Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2013-2796 (GCVE-0-2013-2796)
Vulnerability from cvelistv5 – Published: 2013-08-09 23:00 – Updated: 2024-09-16 18:13- n/a
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T15:52:21.382Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.citect.schneider-electric.com/cs-HF720SP459363"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-217-02"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Schneider Electric Vijeo Citect 7.20 and earlier, CitectSCADA 7.20 and earlier, and PowerLogic SCADA 7.20 and earlier allow remote attackers to read arbitrary files, send HTTP requests to intranet servers, or cause a denial of service (CPU and memory consumption) via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-08-09T23:00:00.000Z",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.citect.schneider-electric.com/cs-HF720SP459363"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-217-02"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2013-2796",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Schneider Electric Vijeo Citect 7.20 and earlier, CitectSCADA 7.20 and earlier, and PowerLogic SCADA 7.20 and earlier allow remote attackers to read arbitrary files, send HTTP requests to intranet servers, or cause a denial of service (CPU and memory consumption) via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.citect.schneider-electric.com/cs-HF720SP459363",
"refsource": "CONFIRM",
"url": "http://www.citect.schneider-electric.com/cs-HF720SP459363"
},
{
"name": "http://ics-cert.us-cert.gov/advisories/ICSA-13-217-02",
"refsource": "MISC",
"url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-217-02"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2013-2796",
"datePublished": "2013-08-09T23:00:00.000Z",
"dateReserved": "2013-04-11T00:00:00.000Z",
"dateUpdated": "2024-09-16T18:13:41.217Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2013-2796",
"date": "2026-04-20",
"epss": "0.0015",
"percentile": "0.35605"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2013-2796\",\"sourceIdentifier\":\"ics-cert@hq.dhs.gov\",\"published\":\"2013-08-09T23:55:02.537\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Schneider Electric Vijeo Citect 7.20 and earlier, CitectSCADA 7.20 and earlier, and PowerLogic SCADA 7.20 and earlier allow remote attackers to read arbitrary files, send HTTP requests to intranet servers, or cause a denial of service (CPU and memory consumption) via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.\"},{\"lang\":\"es\",\"value\":\"Schneider Electric Vijeo Citect v7.20 y anteriores, CitectSCADA v7.20 y anteriores, y PowerLogic SCADA v7.20 y anteriores, permite a atacantes remotos leer ficheros, enviar peticiones HTTP a servidores intranet, o causar una denegaci\u00f3n del servicio (consumo de CPU y memoria) a trav\u00e9s de fichero XML que contiene una declaraci\u00f3n de entidad externa, junto con una referencia de entidad, en relaci\u00f3n con un fallo en XML External Entity (XXE).\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:M/Au:N/C:C/I:C/A:C\",\"baseScore\":6.9,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.4,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-264\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:schneider-electric:citectscada:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"7.20\",\"matchCriteriaId\":\"3F38EF72-DCCB-47DE-AF76-73A78D9F069A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:schneider-electric:citectscada:7.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E87F308E-8874-40CD-BB46-9CD955AEE26E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:schneider-electric:powerlogic_scada:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"7.20\",\"matchCriteriaId\":\"692487FE-D5CC-4289-8C4B-26C30C12BB08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:schneider-electric:powerlogic_scada:7.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"227FA3FF-F09B-4891-9B90-37563E1A579C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:schneider-electric:vijeo_citect:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"7.20\",\"matchCriteriaId\":\"261173CE-D744-4427-ABCB-AD9BA9CCCF25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:schneider-electric:vijeo_citect:7.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"281F678E-1B21-4EFD-A9F6-016FCECF1DA0\"}]}]}],\"references\":[{\"url\":\"http://ics-cert.us-cert.gov/advisories/ICSA-13-217-02\",\"source\":\"ics-cert@hq.dhs.gov\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.citect.schneider-electric.com/cs-HF720SP459363\",\"source\":\"ics-cert@hq.dhs.gov\",\"tags\":[\"Patch\"]},{\"url\":\"http://ics-cert.us-cert.gov/advisories/ICSA-13-217-02\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.citect.schneider-electric.com/cs-HF720SP459363\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]}],\"evaluatorComment\":\"Per: http://ics-cert.us-cert.gov/advisories/ICSA-13-217-02\\n\\n\\\"This vulnerability is not exploitable remotely.\\\"\"}}"
}
}
GHSA-FXQP-5CFQ-QJ7Q
