237\u6267\u884cRemoteConnect\u65f6\u5c06\u53ef\u6267\u884c\u6587\u4ef6\u653e\u7f6e\u5728\u7279\u5b9a\u7684\u6587\u4ef6\u5939\u4e2d\u5e76\u8fd0\u884c\u4ee3\u7801\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://download.schneider-electric.com/files?p_enDocType=Technical+leaflet\u0026p_File_Name=SEVD-2020-252-01_SCADAPack_RemoteConnect_and_Security_Administrator.pdf\u0026p_Doc_Ref=SEVD-2020-252-01",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2021-28294",
"openTime": "2021-04-15",
"patchDescription": "SCADAPack\u662f\u6cd5\u56fd\u65bd\u8010\u5fb7\uff08schneider-electric\uff09\u7684\u4e00\u6b3e\u667a\u80fd\u73b0\u573a\u63a7\u5236\u5668\u8be5\u63a7\u5236\u5668\u7ed3\u5408\u4e86\u8fdc\u7a0b\u7ec8\u7aef\u63a7\u5236\uff08RTU\uff09\u7684\u76d1\u63a7\u901a\u8baf\u80fd\u529b\uff0c\u53ef\u7f16\u7a0b\u903b\u8f91\u63a7\u5236\u5668\uff08PLC\uff09\u7684\u5904\u7406\u548c\u6570\u636e\u8bb0\u5f55\u529f\u80fd\uff0c\u4e3a\u9700\u8981\u81ea\u52a8\u76d1\u63a7\u548c\u81ea\u4e3b\u63a7\u5236\u7684\u8fdc\u7a0b\u8fc7\u7a0b\u63d0\u4f9b\u5353\u8d8a\u7684\u529f\u80fd\u3002\r\n\r\n SCADAPack 7x Remote Connect 3.6.3.574\u7248\u672c\u53ca\u66f4\u9ad8\u7248\u672c\u5b58\u5728\u8bbf\u95ee\u63a7\u5236\u9519\u8bef\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7f51\u7edc\u7cfb\u7edf\u6216\u4ea7\u54c1\u672a\u6b63\u786e\u9650\u5236\u6765\u81ea\u672a\u6388\u6743\u89d2\u8272\u7684\u8d44\u6e90\u8bbf\u95ee\u3002\u653b\u51fb\u8005\u5229\u7528\u8be5\u6f0f\u6d1e\u5728\u7528\u6237\u6267\u884cRemoteConnect\u65f6\u5c06\u53ef\u6267\u884c\u6587\u4ef6\u653e\u7f6e\u5728\u7279\u5b9a\u7684\u6587\u4ef6\u5939\u4e2d\u5e76\u8fd0\u884c\u4ee3\u7801\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "SCADAPack 7x Remote Connect\u4e0d\u5f53\u8bbf\u95ee\u63a7\u5236\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "Schneider Electric SCADAPack 7x Remote Connect \u003c=3.6.3.574"
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2020-7531",
"serverity": "\u4e2d",
"submitTime": "2020-09-17",
"title": "SCADAPack 7x Remote Connect\u4e0d\u5f53\u8bbf\u95ee\u63a7\u5236\u6f0f\u6d1e"
}
VAR-202009-1314
Vulnerability from variot - Updated: 2024-11-23 21:51A CWE-284 Improper Access Control vulnerability exists in SCADAPack 7x Remote Connect (V3.6.3.574 and prior) which allows an attacker to place executables in a specific folder and run code whenever RemoteConnect is executed by the user. SCADAPack 7x Remote Connect Contains an unspecified vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. SCADAPack is an intelligent field controller of French Schneider-electric. The controller combines the monitoring and communication capabilities of remote terminal control (RTU), the processing and data recording functions of programmable logic controllers (PLC). Remote process monitoring and autonomous control provide excellent functions
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202009-1314",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "scadapack 7x remote connect",
"scope": "lte",
"trust": 1.0,
"vendor": "schneider electric",
"version": "3.6.3.574"
},
{
"model": "scadapack 7x remote connect",
"scope": "eq",
"trust": 0.8,
"vendor": "schneider electric",
"version": null
},
{
"model": "scadapack 7x remote connect",
"scope": "lte",
"trust": 0.8,
"vendor": "schneider electric",
"version": "3.6.3.574 and earlier"
},
{
"model": "electric scadapack remote connect",
"scope": "eq",
"trust": 0.6,
"vendor": "schneider",
"version": "7x\u003c=3.6.3.574"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-28294"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-011241"
},
{
"db": "NVD",
"id": "CVE-2020-7531"
}
]
},
"cve": "CVE-2020-7531",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2020-7531",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.9,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CNVD-2021-28294",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2020-7531",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 7.8,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2020-7531",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2020-7531",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2020-7531",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2021-28294",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-202009-1000",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULMON",
"id": "CVE-2020-7531",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-28294"
},
{
"db": "VULMON",
"id": "CVE-2020-7531"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-011241"
},
{
"db": "CNNVD",
"id": "CNNVD-202009-1000"
},
{
"db": "NVD",
