FKIE_CVE-2018-7236
Vulnerability from fkie_nvd - Published: 2018-03-09 23:29 - Updated: 2024-11-21 04:11
Severity ?
Summary
A vulnerability exists in Schneider Electric's Pelco Sarix Professional in all firmware versions prior to 3.29.67 which could enable SSH service due to lack of authentication for /login/bin/set_param could enable SSH service.
References
| URL | Tags | ||
|---|---|---|---|
| cybersecurity@se.com | https://www.schneider-electric.com/en/download/document/SEVD-2018-058-01/ | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.schneider-electric.com/en/download/document/SEVD-2018-058-01/ | Patch, Vendor Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:mps110-1_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E3EF4EC2-D25E-4EC1-8426-57FE421671CB",
"versionEndExcluding": "3.29.67",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:mps110-1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "778C6B7B-4762-4FAA-820A-FBC8F908E1F9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:imps110-1er_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0665DC91-BE7B-422C-8669-0F954D125555",
"versionEndExcluding": "3.29.67",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:imps110-1er:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D366FB62-6A7A-4BD6-BDA4-11931C4EFD81",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:ibps110-1er_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E8755385-CDAD-48BB-9833-142598406FA1",
"versionEndExcluding": "3.29.67",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:ibps110-1er:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5DCEC508-8056-4655-95D6-8FD81FA83B53",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:imp1110-1_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2BD2C651-6BF4-4A5E-9006-B6683E0FB3F3",
"versionEndExcluding": "3.29.67",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:imp1110-1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8585A047-D4D5-4EE9-A839-827D50F28E6F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:imp1110-1e_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "55DE8E5B-B037-4DA5-A41C-1162E57183A0",
"versionEndExcluding": "3.29.67",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:imp1110-1e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0C54ECB2-48E2-4484-BDA3-3B1A2B4F64BA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:imp1110-1er_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "11A4676C-101D-4E30-AE2B-473DE833415D",
"versionEndExcluding": "3.29.67",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:imp1110-1er:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CCE896FA-E8B0-43AD-B7D6-3606552A927A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:ibp1110-1er_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DAD29A69-4FAF-4F1C-90F7-75092BD34FA1",
"versionEndExcluding": "3.29.67",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:ibp1110-1er:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43A50B71-9906-4CA8-8CCA-3ABEFE36DDF8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:imp219-1_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5E8F3C66-8C91-42DA-B3BC-7A799463420B",
"versionEndExcluding": "3.29.67",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:imp219-1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A9B0FA60-0C47-4874-BB4E-BD9C5392EE36",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:imp219-1e_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A8CFD36A-AAAC-4EDA-B073-B5BA771D2F71",
"versionEndExcluding": "3.29.67",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:imp219-1e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9C505935-2601-4858-9107-35ACCA09C5E2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:imp219-1er_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "71B4BB85-B2E7-4890-B27F-D57C71E1C1DF",
"versionEndExcluding": "3.29.67",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:imp219-1er:-:*:*:*:*:*:*:*",
"matchCriteriaId": "83F91A7F-DB48-4431-9998-B45B04858905",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:ibp219-1er_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6228B511-D0D3-42A1-9D1B-259B1DB5C9C4",
"versionEndExcluding": "3.29.67",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:ibp219-1er:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0E4BE69D-0ED4-41E2-ACBD-F28EFE3F3678",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:imp319-1_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1D4FBCCA-2E0A-42B9-9BEA-F1AF08C5C3E7",
"versionEndExcluding": "3.29.67",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:imp319-1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2AEF2268-8C80-43DE-A26B-D76DEE72A20C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:imp319-1e_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "608DC472-5B55-45A6-AB2D-DC775A6903B1",
"versionEndExcluding": "3.29.67",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:imp319-1e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "679FC4B1-2BAE-42DC-BC98-80F34DC40E57",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:ibp319-1er_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4D566BF6-12A1-4AFC-B627-C47A87704517",
"versionEndExcluding": "3.29.67",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:ibp319-1er:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EDEA40CA-2138-46EB-AAF6-6F0997D8D9E0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:imp519-1_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "53029C82-C2E9-443A-BE4E-3E6A7C774876",
"versionEndExcluding": "3.29.67",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:imp519-1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5457D7DC-990F-47BA-BDAF-4224B1D8367C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:imp319-1er_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C894428E-3ADA-4FE7-B4D3-AC94C297F097",
"versionEndExcluding": "3.29.67",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:imp319-1er:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2A093D08-9339-4F5E-8DC3-7335F64B0058",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:imp519-1e_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CA8D3D7B-C9E3-4F81-82EB-E5FB385B8F40",
"versionEndExcluding": "3.29.67",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:imp519-1e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B9940495-9135-414B-9266-E8ADABDC27B5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:imp519-1er_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D6D3D3D8-B55F-473C-BB96-DAFF37434089",
"versionEndExcluding": "3.29.67",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:imp519-1er:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AA8B8E07-5ED4-420C-A6B0-62D69BB809BB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:ibp519-1er_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AAC22F8F-58F4-43E5-B614-52DB1E67EE3F",
"versionEndExcluding": "3.29.67",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:ibp519-1er:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D09F722A-5337-4891-A5A2-CAE3B4C562E6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:imps110-1e_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "ACDE10BC-5B87-4737-99BE-3BD018F2B6FF",
"versionEndExcluding": "3.29.67",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:imps110-1e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EA4F3354-111C-4C4A-88CE-8243BF9A1D26",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability exists in Schneider Electric\u0027s Pelco Sarix Professional in all firmware versions prior to 3.29.67 which could enable SSH service due to lack of authentication for /login/bin/set_param could enable SSH service."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad en Pelco Sarix Professional de Schneider Electric en todas las versiones de firmware anteriores a la 3.29.67 que podr\u00eda habilitar el servicio SSH debido a la falta de autenticaci\u00f3n de /login/bin/set_param."
}
],
"id": "CVE-2018-7236",
"lastModified": "2024-11-21T04:11:50.863",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2018-03-09T23:29:00.810",
"references": [
{
"source": "cybersecurity@se.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://www.schneider-electric.com/en/download/document/SEVD-2018-058-01/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://www.schneider-electric.com/en/download/document/SEVD-2018-058-01/"
}
],
"sourceIdentifier": "cybersecurity@se.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-287"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…