Vulnerability from github – Published: 2022-05-17 05:06 – Updated: 2022-05-17 05:06Schneider Electric Vijeo Citect 7.20 and earlier, CitectSCADA 7.20 and earlier, and PowerLogic SCADA 7.20 and earlier allow remote attackers to read arbitrary files, send HTTP requests to intranet servers, or cause a denial of service (CPU and memory consumption) via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
{
"affected": [],
"aliases": [
"CVE-2013-2796"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2013-08-09T23:55:00Z",
"severity": "MODERATE"
},
"details": "Schneider Electric Vijeo Citect 7.20 and earlier, CitectSCADA 7.20 and earlier, and PowerLogic SCADA 7.20 and earlier allow remote attackers to read arbitrary files, send HTTP requests to intranet servers, or cause a denial of service (CPU and memory consumption) via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.",
"id": "GHSA-fxqp-5cfq-qj7q",
"modified": "2022-05-17T05:06:53Z",
"published": "2022-05-17T05:06:53Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2796"
},
{
"type": "WEB",
"url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-217-02"
},
{
"type": "WEB",
"url": "http://www.citect.schneider-electric.com/cs-HF720SP459363"
}
],
"schema_version": "1.4.0",
"severity": []
}
BDU:2019-03752
Vulnerability from fstec - Published: 05.08.2019{
"CVSS 2.0": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"CVSS 3.0": "AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Schneider Electric",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "\u0434\u043e 7.20 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Citect SCADA), \u0434\u043e 7.20 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Vijeo Citect), \u0434\u043e 7.20 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (PowerLogic SCADA)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0434\u043e \u0430\u043a\u0442\u0443\u0430\u043b\u044c\u043d\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "05.08.2019",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "29.10.2019",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "29.10.2019",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2019-03752",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2013-2796",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0430\u0440\u0445\u0438\u0442\u0435\u043a\u0442\u0443\u0440\u044b",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Citect SCADA, Vijeo Citect, PowerLogic SCADA",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": null,
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0441\u0438\u0441\u0442\u0435\u043c \u0434\u043b\u044f \u0441\u0431\u043e\u0440\u0430 \u0434\u0430\u043d\u043d\u044b\u0445 \u0438 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044f \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0432 \u043f\u0440\u043e\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u043e\u0439 \u0430\u0432\u0442\u043e\u043c\u0430\u0442\u0438\u0437\u0430\u0446\u0438\u0438 Vijeo Citect, CitectSCADA \u0438 PowerLogic SCADA, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u0430\u043c\u0438 \u0440\u0430\u0437\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u043c \u0444\u0443\u043d\u043a\u0446\u0438\u044f\u043c, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0447\u0438\u0442\u0430\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0435 \u0444\u0430\u0439\u043b\u044b, \u043e\u0442\u043f\u0440\u0430\u0432\u043b\u044f\u0442\u044c HTTP-\u0437\u0430\u043f\u0440\u043e\u0441\u044b \u0438\u043b\u0438 \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0420\u0430\u0437\u0440\u0435\u0448\u0435\u043d\u0438\u044f, \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438 \u0438 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u043e\u043c (CWE-264)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0441\u0438\u0441\u0442\u0435\u043c \u0434\u043b\u044f \u0441\u0431\u043e\u0440\u0430 \u0434\u0430\u043d\u043d\u044b\u0445 \u0438 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044f \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0432 \u043f\u0440\u043e\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u043e\u0439 \u0430\u0432\u0442\u043e\u043c\u0430\u0442\u0438\u0437\u0430\u0446\u0438\u0438 Vijeo Citect, CitectSCADA \u0438 PowerLogic SCADA \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u0430\u043c\u0438 \u0440\u0430\u0437\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u043c \u0444\u0443\u043d\u043a\u0446\u0438\u044f\u043c. