FKIE_CVE-2018-7229

Vulnerability from fkie_nvd - Published: 2018-03-09 23:29 - Updated: 2024-11-21 04:11
Severity ?
Summary
A vulnerability exists in Schneider Electric's Pelco Sarix Professional in all firmware versions prior to 3.29.67 which could allow an unauthenticated, remote attacker to bypass authentication and gain administrator privileges because the use of hardcoded credentials.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:schneider-electric:mps110-1_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3EF4EC2-D25E-4EC1-8426-57FE421671CB",
              "versionEndExcluding": "3.29.67",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:schneider-electric:mps110-1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "778C6B7B-4762-4FAA-820A-FBC8F908E1F9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:schneider-electric:imps110-1er_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0665DC91-BE7B-422C-8669-0F954D125555",
              "versionEndExcluding": "3.29.67",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:schneider-electric:imps110-1er:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D366FB62-6A7A-4BD6-BDA4-11931C4EFD81",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:schneider-electric:ibps110-1er_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8755385-CDAD-48BB-9833-142598406FA1",
              "versionEndExcluding": "3.29.67",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:schneider-electric:ibps110-1er:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DCEC508-8056-4655-95D6-8FD81FA83B53",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:schneider-electric:imp1110-1_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BD2C651-6BF4-4A5E-9006-B6683E0FB3F3",
              "versionEndExcluding": "3.29.67",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:schneider-electric:imp1110-1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8585A047-D4D5-4EE9-A839-827D50F28E6F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:schneider-electric:imp1110-1e_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "55DE8E5B-B037-4DA5-A41C-1162E57183A0",
              "versionEndExcluding": "3.29.67",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:schneider-electric:imp1110-1e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C54ECB2-48E2-4484-BDA3-3B1A2B4F64BA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:schneider-electric:imp1110-1er_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "11A4676C-101D-4E30-AE2B-473DE833415D",
              "versionEndExcluding": "3.29.67",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:schneider-electric:imp1110-1er:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCE896FA-E8B0-43AD-B7D6-3606552A927A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:schneider-electric:ibp1110-1er_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAD29A69-4FAF-4F1C-90F7-75092BD34FA1",
              "versionEndExcluding": "3.29.67",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:schneider-electric:ibp1110-1er:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43A50B71-9906-4CA8-8CCA-3ABEFE36DDF8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:schneider-electric:imp219-1_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E8F3C66-8C91-42DA-B3BC-7A799463420B",
              "versionEndExcluding": "3.29.67",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:schneider-electric:imp219-1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9B0FA60-0C47-4874-BB4E-BD9C5392EE36",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:schneider-electric:imp219-1e_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8CFD36A-AAAC-4EDA-B073-B5BA771D2F71",
              "versionEndExcluding": "3.29.67",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:schneider-electric:imp219-1e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C505935-2601-4858-9107-35ACCA09C5E2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:schneider-electric:imp219-1er_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "71B4BB85-B2E7-4890-B27F-D57C71E1C1DF",
              "versionEndExcluding": "3.29.67",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:schneider-electric:imp219-1er:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "83F91A7F-DB48-4431-9998-B45B04858905",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:schneider-electric:ibp219-1er_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6228B511-D0D3-42A1-9D1B-259B1DB5C9C4",
              "versionEndExcluding": "3.29.67",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:schneider-electric:ibp219-1er:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E4BE69D-0ED4-41E2-ACBD-F28EFE3F3678",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:schneider-electric:imp319-1_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D4FBCCA-2E0A-42B9-9BEA-F1AF08C5C3E7",
              "versionEndExcluding": "3.29.67",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:schneider-electric:imp319-1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AEF2268-8C80-43DE-A26B-D76DEE72A20C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:schneider-electric:imp319-1e_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "608DC472-5B55-45A6-AB2D-DC775A6903B1",
              "versionEndExcluding": "3.29.67",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:schneider-electric:imp319-1e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "679FC4B1-2BAE-42DC-BC98-80F34DC40E57",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:schneider-electric:ibp319-1er_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D566BF6-12A1-4AFC-B627-C47A87704517",
              "versionEndExcluding": "3.29.67",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:schneider-electric:ibp319-1er:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDEA40CA-2138-46EB-AAF6-6F0997D8D9E0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:schneider-electric:imp519-1_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "53029C82-C2E9-443A-BE4E-3E6A7C774876",
              "versionEndExcluding": "3.29.67",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:schneider-electric:imp519-1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5457D7DC-990F-47BA-BDAF-4224B1D8367C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:schneider-electric:imp319-1er_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C894428E-3ADA-4FE7-B4D3-AC94C297F097",
              "versionEndExcluding": "3.29.67",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:schneider-electric:imp319-1er:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A093D08-9339-4F5E-8DC3-7335F64B0058",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:schneider-electric:imp519-1e_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA8D3D7B-C9E3-4F81-82EB-E5FB385B8F40",
              "versionEndExcluding": "3.29.67",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:schneider-electric:imp519-1e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9940495-9135-414B-9266-E8ADABDC27B5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:schneider-electric:imp519-1er_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6D3D3D8-B55F-473C-BB96-DAFF37434089",
              "versionEndExcluding": "3.29.67",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:schneider-electric:imp519-1er:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA8B8E07-5ED4-420C-A6B0-62D69BB809BB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:schneider-electric:ibp519-1er_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAC22F8F-58F4-43E5-B614-52DB1E67EE3F",
              "versionEndExcluding": "3.29.67",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:schneider-electric:ibp519-1er:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D09F722A-5337-4891-A5A2-CAE3B4C562E6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:schneider-electric:imps110-1e_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACDE10BC-5B87-4737-99BE-3BD018F2B6FF",
              "versionEndExcluding": "3.29.67",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:schneider-electric:imps110-1e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA4F3354-111C-4C4A-88CE-8243BF9A1D26",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability exists in Schneider Electric\u0027s Pelco Sarix Professional in all firmware versions prior to 3.29.67 which could allow an unauthenticated, remote attacker to bypass authentication and gain administrator privileges because the use of hardcoded credentials."
    },
    {
      "lang": "es",
      "value": "Existe una vulnerabilidad en Pelco Sarix Professional, de Schneider Electric en todas las versiones de firmware anteriores a la 3.29.67 que podr\u00eda permitir que un atacante remoto no autenticado omita la autenticaci\u00f3n y obtenga privilegios de administrador debido al uso de credenciales embebidas."
    }
  ],
  "id": "CVE-2018-7229",
  "lastModified": "2024-11-21T04:11:49.863",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-03-09T23:29:00.437",
  "references": [
    {
      "source": "cybersecurity@se.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.schneider-electric.com/en/download/document/SEVD-2018-058-01/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.schneider-electric.com/en/download/document/SEVD-2018-058-01/"
    }
  ],
  "sourceIdentifier": "cybersecurity@se.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-798"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…