"id": "CVE-2020-7531"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "A CWE-284 Improper Access Control vulnerability exists in SCADAPack 7x Remote Connect (V3.6.3.574 and prior) which allows an attacker to place executables in a specific folder and run code whenever RemoteConnect is executed by the user. SCADAPack 7x Remote Connect Contains an unspecified vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. SCADAPack is an intelligent field controller of French Schneider-electric. The controller combines the monitoring and communication capabilities of remote terminal control (RTU), the processing and data recording functions of programmable logic controllers (PLC). Remote process monitoring and autonomous control provide excellent functions",
"sources": [
{
"db": "NVD",
"id": "CVE-2020-7531"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-011241"
},
{
"db": "CNVD",
"id": "CNVD-2021-28294"
},
{
"db": "VULMON",
"id": "CVE-2020-7531"
}
],
"trust": 2.25
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2020-7531",
"trust": 3.1
},
{
"db": "SCHNEIDER",
"id": "SEVD-2020-252-01",
"trust": 1.7
},
{
"db": "JVNDB",
"id": "JVNDB-2020-011241",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2021-28294",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202009-1000",
"trust": 0.6
},
{
"db": "VULMON",
"id": "CVE-2020-7531",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-28294"
},
{
"db": "VULMON",
"id": "CVE-2020-7531"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-011241"
},
{
"db": "CNNVD",
"id": "CNNVD-202009-1000"
},
{
"db": "NVD",
"id": "CVE-2020-7531"
}
]
},
"id": "VAR-202009-1314",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-28294"
}
],
"trust": 1.6
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-28294"
}
]
},
"last_update_date": "2024-11-23T21:51:17.562000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "SEVD-2020-252-01 Security\u00a0Notification",
"trust": 0.8,
"url": "https://www.se.com/ww/en/download/document/SEVD-2020-252-01/"
},
{
"title": "Patch for SCADAPack 7x Remote Connect Improper Access Control Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/258131"
},
{
"title": "Schneider SCADAPack Remediation measures for authorization problem vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=128745"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-28294"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-011241"
},
{
"db": "CNNVD",
"id": "CNNVD-202009-1000"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-284",
"trust": 1.0
},
{
"problemtype": "NVD-CWE-noinfo",
"trust": 1.0
},
{
"problemtype": "Lack of information (CWE-noinfo) [NVD Evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-011241"
},
{
"db": "NVD",
"id": "CVE-2020-7531"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.0,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-7531"
},
{
"trust": 1.7,
"url": "https://www.se.com/ww/en/download/document/sevd-2020-252-01/"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-28294"
},
{
"db": "VULMON",
"id": "CVE-2020-7531"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-011241"
},
{
"db": "CNNVD",
"id": "CNNVD-202009-1000"
},
{
"db": "NVD",
"id": "CVE-2020-7531"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2021-28294"
},
{
"db": "VULMON",
"id": "CVE-2020-7531"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-011241"
},
{
"db": "CNNVD",
"id": "CNNVD-202009-1000"
},
{
"db": "NVD",
"id": "CVE-2020-7531"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2021-04-15T00:00:00",
"db": "CNVD",
"id": "CNVD-2021-28294"
},
{
"date": "2020-09-16T00:00:00",
"db": "VULMON",
"id": "CVE-2020-7531"
},
{
"date": "2021-03-24T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2020-011241"
},
{
"date": "2020-09-16T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202009-1000"
},
{
"date": "2020-09-16T16:15:15.497000",
"db": "NVD",
"id": "CVE-2020-7531"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2021-04-15T00:00:00",
"db": "CNVD",
"id": "CNVD-2021-28294"
},
{
"date": "2020-09-21T00:00:00",
"db": "VULMON",
"id": "CVE-2020-7531"
},
{
"date": "2021-03-24T07:40:00",
"db": "JVNDB",
"id": "JVNDB-2020-011241"
},
{
"date": "2022-03-08T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202009-1000"
},
{
"date": "2024-11-21T05:37:19.403000",
"db": "NVD",
"id": "CVE-2020-7531"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202009-1000"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "SCADAPack\u00a07x\u00a0Remote\u00a0Connect\u00a0 Vulnerability in",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-011241"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "authorization issue",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202009-1000"
}
],
"trust": 0.6
}
}
GHSA-Q699-F9H8-7V6P
Vulnerability from github – Published: 2022-05-24 17:28 – Updated: 2022-05-24 17:28A CWE-284 Improper Access Control vulnerability exists in SCADAPack 7x Remote Connect (V3.6.3.574 and prior) which allows an attacker to place executables in a specific folder and run code whenever RemoteConnect is executed by the user.