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0447\u0438\u0442\u0430\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0435 \u0444\u0430\u0439\u043b\u044b, \u043e\u0442\u043f\u0440\u0430\u0432\u043b\u044f\u0442\u044c HTTP-\u0437\u0430\u043f\u0440\u043e\u0441\u044b \u0438\u043b\u0438 \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438 \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u0444\u043e\u0440\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0433\u043e XML-\u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0430",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u0417\u043b\u043e\u0443\u043f\u043e\u0442\u0440\u0435\u0431\u043b\u0435\u043d\u0438\u0435 \u0444\u0443\u043d\u043a\u0446\u0438\u043e\u043d\u0430\u043b\u043e\u043c",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://www.us-cert.gov/ics/advisories/ICSA-13-217-02\n\nhttps://nvd.nist.gov/vuln/detail/CVE-2013-2796\nhttps://cxsecurity.com/cveshow/CVE-2013-2796",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041f\u041e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430 \u0410\u0421\u0423 \u0422\u041f, \u0421\u0440\u0435\u0434\u0441\u0442\u0432\u043e \u0410\u0421\u0423 \u0422\u041f, \u041f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e \u0410\u0421\u0423 \u0422\u041f",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-264",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,9)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 8,4)"
}
ICSA-13-217-02
Vulnerability from csaf_cisa - Published: 2013-05-08 06:00 - Updated: 2025-06-06 18:39{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "general",
"text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov",
"title": "CISA Disclaimer"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the risk of exploitation.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolating them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs). Recognize VPNs may have vulnerabilities, should be updated to the most recent version available, and are only as secure as the connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also recommends users take the following measures to protect themselves from social engineering attacks: Do not click web links or open attachments in unsolicited email messages. Refer to Recognizing and Avoiding Email Scams for more information on avoiding email scams. Refer to Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "ICS Advisory ICSA-13-217-02 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2013/icsa-13-217-02.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-13-217-02 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-13-217-02"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/sites/default/files/publications/emailscams0905.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ncas/tips/ST04-014"
}
],
"title": "Schneider Electric Vijeo Citect, CitectSCADA, PowerLogic SCADA Vulnerability",
"tracking": {
"current_release_date": "2025-06-06T18:39:09.378557Z",
"generator": {
"date": "2025-06-06T18:39:09.378529Z",
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-13-217-02",
"initial_release_date": "2013-05-08T06:00:00.000000Z",
"revision_history": [
{
"date": "2013-05-08T06:00:00.000000Z",
"legacy_version": "Initial",
"number": "1",
"summary": "Initial Publication"
},
{
"date": "2025-06-06T18:39:09.378557Z",
"legacy_version": "CSAF Conversion",
"number": "2",
"summary": "Advisory converted into a CSAF"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=7.20",
"product": {
"name": "Schneider Electric Vijeo Citect: \u003c=7.20",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "Vijeo Citect"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=7.20",
"product": {
"name": "Schneider Electric CitectSCADA: \u003c=7.20",
"product_id": "CSAFPID-0002"
}
}
],
"category": "product_name",
"name": "CitectSCADA"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=7.20",
"product": {
"name": "Schneider Electric PowerLogic SCADA: \u003c=7.20",
"product_id": "CSAFPID-0003"
}
}
],
"category": "product_name",
"name": "PowerLogic SCADA"
}
],
"category": "vendor",
"name": "Schneider Electric"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2013-2796",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"notes": [
{
"category": "summary",
"text": "Schneider Electric Vijeo Citect 7.20 and earlier, CitectSCADA 7.20 and earlier, and PowerLogic SCADA 7.20 and earlier allow remote attackers to read arbitrary files, send HTTP requests to intranet servers, or cause a denial of service (CPU and memory consumption) via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Schneider Electric has developed patches for Versions 7.10 and 7.20 of each of the affected products. Users of older products should upgrade to a newer, supported version. Vijeo Citect or CitectSCADA customers can download patches for this vulnerability at the links indicated below: Version 7.20 of Vijeo Citect: (http://www.citect.schneider-electric.com/vjc-HF720SP459363), Version 7.10 of Vijeo Citect: (http://www.citect.schneider-electric.com/vjc-HF710SP459437), Version 7.20 of CitectSCADA: (http://www.citect.schneider-electric.com/cs-HF720SP459363), Version 7.10 of CitectSCADA: (http://www.citect.schneider-electric.com/cs-HF710SP459437)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "http://www.citect.schneider-electric.com/vjc-HF720SP459363"
},
{
"category": "mitigation",
