CVE-2018-7236 (GCVE-0-2018-7236)
Vulnerability from cvelistv5 – Published: 2018-03-09 23:00 – Updated: 2024-09-16 20:22
VLAI?
Summary
A vulnerability exists in Schneider Electric's Pelco Sarix Professional in all firmware versions prior to 3.29.67 which could enable SSH service due to lack of authentication for /login/bin/set_param could enable SSH service.
Severity ?
No CVSS data available.
CWE
- Authentication Bypass
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Schneider Electric SE | Pelco Sarix Professional |
Affected:
all firmware versions prior to 3.29.76
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T06:24:11.816Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.schneider-electric.com/en/download/document/SEVD-2018-058-01/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Pelco Sarix Professional",
"vendor": "Schneider Electric SE",
"versions": [
{
"status": "affected",
"version": "all firmware versions prior to 3.29.76"
}
]
}
],
"datePublic": "2018-03-01T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability exists in Schneider Electric\u0027s Pelco Sarix Professional in all firmware versions prior to 3.29.67 which could enable SSH service due to lack of authentication for /login/bin/set_param could enable SSH service."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Authentication Bypass",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-03-09T22:57:01",
"orgId": "076d1eb6-cfab-4401-b34d-6dfc2a413bdb",
"shortName": "schneider"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.schneider-electric.com/en/download/document/SEVD-2018-058-01/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cybersecurity@schneider-electric.com",
"DATE_PUBLIC": "2018-03-01T00:00:00",
"ID": "CVE-2018-7236",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Pelco Sarix Professional",
"version": {
"version_data": [
{
"version_value": "all firmware versions prior to 3.29.76"
}
]
}
}
]
},
"vendor_name": "Schneider Electric SE"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability exists in Schneider Electric\u0027s Pelco Sarix Professional in all firmware versions prior to 3.29.67 which could enable SSH service due to lack of authentication for /login/bin/set_param could enable SSH service."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Authentication Bypass"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.schneider-electric.com/en/download/document/SEVD-2018-058-01/",
"refsource": "CONFIRM",
"url": "https://www.schneider-electric.com/en/download/document/SEVD-2018-058-01/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "076d1eb6-cfab-4401-b34d-6dfc2a413bdb",
"assignerShortName": "schneider",
"cveId": "CVE-2018-7236",
"datePublished": "2018-03-09T23:00:00Z",
"dateReserved": "2018-02-19T00:00:00",
"dateUpdated": "2024-09-16T20:22:19.073Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2018-7236\",\"sourceIdentifier\":\"cybersecurity@se.com\",\"published\":\"2018-03-09T23:29:00.810\",\"lastModified\":\"2024-11-21T04:11:50.863\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability exists in Schneider Electric\u0027s Pelco Sarix Professional in all firmware versions prior to 3.29.67 which could enable SSH service due to lack of authentication for /login/bin/set_param could enable SSH service.\"},{\"lang\":\"es\",\"value\":\"Existe una vulnerabilidad en Pelco Sarix Professional de Schneider Electric en todas las versiones de firmware anteriores a la 3.29.67 que podr\u00eda habilitar el servicio SSH debido a la falta de autenticaci\u00f3n de /login/bin/set_param.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N\",\"baseScore\":8.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":5.2}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:N\",\"baseScore\":5.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-287\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:mps110-1_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.29.67\",\"matchCriteriaId\":\"E3EF4EC2-D25E-4EC1-8426-57FE421671CB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:mps110-1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"778C6B7B-4762-4FAA-820A-FBC8F908E1F9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:imps110-1er_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.29.67\",\"matchCriteriaId\":\"0665DC91-BE7B-422C-8669-0F954D125555\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:imps110-1er:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D366FB62-6A7A-4BD6-BDA4-11931C4EFD81\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:ibps110-1er_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.29.67\",\"matchCriteriaId\":\"E8755385-CDAD-48BB-9833-142598406FA1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:ibps110-1er:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DCEC508-8056-4655-95D6-8FD81FA83B53\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:imp1110-1_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.29.67\",\"matchCriteriaId\":\"2BD2C651-6BF4-4A5E-9006-B6683E0FB3F3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:imp1110-1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8585A047-D4D5-4EE9-A839-827D50F28E6F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:imp1110-1e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.29.67\",\"matchCriteriaId\":\"55DE8E5B-B037-4DA5-A41C-1162E57183A0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:imp1110-1e