{
"affected": [],
"aliases": [
"CVE-2020-7531"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2020-09-16T16:15:00Z",
"severity": "HIGH"
},
"details": "A CWE-284 Improper Access Control vulnerability exists in SCADAPack 7x Remote Connect (V3.6.3.574 and prior) which allows an attacker to place executables in a specific folder and run code whenever RemoteConnect is executed by the user.",
"id": "GHSA-q699-f9h8-7v6p",
"modified": "2022-05-24T17:28:31Z",
"published": "2022-05-24T17:28:31Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7531"
},
{
"type": "WEB",
"url": "https://www.se.com/ww/en/download/document/SEVD-2020-252-01"
}
],
"schema_version": "1.4.0",
"severity": []
}
GSD-2020-7531
Vulnerability from gsd - Updated: 2023-12-13 01:21{
"GSD": {
"alias": "CVE-2020-7531",
"description": "A CWE-284 Improper Access Control vulnerability exists in SCADAPack 7x Remote Connect (V3.6.3.574 and prior) which allows an attacker to place executables in a specific folder and run code whenever RemoteConnect is executed by the user.",
"id": "GSD-2020-7531"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2020-7531"
],
"details": "A CWE-284 Improper Access Control vulnerability exists in SCADAPack 7x Remote Connect (V3.6.3.574 and prior) which allows an attacker to place executables in a specific folder and run code whenever RemoteConnect is executed by the user.",
"id": "GSD-2020-7531",
"modified": "2023-12-13T01:21:51.870013Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cybersecurity@schneider-electric.com",
"ID": "CVE-2020-7531",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "SCADAPack 7x Remote Connect V3.6.3.574 and prior.",
"version": {
"version_data": [
{
"version_value": "SCADAPack 7x Remote Connect V3.6.3.574 and prior."
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A CWE-284 Improper Access Control vulnerability exists in SCADAPack 7x Remote Connect (V3.6.3.574 and prior) which allows an attacker to place executables in a specific folder and run code whenever RemoteConnect is executed by the user."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-284 Improper Access Control "
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.se.com/ww/en/download/document/SEVD-2020-252-01/",
"refsource": "MISC",
"url": "https://www.se.com/ww/en/download/document/SEVD-2020-252-01/"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:schneider-electric:scadapack_7x_remote_connect:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.6.3.574",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cybersecurity@schneider-electric.com",
"ID": "CVE-2020-7531"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "A CWE-284 Improper Access Control vulnerability exists in SCADAPack 7x Remote Connect (V3.6.3.574 and prior) which allows an attacker to place executables in a specific folder and run code whenever RemoteConnect is executed by the user."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.se.com/ww/en/download/document/SEVD-2020-252-01/",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://www.se.com/ww/en/download/document/SEVD-2020-252-01/"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": true
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
},
"lastModifiedDate": "2020-09-21T17:06Z",
"publishedDate": "2020-09-16T16:15Z"
}
}
}
CERTFR-2020-AVI-551
Vulnerability from certfr_avis - Published: 2020-09-09 - Updated: 2020-09-09
De multiples vulnérabilités ont été découvertes dans Schneider Electric SCADAPack. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Schneider Electric | N/A | SCADAPack 7x RemoteConnect versions antérieures à V3.7.3.904 | ||
| Schneider Electric | N/A | SCADAPack x70 Security Administrator versions antérieures à V1.6.2 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SCADAPack 7x RemoteConnect versions ant\u00e9rieures \u00e0 V3.7.3.904",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "SCADAPack x70 Security Administrator versions ant\u00e9rieures \u00e0 V1.6.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-7528",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7528"
},
{
"name": "CVE-2020-7530",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7530"