"details": "Schneider Electric has developed patches for Versions 7.10 and 7.20 of each of the affected products. Users of older products should upgrade to a newer, supported version. Vijeo Citect or CitectSCADA customers can download patches for this vulnerability at the links indicated below: Version 7.20 of Vijeo Citect: (http://www.citect.schneider-electric.com/vjc-HF720SP459363), Version 7.10 of Vijeo Citect: (http://www.citect.schneider-electric.com/vjc-HF710SP459437), Version 7.20 of CitectSCADA: (http://www.citect.schneider-electric.com/cs-HF720SP459363), Version 7.10 of CitectSCADA: (http://www.citect.schneider-electric.com/cs-HF710SP459437)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "http://www.citect.schneider-electric.com/vjc-HF710SP459437"
},
{
"category": "mitigation",
"details": "Schneider Electric has developed patches for Versions 7.10 and 7.20 of each of the affected products. Users of older products should upgrade to a newer, supported version. Vijeo Citect or CitectSCADA customers can download patches for this vulnerability at the links indicated below: Version 7.20 of Vijeo Citect: (http://www.citect.schneider-electric.com/vjc-HF720SP459363), Version 7.10 of Vijeo Citect: (http://www.citect.schneider-electric.com/vjc-HF710SP459437), Version 7.20 of CitectSCADA: (http://www.citect.schneider-electric.com/cs-HF720SP459363), Version 7.10 of CitectSCADA: (http://www.citect.schneider-electric.com/cs-HF710SP459437)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "http://www.citect.schneider-electric.com/cs-HF720SP459363"
},
{
"category": "mitigation",
"details": "Schneider Electric has developed patches for Versions 7.10 and 7.20 of each of the affected products. Users of older products should upgrade to a newer, supported version. Vijeo Citect or CitectSCADA customers can download patches for this vulnerability at the links indicated below: Version 7.20 of Vijeo Citect: (http://www.citect.schneider-electric.com/vjc-HF720SP459363), Version 7.10 of Vijeo Citect: (http://www.citect.schneider-electric.com/vjc-HF710SP459437), Version 7.20 of CitectSCADA: (http://www.citect.schneider-electric.com/cs-HF720SP459363), Version 7.10 of CitectSCADA: (http://www.citect.schneider-electric.com/cs-HF710SP459437)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "http://www.citect.schneider-electric.com/cs-HF710SP459437"
},
{
"category": "mitigation",
"details": "PowerLogic SCADA customers can download patches for this vulnerability at the links indicated below: Version 7.20 of Power Logic SCADA Service Release 1: (https://schneider-electric.box.com/pls720sr1), Version 7.10 of Power Logic SCADA Service Release 4: (https://schneiderelectric.box.com/pls710sr4)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://schneider-electric.box.com/pls720sr1"
},
{
"category": "mitigation",
"details": "PowerLogic SCADA customers can download patches for this vulnerability at the links indicated below: Version 7.20 of Power Logic SCADA Service Release 1: (https://schneider-electric.box.com/pls720sr1), Version 7.10 of Power Logic SCADA Service Release 4: (https://schneiderelectric.box.com/pls710sr4)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://schneiderelectric.box.com/pls710sr4"
},
{
"category": "mitigation",
"details": "Schneider Electric recommends that customers contact a support center: Vijeo Citect \u0026 CitectSCADA customers please contact the SCADA \u0026 MES Software Global Support Center located here: (http://www.citect.schneider-electric.com/contact-support), PowerLogic SCADA customers please contact your local country support organization at: (http://www.schneider-electric.com/sites/corporate/en/support/operations/local-operations/local-operations.page).",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "http://www.citect.schneider-electric.com/contact-support"
},
{
"category": "mitigation",
"details": "Schneider Electric recommends that customers contact a support center: Vijeo Citect \u0026 CitectSCADA customers please contact the SCADA \u0026 MES Software Global Support Center located here: (http://www.citect.schneider-electric.com/contact-support), PowerLogic SCADA customers please contact your local country support organization at: (http://www.schneider-electric.com/sites/corporate/en/support/operations/local-operations/local-operations.page).",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "http://www.schneider-electric.com/sites/corporate/en/support/operations/local-operations/local-operations.page"
}
],
"scores": [
{
"cvss_v2": {
"baseScore": 6.9,
"vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
]
}
]
}
VAR-201308-0167