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C54ECB2-48E2-4484-BDA3-3B1A2B4F64BA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:imp1110-1er_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.29.67\",\"matchCriteriaId\":\"11A4676C-101D-4E30-AE2B-473DE833415D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:imp1110-1er:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCE896FA-E8B0-43AD-B7D6-3606552A927A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:ibp1110-1er_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.29.67\",\"matchCriteriaId\":\"DAD29A69-4FAF-4F1C-90F7-75092BD34FA1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:ibp1110-1er:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43A50B71-9906-4CA8-8CCA-3ABEFE36DDF8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:imp219-1_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.29.67\",\"matchCriteriaId\":\"5E8F3C66-8C91-42DA-B3BC-7A799463420B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:imp219-1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9B0FA60-0C47-4874-BB4E-BD9C5392EE36\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:imp219-1e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.29.67\",\"matchCriteriaId\":\"A8CFD36A-AAAC-4EDA-B073-B5BA771D2F71\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:imp219-1e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C505935-2601-4858-9107-35ACCA09C5E2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:imp219-1er_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.29.67\",\"matchCriteriaId\":\"71B4BB85-B2E7-4890-B27F-D57C71E1C1DF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:imp219-1er:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83F91A7F-DB48-4431-9998-B45B04858905\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:ibp219-1er_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.29.67\",\"matchCriteriaId\":\"6228B511-D0D3-42A1-9D1B-259B1DB5C9C4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:ibp219-1er:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E4BE69D-0ED4-41E2-ACBD-F28EFE3F3678\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:imp319-1_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.29.67\",\"matchCriteriaId\":\"1D4FBCCA-2E0A-42B9-9BEA-F1AF08C5C3E7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:imp319-1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AEF2268-8C80-43DE-A26B-D76DEE72A20C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:imp319-1e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.29.67\",\"matchCriteriaId\":\"608DC472-5B55-45A6-AB2D-DC775A6903B1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:imp319-1e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"679FC4B1-2BAE-42DC-BC98-80F34DC40E57\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:ibp319-1er_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.29.67\",\"matchCriteriaId\":\"4D566BF6-12A1-4AFC-B627-C47A87704517\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:ibp319-1er:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDEA40CA-2138-46EB-AAF6-6F0997D8D9E0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:imp519-1_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.29.67\",\"matchCriteriaId\":\"53029C82-C2E9-443A-BE4E-3E6A7C774876\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:imp519-1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5457D7DC-990F-47BA-BDAF-4224B1D8367C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:imp319-1er_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.29.67\",\"matchCriteriaId\":\"C894428E-3ADA-4FE7-B4D3-AC94C297F097\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:imp319-1er:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A093D08-9339-4F5E-8DC3-7335F64B0058\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:imp519-1e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.29.67\",\"matchCriteriaId\":\"CA8D3D7B-C9E3-4F81-82EB-E5FB385B8F40\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:imp519-1e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9940495-9135-414B-9266-E8ADABDC27B5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:imp519-1er_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.29.67\",\"matchCriteriaId\":\"D6D3D3D8-B55F-473C-BB96-DAFF37434089\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:imp519-1er:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA8B8E07-5ED4-420C-A6B0-62D69BB809BB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:ibp519-1er_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.29.67\",\"matchCriteriaId\":\"AAC22F8F-58F4-43E5-B614-52DB1E67EE3F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:ibp519-1er:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D09F722A-5337-4891-A5A2-CAE3B4C562E6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:imps110-1e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.29.67\",\"matchCriteriaId\":\"ACDE10BC-5B87-4737-99BE-3BD018F2B6FF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:imps110-1e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA4F3354-111C-4C4A-88CE-8243BF9A1D26\"}]}]}],\"references\":[{\"url\":\"https://www.schneider-electric.com/en/download/document/SEVD-2018-058-01/\",\"source\":\"cybersecurity@se.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://www.schneider-electric.com/en/download/document/SEVD-2018-058-01/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…