CNVD-2018-11129

Vulnerability from cnvd - Published: 2018-06-08
VLAI Severity ?
Title
Schneider Electric MGE UPS和MGE STS 66074 MGE Network Management Card Transverse信息泄露漏洞
Description
Schneider Electric MGE UPS和MGE STS都是法国施耐德电气(Schneider Electric)公司的产品。Schneider Electric MGE UPS是一款不间断电源设备。MGE STS是一款静态切换开关。66074 MGE Network Management Card Transverse是其中的一个网络管理卡(网卡)。 Schneider Electric MGE UPS和MGE STS中的66074 MGE Network Management Card Transverse存在安全漏洞。远程攻击者可借助受影响设备的集成Web服务器(端口80/443/TCP)利用该漏洞绕过授权系统,获取设备的访问权限。
Severity
Patch Name
Schneider Electric MGE UPS和MGE STS 66074 MGE Network Management Card Transverse信息泄露漏洞的补丁
Patch Description
Schneider Electric MGE UPS和MGE STS都是法国施耐德电气(Schneider Electric)公司的产品。Schneider Electric MGE UPS是一款不间断电源设备。MGE STS是一款静态切换开关。66074 MGE Network Management Card Transverse是其中的一个网络管理卡(网卡)。 Schneider Electric MGE UPS和MGE STS中的66074 MGE Network Management Card Transverse存在安全漏洞。远程攻击者可借助受影响设备的集成Web服务器(端口80/443/TCP)利用该漏洞绕过授权系统,获取设备的访问权限。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

目前厂商已发布升级补丁以修复漏洞,补丁获取链接: https://www.schneider-electric.com/en/download/document/SEVD-2018-074-01/

Reference
https://www.schneider-electric.com/en/download/document/SEVD-2018-074-01/
Impacted products
Name
['Schneider Electric MGE Galaxy PW', 'Schneider Electric MGE Comet UPS', 'Schneider Electric MGE EPS 6000', 'Schneider Electric MGE EPS 8000', 'Schneider Electric MGE EPS 7000', 'Schneider Electric MGE Galaxy 9000', 'Schneider Electric MGE Galaxy 6000', 'Schneider Electric MGE Galaxy 4000', 'Schneider Electric MGE Galaxy 3000', 'Schneider Electric MGE Galaxy 5000', 'Schneider Electric STS (MGE Upsilon)']
Show details on source website

{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2018-7243",
      "cveUrl": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7243"
    }
  },
  "description": "Schneider Electric MGE UPS\u548cMGE STS\u90fd\u662f\u6cd5\u56fd\u65bd\u8010\u5fb7\u7535\u6c14\uff08Schneider Electric\uff09\u516c\u53f8\u7684\u4ea7\u54c1\u3002Schneider Electric MGE UPS\u662f\u4e00\u6b3e\u4e0d\u95f4\u65ad\u7535\u6e90\u8bbe\u5907\u3002MGE STS\u662f\u4e00\u6b3e\u9759\u6001\u5207\u6362\u5f00\u5173\u300266074 MGE Network Management Card Transverse\u662f\u5176\u4e2d\u7684\u4e00\u4e2a\u7f51\u7edc\u7ba1\u7406\u5361\uff08\u7f51\u5361\uff09\u3002\r\n\r\nSchneider Electric MGE UPS\u548cMGE STS\u4e2d\u768466074 MGE Network Management Card Transverse\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u501f\u52a9\u53d7\u5f71\u54cd\u8bbe\u5907\u7684\u96c6\u6210Web\u670d\u52a1\u5668\uff08\u7aef\u53e380/443/TCP\uff09\u5229\u7528\u8be5\u6f0f\u6d1e\u7ed5\u8fc7\u6388\u6743\u7cfb\u7edf\uff0c\u83b7\u53d6\u8bbe\u5907\u7684\u8bbf\u95ee\u6743\u9650\u3002",
  "discovererName": "Stephen Nosov (Positive Technologies)",
  "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://www.schneider-electric.com/en/download/document/SEVD-2018-074-01/",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2018-11129",
  "openTime": "2018-06-08",
  "patchDescription": "Schneider Electric MGE UPS\u548cMGE STS\u90fd\u662f\u6cd5\u56fd\u65bd\u8010\u5fb7\u7535\u6c14\uff08Schneider Electric\uff09\u516c\u53f8\u7684\u4ea7\u54c1\u3002Schneider Electric MGE UPS\u662f\u4e00\u6b3e\u4e0d\u95f4\u65ad\u7535\u6e90\u8bbe\u5907\u3002MGE STS\u662f\u4e00\u6b3e\u9759\u6001\u5207\u6362\u5f00\u5173\u300266074 MGE Network Management Card Transverse\u662f\u5176\u4e2d\u7684\u4e00\u4e2a\u7f51\u7edc\u7ba1\u7406\u5361\uff08\u7f51\u5361\uff09\u3002\r\n\r\nSchneider Electric MGE UPS\u548cMGE STS\u4e2d\u768466074 MGE Network Management Card Transverse\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u501f\u52a9\u53d7\u5f71\u54cd\u8bbe\u5907\u7684\u96c6\u6210Web\u670d\u52a1\u5668\uff08\u7aef\u53e380/443/TCP\uff09\u5229\u7528\u8be5\u6f0f\u6d1e\u7ed5\u8fc7\u6388\u6743\u7cfb\u7edf\uff0c\u83b7\u53d6\u8bbe\u5907\u7684\u8bbf\u95ee\u6743\u9650\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "Schneider Electric MGE UPS\u548cMGE STS 66074 MGE Network Management Card Transverse\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": [
      "Schneider Electric MGE Galaxy PW",
      "Schneider Electric MGE Comet UPS",
      "Schneider Electric MGE EPS 6000",
      "Schneider Electric MGE EPS 8000",
      "Schneider Electric MGE EPS 7000",
      "Schneider Electric MGE Galaxy 9000",
      "Schneider Electric MGE Galaxy 6000",
      "Schneider Electric MGE  Galaxy 4000",
      "Schneider Electric MGE Galaxy 3000",
      "Schneider Electric MGE Galaxy 5000",
      "Schneider Electric STS (MGE Upsilon)"
    ]
  },
  "referenceLink": "https://www.schneider-electric.com/en/download/document/SEVD-2018-074-01/",
  "serverity": "\u9ad8",
  "submitTime": "2018-05-10",
  "title": "Schneider Electric MGE UPS\u548cMGE STS 66074 MGE Network Management Card Transverse\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…