Vulnerability from variot - Updated: 2025-04-11 23:14Schneider Electric Vijeo Citect 7.20 and earlier, CitectSCADA 7.20 and earlier, and PowerLogic SCADA 7.20 and earlier allow remote attackers to read arbitrary files, send HTTP requests to intranet servers, or cause a denial of service (CPU and memory consumption) via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue. Schneider Electric provides total solutions for the energy and infrastructure, industrial, data center and network, building and residential markets in more than 100 countries. Multiple Schneider Electric products have security vulnerabilities that allow attackers to exploit vulnerabilities to obtain sensitive information or to perform denial of service attacks. Vulnerability-related errors with XML external entity references allow an attacker to submit specially crafted XML data that specifically references external resources, obtain sensitive information from local resources, or perform denial of service attacks. A remote attacker can exploit a vulnerability to gain sensitive information or perform a denial of service attack. Multiple Schneider Electric products are prone to an information-disclosure vulnerability. The following products are affected: Vijeo Citect 7.20 and prior CitectSCADA 7.20 and prior PowerLogic SCADA 7.20 and prior. Schneider Electric Vijeo Citect, CitectSCADA, and PowerLogic SCADA are software from Schneider Electric, France, that provide monitoring and control functions in supervisory control and data acquisition systems (SCADA)
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201308-0167",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "citectscada",
"scope": "lte",
"trust": 1.8,
"vendor": "schneider electric",
"version": "7.20"
},
{
"model": "powerlogic scada",
"scope": "lte",
"trust": 1.8,
"vendor": "schneider electric",
"version": "7.20"
},
{
"model": "vijeo citect",
"scope": "lte",
"trust": 1.8,
"vendor": "schneider electric",
"version": "7.20"
},
{
"model": "powerlogic scada",
"scope": "eq",
"trust": 1.6,
"vendor": "schneider electric",
"version": "7.10"
},
{
"model": "vijeo citect",
"scope": "eq",
"trust": 1.6,
"vendor": "schneider electric",
"version": "7.10"
},
{
"model": "citectscada",
"scope": "eq",
"trust": 1.6,
"vendor": "schneider electric",
"version": "7.10"
},
{
"model": "electric vijeo citect",
"scope": "eq",
"trust": 0.9,
"vendor": "schneider",
"version": "7.20"
},
{
"model": "electric citectscada",
"scope": "eq",
"trust": 0.6,
"vendor": "schneider",
"version": "7.20"
},
{
"model": "electric powerlogic scada",
"scope": "eq",
"trust": 0.6,
"vendor": "schneider",
"version": "7.20"
},
{
"model": "powerlogic scada",
"scope": "eq",
"trust": 0.6,
"vendor": "schneider electric",
"version": "7.20"
},
{
"model": "vijeo citect",
"scope": "eq",
"trust": 0.6,
"vendor": "schneider electric",
"version": "7.20"
},
{
"model": "citectscada",
"scope": "eq",
"trust": 0.6,
"vendor": "schneider electric",
"version": "7.20"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "citectscada",
"version": "7.10"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "citectscada",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "powerlogic scada",
"version": "7.10"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "powerlogic scada",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "vijeo citect",
"version": "7.10"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "vijeo citect",
"version": "*"
}
],
"sources": [
{
"db": "IVD",
"id": "c95a4b10-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-11763"
},
{
"db": "BID",
"id": "61598"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003715"
},
{
"db": "CNNVD",
"id": "CNNVD-201308-141"
},
{
"db": "NVD",
"id": "CVE-2013-2796"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:schneider_electric:citectscada",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:schneider_electric:powerlogic_scada",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:schneider_electric:vijeo_citect",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2013-003715"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Timur Yunusov, Alexey Osipov and Ilya Karpov of Positive Technologies",
"sources": [
{
"db": "BID",
"id": "61598"
}
],
"trust": 0.3
},
"cve": "CVE-2013-2796",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 6.9,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.4,
"id": "CVE-2013-2796",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 6.9,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.4,
"id": "CNVD-2013-11763",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "COMPLETE",
"baseScore": 6.9,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.4,
"id": "c95a4b10-2352-11e6-abef-000c29c66e3d",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 6.9,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.4,
"id": "VHN-62798",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:L/AC:M/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2013-2796",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2013-2796",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNVD",
"id": "CNVD-2013-11763",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201308-141",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "IVD",
"id": "c95a4b10-2352-11e6-abef-000c29c66e3d",
"trust": 0.2,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-62798",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "c95a4b10-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-11763"
},
{
"db": "VULHUB",
"id": "VHN-62798"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003715"
},
{
"db": "CNNVD",
"id": "CNNVD-201308-141"
},
{
"db": "NVD",
