VAR-201805-1150
Vulnerability from variot - Updated: 2024-11-23 22:38In Schneider Electric Triconex Tricon MP model 3008 firmware versions 10.0-10.4, when a system call is made, registers are stored to a fixed memory location. Modifying the data in this location could allow attackers to gain supervisor-level access and control system states. Schneider Electric Triconex Tricon MP model 3008 Firmware contains buffer error vulnerabilities and authorization / privilege / access control vulnerabilities.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The Triconex Tricon 3008 is a network equipment product from Schneider Electric, France. There are unauthorized operating vulnerabilities in SchneiderElectricTriconexTricon. Schneider Electric Triconex Tricon 3008 MP is prone to multiple memory corruption vulnerabilities. An attacker can exploit these issues to execute arbitrary code within the context of the affected device. Failed exploit attempts may result in a denial-of-service condition. Triconex Tricon 3008 MP Firmware versions 10.0 through 10.4 are vulnerable
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201805-1150",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "triconex tricon mp 3008",
"scope": "lte",
"trust": 1.0,
"vendor": "schneider electric",
"version": "10.0-10.4"
},
{
"model": "triconex tricon mp 3008",
"scope": "gte",
"trust": 1.0,
"vendor": "schneider electric",
"version": "10.0"
},
{
"model": "triconex tricon mp 3008",
"scope": "eq",
"trust": 0.8,
"vendor": "schneider electric",
"version": "10.0 to 10.4"
},
{
"model": "electric triconex tricon mp model",
"scope": "eq",
"trust": 0.6,
"vendor": "schneider",
"version": "300810.0-10.4"
},
{
"model": "triconex tricon mp",
"scope": "eq",
"trust": 0.3,
"vendor": "schneider electric",
"version": "300810.4"
},
{
"model": "triconex tricon mp",
"scope": "eq",
"trust": 0.3,
"vendor": "schneider electric",
"version": "300810.0"
},
{
"model": "triconex tricon mp",
"scope": "ne",
"trust": 0.3,
"vendor": "schneider electric",
"version": "300811.2"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "triconex tricon mp 3008",
"version": "*"
}
],
"sources": [
{
"db": "IVD",
"id": "e2ed3c9e-39ab-11e9-a0ec-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-08449"
},
{
"db": "BID",
"id": "103947"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-004889"
},
{
"db": "NVD",
"id": "CVE-2018-7522"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:schneider_electric:triconex_tricon_mp_3008_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-004889"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "NCCIC and Schneider Electric",
"sources": [
{
"db": "BID",
"id": "103947"
}
],
"trust": 0.3
},
"cve": "CVE-2018-7522",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "CVE-2018-7522",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 6.6,
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"id": "CNVD-2018-08449",
"impactScore": 9.2,
"integrityImpact": "COMPLETE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:L/AC:L/Au:N/C:N/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "COMPLETE",
"baseScore": 6.6,
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"id": "e2ed3c9e-39ab-11e9-a0ec-000c29342cb1",
"impactScore": 9.2,
"integrityImpact": "COMPLETE",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:L/AC:L/Au:N/C:N/I:C/A:C",
"version": "2.9 [IVD]"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 0.8,
"id": "CVE-2018-7522",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2018-7522",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2018-7522",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNVD",
"id": "CNVD-2018-08449",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201805-181",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "IVD",
"id": "e2ed3c9e-39ab-11e9-a0ec-000c29342cb1",
"trust": 0.2,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "e2ed3c9e-39ab-11e9-a0ec-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-08449"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-004889"
},
{
"db": "CNNVD",
"id": "CNNVD-201805-181"
},
{
"db": "NVD",
"id": "CVE-2018-7522"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "In Schneider Electric Triconex Tricon MP model 3008 firmware versions 10.0-10.4, when a system call is made, registers are stored to a fixed memory location. Modifying the data in this location could allow attackers to gain supervisor-level access and control system states. Schneider Electric Triconex Tricon MP model 3008 Firmware contains buffer error vulnerabilities and authorization / privilege / access control vulnerabilities.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The Triconex Tricon 3008 is a network equipment product from Schneider Electric, France. There are unauthorized operating vulnerabilities in SchneiderElectricTriconexTricon. Schneider Electric Triconex Tricon 3008 MP is prone to multiple memory corruption vulnerabilities. \nAn attacker can exploit these issues to execute arbitrary code within the context of the affected device. Failed exploit attempts may result in a denial-of-service condition. \nTriconex Tricon 3008 MP Firmware versions 10.0 through 10.4 are vulnerable",
