VAR-201805-0949

Vulnerability from variot - Updated: 2024-11-23 22:38

In Schneider Electric Triconex Tricon MP model 3008 firmware versions 10.0-10.4, system calls read directly from memory addresses within the control program area without any verification. Manipulating this data could allow attacker data to be copied anywhere within memory. The Triconex Tricon 3008 is a network equipment product from Schneider Electric, France. Schneider Electric Triconex Tricon 3008 MP is prone to multiple memory corruption vulnerabilities. An attacker can exploit these issues to execute arbitrary code within the context of the affected device. Failed exploit attempts may result in a denial-of-service condition. Triconex Tricon 3008 MP Firmware versions 10.0 through 10.4 are vulnerable

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201805-0949",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "triconex tricon mp 3008",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "schneider electric",
        "version": "10.4"
      },
      {
        "model": "triconex tricon mp 3008",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "schneider electric",
        "version": "10.0"
      },
      {
        "model": "triconex tricon mp 3008",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "schneider electric",
        "version": "10.0 to  10.4"
      },
      {
        "model": "electric triconex tricon mp model",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "schneider",
        "version": "300810.0-10.4"
      },
      {
        "model": "triconex tricon mp",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "schneider electric",
        "version": "300810.4"
      },
      {
        "model": "triconex tricon mp",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "schneider electric",
        "version": "300810.0"
      },
      {
        "model": "triconex tricon mp",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "schneider electric",
        "version": "300811.2"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "triconex tricon mp 3008",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2ed3c9f-39ab-11e9-bf8a-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-08448"
      },
      {
        "db": "BID",
        "id": "103947"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-004914"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-8872"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:schneider_electric:triconex_tricon_mp_3008_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-004914"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "NCCIC and Schneider Electric",
    "sources": [
      {
        "db": "BID",
        "id": "103947"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2018-8872",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.3,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.6,
            "id": "CVE-2018-8872",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2018-08448",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "e2ed3c9f-39ab-11e9-bf8a-000c29342cb1",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.9 [IVD]"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 2.2,
            "id": "CVE-2018-8872",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.8,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2018-8872",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2018-8872",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2018-08448",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201805-175",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "IVD",
            "id": "e2ed3c9f-39ab-11e9-bf8a-000c29342cb1",
            "trust": 0.2,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2ed3c9f-39ab-11e9-bf8a-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-08448"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-004914"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201805-175"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-8872"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "In Schneider Electric Triconex Tricon MP model 3008 firmware versions 10.0-10.4, system calls read directly from memory addresses within the control program area without any verification. Manipulating this data could allow attacker data to be copied anywhere within memory. The Triconex Tricon 3008 is a network equipment product from Schneider Electric, France. Schneider Electric Triconex Tricon 3008 MP is prone to multiple memory corruption vulnerabilities. \nAn attacker can exploit these issues to execute arbitrary code within the  context of the affected device.  Failed exploit attempts may result in a  denial-of-service condition. \nTriconex Tricon 3008 MP Firmware versions 10.0 through 10.4 are vulnerable",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2018-8872"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-004914"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-08448"
      },
      {
        "db": "BID",
        "id": "103947"
      },
      {
        "db": "IVD",
        "id": "e2ed3c9f-39ab-11e9-bf8a-000c29342cb1"
      }
    ],
    "trust": 2.61
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2018-8872",
        "trust": 3.5
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-18-107-02",
        "trust": 3.3
      },
      {
        "db": "BID",
        "id": "103947",
        "trust": 1.9
      },
      {
        "db": "SCHNEIDER",
        "id": "SEVD-2017-347-01",
        "trust": 1.6
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-08448",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201805-175",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-004914",
        "trust": 0.8
      },
      {
        "db": "IVD",
        "id": "E2ED3C9F-39AB-11E9-BF8A-000C29342CB1",
        "trust": 0.2
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2ed3c9f-39ab-11e9-bf8a-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-08448"
      },
      {
        "db": "BID",
        "id": "103947"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-004914"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201805-175"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-8872"
      }
    ]
  },
  "id": "VAR-201805-0949",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "e2ed3c9f-39ab-11e9-bf8a-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-08448"
      }
    ],
    "trust": 1.8
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS",
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      },
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.2
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2ed3c9f-39ab-11e9-bf8a-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-08448"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:38:12.646000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "SEVD-2017-347-01",
        "trust": 0.8,
        "url": "https://www.schneider-electric.com/en/download/document/SEVD-2017-347-01/"
      },
      {
        "title": "SchneiderElectricTriconexTricon is not authorized to patch vulnerabilities",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/127461"
      },
      {
        "title": "Schneider Electric Triconex Tricon MP 3008 Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=79880"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2018-08448"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-004914"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201805-175"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-004914"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-8872"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.3,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-107-02"
      },
      {
        "trust": 1.6,
        "url": "https://www.schneider-electric.com/en/download/document/sevd-2017-347-01/"
      },
      {
        "trust": 1.6,
        "url": "http://www.securityfocus.com/bid/103947"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-8872"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-8872"
      },
      {
        "trust": 0.3,
        "url": "www.controlmicrosystems.com"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2018-08448"
      },
      {
        "db": "BID",
        "id": "103947"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-004914"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201805-175"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-8872"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "e2ed3c9f-39ab-11e9-bf8a-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-08448"
      },
      {
        "db": "BID",
        "id": "103947"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-004914"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201805-175"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-8872"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-04-26T00:00:00",
        "db": "IVD",
        "id": "e2ed3c9f-39ab-11e9-bf8a-000c29342cb1"
      },
      {
        "date": "2018-04-26T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2018-08448"
      },
      {
        "date": "2018-04-17T00:00:00",
        "db": "BID",
        "id": "103947"
      },
      {
        "date": "2018-06-29T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-004914"
      },
      {
        "date": "2018-05-07T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201805-175"
      },
      {
        "date": "2018-05-04T17:29:00.723000",
        "db": "NVD",
        "id": "CVE-2018-8872"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-04-26T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2018-08448"
      },
      {
        "date": "2018-04-17T00:00:00",
        "db": "BID",
        "id": "103947"
      },
      {
        "date": "2018-07-04T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-004914"
      },
      {
        "date": "2019-10-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201805-175"
      },
      {
        "date": "2024-11-21T04:14:29.880000",
        "db": "NVD",
        "id": "CVE-2018-8872"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201805-175"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Schneider Electric Triconex Tricon MP model 3008 firmware Buffer error vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-004914"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Buffer error",
    "sources": [
      {
        "db": "IVD",
        "id": "e2ed3c9f-39ab-11e9-bf8a-000c29342cb1"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201805-175"
      }
    ],
    "trust": 0.8
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…