"id": "CVE-2013-2796"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Schneider Electric Vijeo Citect 7.20 and earlier, CitectSCADA 7.20 and earlier, and PowerLogic SCADA 7.20 and earlier allow remote attackers to read arbitrary files, send HTTP requests to intranet servers, or cause a denial of service (CPU and memory consumption) via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue. Schneider Electric provides total solutions for the energy and infrastructure, industrial, data center and network, building and residential markets in more than 100 countries. Multiple Schneider Electric products have security vulnerabilities that allow attackers to exploit vulnerabilities to obtain sensitive information or to perform denial of service attacks. Vulnerability-related errors with XML external entity references allow an attacker to submit specially crafted XML data that specifically references external resources, obtain sensitive information from local resources, or perform denial of service attacks. A remote attacker can exploit a vulnerability to gain sensitive information or perform a denial of service attack. Multiple Schneider Electric products are prone to an information-disclosure vulnerability. \nThe following products are affected:\nVijeo Citect 7.20 and prior\nCitectSCADA 7.20 and prior\nPowerLogic SCADA 7.20 and prior. Schneider Electric Vijeo Citect, CitectSCADA, and PowerLogic SCADA are software from Schneider Electric, France, that provide monitoring and control functions in supervisory control and data acquisition systems (SCADA)",
"sources": [
{
"db": "NVD",
"id": "CVE-2013-2796"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003715"
},
{
"db": "CNVD",
"id": "CNVD-2013-11763"
},
{
"db": "BID",
"id": "61598"
},
{
"db": "IVD",
"id": "c95a4b10-2352-11e6-abef-000c29c66e3d"
},
{
"db": "VULHUB",
"id": "VHN-62798"
}
],
"trust": 2.7
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2013-2796",
"trust": 3.6
},
{
"db": "ICS CERT",
"id": "ICSA-13-217-02",
"trust": 2.8
},
{
"db": "BID",
"id": "61598",
"trust": 1.0
},
{
"db": "CNNVD",
"id": "CNNVD-201308-141",
"trust": 0.9
},
{
"db": "SCHNEIDER",
"id": "SEVD-2013-197-01",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2013-11763",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003715",
"trust": 0.8
},
{
"db": "SECUNIA",
"id": "54422",
"trust": 0.6
},
{
"db": "IVD",
"id": "C95A4B10-2352-11E6-ABEF-000C29C66E3D",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-62798",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "c95a4b10-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-11763"
},
{
"db": "VULHUB",
"id": "VHN-62798"
},
{
"db": "BID",
"id": "61598"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003715"
},
{
"db": "CNNVD",
"id": "CNNVD-201308-141"
},
{
"db": "NVD",
"id": "CVE-2013-2796"
}
]
},
"id": "VAR-201308-0167",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "c95a4b10-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-11763"
},
{
"db": "VULHUB",
"id": "VHN-62798"
}
],
"trust": 1.6718864420000001
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "c95a4b10-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-11763"
}
]
},
"last_update_date": "2025-04-11T23:14:42.480000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Top Page",
"trust": 0.8,
"url": "http://www.schneider-electric.com/site/home/index.cfm/uk/"
},
{
"title": "Patch Information - cs-HF720SP459363",
"trust": 0.8,
"url": "http://www.citect.schneider-electric.com/cs-HF720SP459363"
},
{
"title": "\u30b5\u30dd\u30fc\u30c8",
"trust": 0.8,
"url": "http://www.schneider-electric.co.jp/sites/japan/jp/support/contact/we-care.page"
},
{
"title": "\u30c8\u30c3\u30d7\u30da\u30fc\u30b8",
"trust": 0.8,
"url": "http://www.schneider-electric.com/site/home/index.cfm/jp/"
},
{
"title": "Schneider Electric patch for multiple product XML external entity vulnerabilities",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/38074"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-11763"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003715"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-264",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-62798"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003715"
},
{
"db": "NVD",
"id": "CVE-2013-2796"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.8,
"url": "http://ics-cert.us-cert.gov/advisories/icsa-13-217-02"
},
{
"trust": 1.7,
"url": "http://www.citect.schneider-electric.com/cs-hf720sp459363"
},
{
"trust": 0.9,
"url": "http://www.schneider-electric.com/download/ww/en/details/125349410-vulnerability-disclosure---citectscada-vijeo-citect-powerlogic-scada/?reference=sevd-2013-197-01"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-2796"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-2796"
},
{
"trust": 0.6,
"url": "http://download.schneider-electric.com/files?p_file_id=125349417\u0026p_file_name=sevd-2013-197-01.pdf"
},
{
"trust": 0.6,
"url": "http://www2.schneider-electric.com/sites/corporate/en/support/cybersecurity/viewer-news.page?c_filepath=/templatedata/content/news/data/en/local/cybersecurity/general_information/2013/07/20130716_advisory_of_vulnerability_affecting_vijeo_citect_citect_scada_and_powe.xml"