"sources": [
{
"db": "NVD",
"id": "CVE-2018-7522"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-004889"
},
{
"db": "CNVD",
"id": "CNVD-2018-08449"
},
{
"db": "BID",
"id": "103947"
},
{
"db": "IVD",
"id": "e2ed3c9e-39ab-11e9-a0ec-000c29342cb1"
}
],
"trust": 2.61
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2018-7522",
"trust": 3.5
},
{
"db": "ICS CERT",
"id": "ICSA-18-107-02",
"trust": 3.3
},
{
"db": "BID",
"id": "103947",
"trust": 1.9
},
{
"db": "SCHNEIDER",
"id": "SEVD-2017-347-01",
"trust": 1.6
},
{
"db": "CNVD",
"id": "CNVD-2018-08449",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201805-181",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2018-004889",
"trust": 0.8
},
{
"db": "IVD",
"id": "E2ED3C9E-39AB-11E9-A0EC-000C29342CB1",
"trust": 0.2
}
],
"sources": [
{
"db": "IVD",
"id": "e2ed3c9e-39ab-11e9-a0ec-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-08449"
},
{
"db": "BID",
"id": "103947"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-004889"
},
{
"db": "CNNVD",
"id": "CNNVD-201805-181"
},
{
"db": "NVD",
"id": "CVE-2018-7522"
}
]
},
"id": "VAR-201805-1150",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "e2ed3c9e-39ab-11e9-a0ec-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-08449"
}
],
"trust": 1.8
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS",
"Network device"
],
"sub_category": null,
"trust": 0.6
},
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.2
}
],
"sources": [
{
"db": "IVD",
"id": "e2ed3c9e-39ab-11e9-a0ec-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-08449"
}
]
},
"last_update_date": "2024-11-23T22:38:12.325000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "SEVD-2017-347-01",
"trust": 0.8,
"url": "https://www.schneider-electric.com/en/download/document/SEVD-2017-347-01/"
},
{
"title": "Patch for Schneider Electric Triconex Tricon Unauthorized Operational Vulnerability (CNVD-2018-08449)",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/127469"
},
{
"title": "Schneider Electric Triconex Tricon MP 3008 Security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=79881"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-08449"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-004889"
},
{
"db": "CNNVD",
"id": "CNNVD-201805-181"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.8
},
{
"problemtype": "NVD-CWE-noinfo",
"trust": 1.0
},
{
"problemtype": "CWE-264",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-004889"
},
{
"db": "NVD",
"id": "CVE-2018-7522"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.3,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-18-107-02"
},
{
"trust": 1.6,
"url": "https://www.schneider-electric.com/en/download/document/sevd-2017-347-01/"
},
{
"trust": 1.6,
"url": "http://www.securityfocus.com/bid/103947"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7522"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-7522"
},
{
"trust": 0.3,
"url": "www.controlmicrosystems.com"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-08449"
},
{
"db": "BID",
"id": "103947"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-004889"
},
{
"db": "CNNVD",
"id": "CNNVD-201805-181"
},
{
"db": "NVD",
"id": "CVE-2018-7522"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "e2ed3c9e-39ab-11e9-a0ec-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-08449"
},
{
"db": "BID",
"id": "103947"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-004889"
},
{
"db": "CNNVD",
"id": "CNNVD-201805-181"
},
{
"db": "NVD",
"id": "CVE-2018-7522"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-04-26T00:00:00",
"db": "IVD",
"id": "e2ed3c9e-39ab-11e9-a0ec-000c29342cb1"
},
{
"date": "2018-04-26T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-08449"
},
{
"date": "2018-04-17T00:00:00",
"db": "BID",
"id": "103947"
},
{
"date": "2018-06-29T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-004889"
},
{
"date": "2018-05-07T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201805-181"
},
{
"date": "2018-05-04T17:29:00.393000",
"db": "NVD",
"id": "CVE-2018-7522"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-04-26T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-08449"
},
{
"date": "2018-04-17T00:00:00",
"db": "BID",
"id": "103947"
},
{
"date": "2018-06-29T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-004889"
},
{
"date": "2019-10-17T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201805-181"
},
{
"date": "2024-11-21T04:12:17.490000",
"db": "NVD",
"id": "CVE-2018-7522"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201805-181"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Schneider Electric Triconex Tricon MP model 3008 Firmware buffer error vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-004889"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "permissions and access control issues",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201805-181"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.