},
{
"name": "CVE-2020-7529",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7529"
},
{
"name": "CVE-2020-7532",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7532"
},
{
"name": "CVE-2020-7531",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7531"
}
],
"initial_release_date": "2020-09-09T00:00:00",
"last_revision_date": "2020-09-09T00:00:00",
"links": [],
"reference": "CERTFR-2020-AVI-551",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2020-09-09T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Schneider Electric\nSCADAPack. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire \u00e0 distance et un contournement de la politique de\ns\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Schneider Electric SCADAPack",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2020-252-01 du 08 septembre 2020",
"url": "https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet\u0026p_File_Name=SEVD-2020-252-01_SCADAPack_RemoteConnect_and_Security_Administrator.pdf\u0026p_Doc_Ref=SEVD-2020-252-01"
}
]
}
SEVD-2020-252-01
Vulnerability from csaf_se - Published: 2020-09-08 00:00 - Updated: 2021-02-09 00:00M&M Software fdtCONTAINER Component in versions below 3.5.20304.x and between 3.6 and 3.6.20304.x which is included in SCADAPack x70 is vulnerable to deserialization of untrusted data in its project storage
A CWE-22 Improper Limitation of a Pathname to a Restricted Directory (‘Path Transversal’) vulnerability exists which allows an attacker to place content in any unprotected folder on the target system using a crafted .RCZ file.
A CWE-285 Improper Authorization vulnerability exists which allows improper access to executable code folders.
A CWE-284 Improper Access Control vulnerability exists which allows an attacker to place executables in a specific folder and run code whenever RemoteConnect is executed by the user.
A CWE-502 Deserialization of Untrusted Data vulnerability exists which could allow arbitrary code execution when an attacker builds a custom .SDB file containing a malicious serialized buffer.
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "We strongly recommend the following industry cybersecurity best practices.\n\nhttps://www.se.com/us/en/download/document/7EN52-0390/\n* Locate control and safety system networks and remote devices behind firewalls and isolate them from the business network.\n* Install physical controls so no unauthorized personnel can access your industrial control and safety systems, components, peripheral equipment, and networks.\n* Place all controllers in locked cabinets and never leave them in the \u201cProgram\u201d mode.\n* Never connect programming software to any network other than the network intended for that device.\n* Scan all methods of mobile data exchange with the isolated network such as CDs, USB drives, etc. before use in the terminals or any node connected to these networks.\n* Never allow mobile devices that have connected to any other network besides the intended network to connect to the safety or control networks without proper sanitation.\n* Minimize network exposure for all control system devices and systems and ensure that they are not accessible from the Internet.\n* When remote access is required, use secure methods, such as Virtual Private Networks (VPNs). Recognize that VPNs may have vulnerabilities and should be updated to the most current version available. Also, understand that VPNs are only as secure as the connected devices.\nFor more information refer to the Schneider Electric Recommended Cybersecurity Best Practices document. \n",
"title": "General Security Recommendations"
},
{
"category": "general",
"text": "This document provides an overview of the identified vulnerability or vulnerabilities and actions required to mitigate. For more details and assistance on how to protect your installation, contact your local Schneider Electric representative or Schneider Electric Industrial Cybersecurity Services: https://www.se.com/ww/en/work/solutions/cybersecurity/. These organizations will be fully aware of this situation and can support you through the process.\nFor further information related to cybersecurity in Schneider Electric\u2019s products, visit the company\u2019s cybersecurity support portal page: https://www.se.com/ww/en/work/support/cybersecurity/overview.jsp",