},
{
"trust": 0.6,
"url": "http://www.secunia.com/advisories/54422/"
},
{
"trust": 0.3,
"url": "http://www2.schneider-electric.com/sites/corporate/en/support/cybersecurity/viewer-news.page?c_filepath=/templatedata/content/news/data/en/local/cybersecurity/general_information/2013/07/20130716_advi"
},
{
"trust": 0.3,
"url": "http://www.schneider-electric.com/site/home/index.cfm/ww/?selectcountry=true"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-11763"
},
{
"db": "VULHUB",
"id": "VHN-62798"
},
{
"db": "BID",
"id": "61598"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003715"
},
{
"db": "CNNVD",
"id": "CNNVD-201308-141"
},
{
"db": "NVD",
"id": "CVE-2013-2796"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "c95a4b10-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-11763"
},
{
"db": "VULHUB",
"id": "VHN-62798"
},
{
"db": "BID",
"id": "61598"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003715"
},
{
"db": "CNNVD",
"id": "CNNVD-201308-141"
},
{
"db": "NVD",
"id": "CVE-2013-2796"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2013-08-08T00:00:00",
"db": "IVD",
"id": "c95a4b10-2352-11e6-abef-000c29c66e3d"
},
{
"date": "2013-08-08T00:00:00",
"db": "CNVD",
"id": "CNVD-2013-11763"
},
{
"date": "2013-08-09T00:00:00",
"db": "VULHUB",
"id": "VHN-62798"
},
{
"date": "2013-07-16T00:00:00",
"db": "BID",
"id": "61598"
},
{
"date": "2013-08-13T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2013-003715"
},
{
"date": "2013-08-23T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201308-141"
},
{
"date": "2013-08-09T23:55:02.537000",
"db": "NVD",
"id": "CVE-2013-2796"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2013-08-08T00:00:00",
"db": "CNVD",
"id": "CNVD-2013-11763"
},
{
"date": "2013-08-12T00:00:00",
"db": "VULHUB",
"id": "VHN-62798"
},
{
"date": "2015-03-19T08:09:00",
"db": "BID",
"id": "61598"
},
{
"date": "2013-08-13T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2013-003715"
},
{
"date": "2013-08-28T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201308-141"
},
{
"date": "2025-04-11T00:51:21.963000",
"db": "NVD",
"id": "CVE-2013-2796"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "BID",
"id": "61598"
},
{
"db": "CNNVD",
"id": "CNNVD-201308-141"
}
],
"trust": 0.9
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Schneider Electric Vulnerability to read arbitrary files in the product",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2013-003715"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "permissions and access control",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201308-141"
}
],
"trust": 0.6
}
}
FKIE_CVE-2013-2796
Vulnerability from fkie_nvd - Published: 2013-08-09 23:55 - Updated: 2025-04-11 00:51| URL | Tags | ||
|---|---|---|---|
| ics-cert@hq.dhs.gov | http://ics-cert.us-cert.gov/advisories/ICSA-13-217-02 | US Government Resource | |
| ics-cert@hq.dhs.gov | http://www.citect.schneider-electric.com/cs-HF720SP459363 | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | http://ics-cert.us-cert.gov/advisories/ICSA-13-217-02 | US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.citect.schneider-electric.com/cs-HF720SP459363 | Patch |
| Vendor | Product | Version | |
|---|---|---|---|
| schneider-electric | citectscada | * | |
| schneider-electric | citectscada | 7.10 | |
| schneider-electric | powerlogic_scada | * | |
| schneider-electric | powerlogic_scada | 7.10 | |
| schneider-electric | vijeo_citect | * | |
| schneider-electric | vijeo_citect | 7.10 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:schneider-electric:citectscada:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3F38EF72-DCCB-47DE-AF76-73A78D9F069A",
"versionEndIncluding": "7.20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:schneider-electric:citectscada:7.10:*:*:*:*:*:*:*",
"matchCriteriaId": "E87F308E-8874-40CD-BB46-9CD955AEE26E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:schneider-electric:powerlogic_scada:*:*:*:*:*:*:*:*",
"matchCriteriaId": "692487FE-D5CC-4289-8C4B-26C30C12BB08",
"versionEndIncluding": "7.20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:schneider-electric:powerlogic_scada:7.10:*:*:*:*:*:*:*",
"matchCriteriaId": "227FA3FF-F09B-4891-9B90-37563E1A579C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:schneider-electric:vijeo_citect:*:*:*:*:*:*:*:*",
"matchCriteriaId": "261173CE-D744-4427-ABCB-AD9BA9CCCF25",
"versionEndIncluding": "7.20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:schneider-electric:vijeo_citect:7.10:*:*:*:*:*:*:*",
"matchCriteriaId": "281F678E-1B21-4EFD-A9F6-016FCECF1DA0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Schneider Electric Vijeo Citect 7.20 and earlier, CitectSCADA 7.20 and earlier, and PowerLogic SCADA 7.20 and earlier allow remote attackers to read arbitrary files, send HTTP requests to intranet servers, or cause a denial of service (CPU and memory consumption) via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue."