"title": "For More Information"
},
{
"category": "legal_disclaimer",
"text": "THIS NOTIFICATION DOCUMENT, THE INFORMATION CONTAINED HEREIN, AND ANY MATERIALS LINKED FROM IT (COLLECTIVELY, THIS \u201cNOTIFICATION\u201d) ARE INTENDED TO HELP PROVIDE AN OVERVIEW OF THE IDENTIFIED SITUATION AND SUGGESTED MITIGATION ACTIONS, REMEDIATION, FIX, AND/OR GENERAL SECURITY RECOMMENDATIONS AND IS PROVIDED ON AN \u201cAS-IS\u201d BASIS WITHOUT WARRANTY OR GUARANTEE OF ANY KIND. SCHNEIDER ELECTRIC DISCLAIMS ALL WARRANTIES RELATING TO THIS NOTIFICATION, EITHER EXPRESS OR IMPLIED, INCLUDING WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. SCHNEIDER ELECTRIC MAKES NO WARRANTY THAT THE NOTIFICATION WILL RESOLVE THE IDENTIFIED SITUATION. IN NO EVENT SHALL SCHNEIDER ELECTRIC BE LIABLE FOR ANY DAMAGES OR LOSSES WHATSOEVER IN CONNECTION WITH THIS NOTIFICATION, INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF SCHNEIDER ELECTRIC HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. YOUR USE OF THIS NOTIFICATION IS AT YOUR OWN RISK, AND YOU ARE SOLELY LIABLE FOR ANY DAMAGES TO YOUR SYSTEMS OR ASSETS OR OTHER LOSSES THAT MAY RESULT FROM YOUR USE OF THIS NOTIFICATION. SCHNEIDER ELECTRIC RESERVES THE RIGHT TO UPDATE OR CHANGE THIS NOTIFICATION AT ANY TIME AND IN ITS SOLE DISCRETION",
"title": "LEGAL DISCLAIMER"
},
{
"category": "general",
"text": "At Schneider, we believe access to energy and digital is a basic human right. We empower all to do more with less, ensuring Life Is On everywhere, for everyone, at every moment.\n\nWe provide energy and automation digital solutions for efficiency and sustainability. We combine world-leading energy technologies, real-time automation, software and services into integrated solutions for Homes, Buildings, Data Centers, Infrastructure and Industries.\n\nWe are committed to unleash the infinite possibilities of an open, global, innovative community that is passionate with our Meaningful Purpose, Inclusive and Empowered values.\n\nwww.se.com ",
"title": "About Schneider Electric"
},
{
"category": "summary",
"text": "Schneider Electric is aware of multiple vulnerabilities in the SCADAPack x70 Remote Connect\r\nand the SCADAPack x70 Security Administrator applications.",
"title": "Overview"
}
],
"publisher": {
"category": "vendor",
"contact_details": "cpcert@se.com",
"name": "Schneider Electric CPCERT",
"namespace": "https://www.se.com/ww/en/work/support/cybersecurity/security-notifications.jsp"
},
"references": [
{
"category": "self",
"summary": "SCADAPack x70 Remote Connect and - SEVD-2020-252-01 PDF Version",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2020-252-01\u0026p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=SEVD-2020-252-01_SCADAPack_RemoteConnect_and_Security_Administrator%20V1.2.pdf"
},
{
"category": "self",
"summary": "SCADAPack x70 Remote Connect and - SEVD-2020-252-01 CSAF Version",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2020-252-01\u0026p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=sevd-2020-252-01.json"
},
{
"category": "external",
"summary": "Recommended Cybersecurity Best Practices",
"url": "https://www.se.com/us/en/download/document/7EN52-0390/"
}
],
"title": "SCADAPack x70 Remote Connect and SCADAPack x70 Security Administrator",
"tracking": {
"current_release_date": "2021-02-09T00:00:00.000Z",
"generator": {
"date": "2021-02-09T00:00:00.000Z",
"engine": {
"name": "Schneider Electric CSAF Generator",
"version": "1.2"
}
},
"id": "SEVD-2020-252-01",
"initial_release_date": "2020-09-08T00:00:00.000Z",
"revision_history": [
{
"date": "2020-09-08T00:00:00.000Z",
"number": "1.0.0",
"summary": "Original Release"
},
{
"date": "2020-10-13T00:00:00.000Z",
"number": "1.1.0",
"summary": "Corrected fix version of RemoteConnect from\r\nV2.3.2 to V2.4.2 package (page 2)."
},
{
"date": "2021-02-09T00:00:00.000Z",
"number": "1.2.0",
"summary": "Replaced CVE-2020-7528 with the pre-existing \r\nCVE-2020-12525 assigned to M\u0026M Software, \r\neliminating the duplicate entry for the same \r\nvulnerability.(page 1)."
}
],
"status": "final",
"version": "1.2.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=3.6.3.574",
"product": {
"name": "Schneider Electric SCADAPack x70 Remote Connect V3.6.3.574 and prior",
"product_id": "1"
}
}
],
"category": "product_name",
"name": "SCADAPack x70 Remote Connect"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=1.2.0",
"product": {
"name": "Schneider Electric SCADAPack x70 Security Administrator V1.2.0 and prior",
"product_id": "2"
}
}
],
"category": "product_name",
"name": "SCADAPack x70 Security Administrator"
},
{
"branches": [
{
"category": "product_version",
"name": "3.7.3.904",
"product": {
"name": "Schneider Electric SCADAPack x70 RemoteConnect V3.7.3.904",
"product_id": "3"
}
}
],
"category": "product_name",
"name": "SCADAPack x70 RemoteConnect"
},
{
"branches": [
{
"category": "product_version",
"name": "1.6.2",
"product": {
"name": "Schneider Electric SCADAPack x70 Security Administrator V1.6.2",
"product_id": "4"
}
}
],
"category": "product_name",
"name": "SCADAPack x70 Security Administrator"
}
],
"category": "vendor",
"name": "Schneider Electric"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-12525",
"notes": [
{
"category": "description",
"text": "M\u0026M Software fdtCONTAINER Component in versions below 3.5.20304.x and between 3.6 and \r\n3.6.20304.x which is included in SCADAPack x70 is vulnerable to deserialization of untrusted \r\ndata in its project storage",
"title": "CVE Description"
}
],
"product_status": {
"fixed": [
"3"
],
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "For SCADAPack x70 Remote Connect and SCADAPack x70 Security Administrator these \r\nvulnerabilities are fixed in SCADAPack x70 RemoteConnect V3.7.3.904 and SCADAPack x70 \r\nSecurity Administrator V1.6.2 respectively and are available for download in the link below, as \r\npart of the RemoteConnect V2.4.2 package: \r\nhttps://shop.exchange.se.com/en-US/apps/58663\r\nThere is no need to reboot.",
"product_ids": [
"1"
],
"restart_required": {
"category": "none"
},
"url": "https://shop.exchange.se.com/en-US/apps/58663"
},
{
"category": "mitigation",
"details": "The following workarounds and mitigations can be applied by customers to reduce the risk: Educate users to screen files from external sources and avoid files from untrusted sources before opening them in RemoteConnect or Security Administrator.",
"product_ids": [
"1"
],
"restart_required": {
"category": "none"
}
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.3,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 7.3,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"1"
]
}
],
"title": "CVE-2020-12525 "
},
{
"acknowledgments": [
{
"names": [
"Amir Preminger"
],
"organization": "Claroty"
}
],
"cve": "CVE-2020-7529",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "description",
"text": "A CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u2018Path Transversal\u2019) \r\nvulnerability exists which allows an attacker to place content in any unprotected folder on the \r\ntarget system using a crafted .RCZ file.",
"title": "CVE Description"
}
],
"product_status": {
"fixed": [
"3"
],
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "For SCADAPack x70 Remote Connect and SCADAPack x70 Security Administrator these \r\nvulnerabilities are fixed in SCADAPack x70 RemoteConnect V3.7.3.904 and SCADAPack x70 \r\nSecurity Administrator V1.6.2 respectively and are available for download in the link below, as \r\npart of the RemoteConnect V2.4.2 package: \r\nhttps://shop.exchange.se.com/en-US/apps/58663\r\nThere is no need to reboot.",
"product_ids": [
"1"
],
"restart_required": {
"category": "none"
},
"url": "https://shop.exchange.se.com/en-US/apps/58663"
},
{
"category": "mitigation",
"details": "The following workarounds and mitigations can be applied by customers to reduce the risk: Educate users to screen files from external sources and avoid files from untrusted sources before opening them in RemoteConnect or Security Administrator.",
"product_ids": [
"1"
],
"restart_required": {
"category": "none"
}
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 5.5,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.5,
"temporalSeverity": "MEDIUM",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"1"
]
}
],
"title": "CVE-2020-7529"
},
{
"acknowledgments": [
{
"names": [
"Amir Preminger"
],
"organization": "Claroty"
}
],
"cve": "CVE-2020-7530",
"cwe": {
"id": "CWE-285",
"name": "Improper Authorization"
},
"notes": [
{
"category": "description",