},
{
"lang": "es",
"value": "Schneider Electric Vijeo Citect v7.20 y anteriores, CitectSCADA v7.20 y anteriores, y PowerLogic SCADA v7.20 y anteriores, permite a atacantes remotos leer ficheros, enviar peticiones HTTP a servidores intranet, o causar una denegaci\u00f3n del servicio (consumo de CPU y memoria) a trav\u00e9s de fichero XML que contiene una declaraci\u00f3n de entidad externa, junto con una referencia de entidad, en relaci\u00f3n con un fallo en XML External Entity (XXE)."
}
],
"evaluatorComment": "Per: http://ics-cert.us-cert.gov/advisories/ICSA-13-217-02\n\n\"This vulnerability is not exploitable remotely.\"",
"id": "CVE-2013-2796",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.9,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.4,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2013-08-09T23:55:02.537",
"references": [
{
"source": "ics-cert@hq.dhs.gov",
"tags": [
"US Government Resource"
],
"url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-217-02"
},
{
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Patch"
],
"url": "http://www.citect.schneider-electric.com/cs-HF720SP459363"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
],
"url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-217-02"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.citect.schneider-electric.com/cs-HF720SP459363"
}
],
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-264"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GSD-2013-2796
Vulnerability from gsd - Updated: 2023-12-13 01:22{
"GSD": {
"alias": "CVE-2013-2796",
"description": "Schneider Electric Vijeo Citect 7.20 and earlier, CitectSCADA 7.20 and earlier, and PowerLogic SCADA 7.20 and earlier allow remote attackers to read arbitrary files, send HTTP requests to intranet servers, or cause a denial of service (CPU and memory consumption) via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.",
"id": "GSD-2013-2796"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2013-2796"
],
"details": "Schneider Electric Vijeo Citect 7.20 and earlier, CitectSCADA 7.20 and earlier, and PowerLogic SCADA 7.20 and earlier allow remote attackers to read arbitrary files, send HTTP requests to intranet servers, or cause a denial of service (CPU and memory consumption) via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.",
"id": "GSD-2013-2796",
"modified": "2023-12-13T01:22:17.962586Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2013-2796",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Schneider Electric Vijeo Citect 7.20 and earlier, CitectSCADA 7.20 and earlier, and PowerLogic SCADA 7.20 and earlier allow remote attackers to read arbitrary files, send HTTP requests to intranet servers, or cause a denial of service (CPU and memory consumption) via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.citect.schneider-electric.com/cs-HF720SP459363",
"refsource": "CONFIRM",
"url": "http://www.citect.schneider-electric.com/cs-HF720SP459363"
},
{
"name": "http://ics-cert.us-cert.gov/advisories/ICSA-13-217-02",
"refsource": "MISC",
"url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-217-02"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:schneider-electric:powerlogic_scada:7.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:schneider-electric:vijeo_citect:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "7.20",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:schneider-electric:vijeo_citect:7.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:schneider-electric:citectscada:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "7.20",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:schneider-electric:powerlogic_scada:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "7.20",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:schneider-electric:citectscada:7.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2013-2796"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Schneider Electric Vijeo Citect 7.20 and earlier, CitectSCADA 7.20 and earlier, and PowerLogic SCADA 7.20 and earlier allow remote attackers to read arbitrary files, send HTTP requests to intranet servers, or cause a denial of service (CPU and memory consumption) via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-264"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://ics-cert.us-cert.gov/advisories/ICSA-13-217-02",
"refsource": "MISC",
"tags": [
"US Government Resource"
],
"url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-217-02"
},
{
"name": "http://www.citect.schneider-electric.com/cs-HF720SP459363",
"refsource": "CONFIRM",
"tags": [
"Patch"
],
"url": "http://www.citect.schneider-electric.com/cs-HF720SP459363"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.9,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.4,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2013-08-12T20:21Z",
"publishedDate": "2013-08-09T23:55Z"
}
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.