"text": "A CWE-285 Improper Authorization vulnerability exists which allows improper access to \r\nexecutable code folders.",
"title": "CVE Description"
}
],
"product_status": {
"fixed": [
"3"
],
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "For SCADAPack x70 Remote Connect and SCADAPack x70 Security Administrator these \r\nvulnerabilities are fixed in SCADAPack x70 RemoteConnect V3.7.3.904 and SCADAPack x70 \r\nSecurity Administrator V1.6.2 respectively and are available for download in the link below, as \r\npart of the RemoteConnect V2.4.2 package: \r\nhttps://shop.exchange.se.com/en-US/apps/58663\r\nThere is no need to reboot.",
"product_ids": [
"1"
],
"restart_required": {
"category": "none"
},
"url": "https://shop.exchange.se.com/en-US/apps/58663"
},
{
"category": "mitigation",
"details": "The following workarounds and mitigations can be applied by customers to reduce the risk: Educate users to screen files from external sources and avoid files from untrusted sources before opening them in RemoteConnect or Security Administrator.",
"product_ids": [
"1"
],
"restart_required": {
"category": "none"
}
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalScore": 7.1,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 7.1,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.0"
},
"products": [
"1"
]
}
],
"title": "CVE-2020-7530"
},
{
"acknowledgments": [
{
"names": [
"Amir Preminger"
],
"organization": "Claroty"
}
],
"cve": "CVE-2020-7531",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "description",
"text": "A CWE-284 Improper Access Control vulnerability exists which allows an attacker to place \r\nexecutables in a specific folder and run code whenever RemoteConnect is executed by the \r\nuser.",
"title": "CVE Description"
}
],
"product_status": {
"fixed": [
"3"
],
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "For SCADAPack x70 Remote Connect and SCADAPack x70 Security Administrator these \r\nvulnerabilities are fixed in SCADAPack x70 RemoteConnect V3.7.3.904 and SCADAPack x70 \r\nSecurity Administrator V1.6.2 respectively and are available for download in the link below, as \r\npart of the RemoteConnect V2.4.2 package: \r\nhttps://shop.exchange.se.com/en-US/apps/58663\r\nThere is no need to reboot.",
"product_ids": [
"1"
],
"restart_required": {
"category": "none"
},
"url": "https://shop.exchange.se.com/en-US/apps/58663"
},
{
"category": "mitigation",
"details": "The following workarounds and mitigations can be applied by customers to reduce the risk: Educate users to screen files from external sources and avoid files from untrusted sources before opening them in RemoteConnect or Security Administrator.",
"product_ids": [
"1"
],
"restart_required": {
"category": "none"
}
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 6,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 6,
"temporalSeverity": "MEDIUM",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:H",
"version": "3.0"
},
"products": [
"1"
]
}
],
"title": "CVE-2020-7531"
},
{
"acknowledgments": [
{
"names": [
"Amir Preminger"
],
"organization": "Claroty"
}
],
"cve": "CVE-2020-7532",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "description",
"text": "A CWE-502 Deserialization of Untrusted Data vulnerability exists which could allow arbitrary \r\ncode execution when an attacker builds a custom .SDB file containing a malicious serialized \r\nbuffer.",
"title": "CVE Description"
}
],
"product_status": {
"fixed": [
"4"
],
"known_affected": [
"2"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "For SCADAPack x70 Remote Connect and SCADAPack x70 Security Administrator these \r\nvulnerabilities are fixed in SCADAPack x70 RemoteConnect V3.7.3.904 and SCADAPack x70 \r\nSecurity Administrator V1.6.2 respectively and are available for download in the link below, as \r\npart of the RemoteConnect V2.4.2 package: \r\nhttps://shop.exchange.se.com/en-US/apps/58663\r\nThere is no need to reboot.",
"product_ids": [
"2"
],
"restart_required": {
"category": "none"
},
"url": "https://shop.exchange.se.com/en-US/apps/58663"
},
{
"category": "mitigation",
"details": "The following workarounds and mitigations can be applied by customers to reduce the risk: Educate users to screen files from external sources and avoid files from untrusted sources before opening them in RemoteConnect or Security Administrator.",
"product_ids": [
"1"
],
"restart_required": {
"category": "none"
}
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"2"
]
}
],
"title": "CVE-2020-7532"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.