CVE-2017-6021
CVSS5.0
发布时间 :2018-05-14 10:29:00
修订时间 :2018-06-25 13:01:59
NMS    

[原文]In Schneider Electric ClearSCADA 2014 R1 (build 75.5210) and prior, 2014 R1.1 (build 75.5387) and prior, 2015 R1 (build 76.5648) and prior, and 2015 R2 (build 77.5882) and prior, an attacker with network access to the ClearSCADA server can send specially crafted sequences of commands and data packets to the ClearSCADA server that can cause the ClearSCADA server process and ClearSCADA communications driver processes to terminate. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).


[CNNVD]CNNVD数据暂缺。


[机译]译文暂缺.

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: NETWORK [攻击者不需要获取内网访问权或本地访问权]
身份认证: NONE [漏洞利用无需身份认证]

- CWE (弱点类目)

CWE-20 [输入验证不恰当]

- CPE (受影响的平台与产品)

cpe:/a:schneider-electric:clearscada:2014
cpe:/a:schneider-electric:clearscada:2014:r1
cpe:/a:schneider-electric:clearscada:2014:r1.1
cpe:/a:schneider-electric:clearscada:2015
cpe:/a:schneider-electric:clearscada:2015:r1
cpe:/a:schneider-electric:clearscada:2015:r2

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6021
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-6021
(官方数据源) NVD

- 其它链接及资源

http://www.securityfocus.com/bid/96768
(VENDOR_ADVISORY)  BID  96768
https://ics-cert.us-cert.gov/advisories/ICSA-17-068-01
(VENDOR_ADVISORY)  MISC  https://ics-cert.us-cert.gov/advisories/ICSA-17-068-01

- 漏洞信息

Schneider Electric ClearSCADA CVE-2017-6021 Remote Denial of Service Vulnerability
Failure to Handle Exceptional Conditions 96768
Yes No
2017-03-09 12:00:00 2017-03-09 12:00:00
Sergey Temnikov and Vladimir Dashchenko of Kapersky Lab

- 受影响的程序版本

Schneider-Electric ClearSCADA 2010 R3 72.4560
Schneider-Electric ClearSCADA 2010 R2.1 71.4325
Schneider-Electric ClearSCADA 2010 R2 71.4165
Schneider-Electric ClearSCADA 2010 R3.2
Schneider-Electric Clearscada 2015 R2 (build 77.58
Schneider-Electric Clearscada 2015 R1 (build 76.56
Schneider-Electric Clearscada 2014 R1.1 (build 75.
Schneider-Electric Clearscada 2014 R1 (build 75.52
Schneider-Electric Clearscada 2013 R1.2
Schneider-Electric Clearscada 2013 R1.1a
Schneider-Electric Clearscada 2013 R1.1
Schneider-Electric Clearscada 2013 R1
Schneider-Electric Clearscada 2010 R3.1
Schneider-Electric Clearscada 2010 R3
Schneider-Electric Clearscada 2010 R2.1
Schneider-Electric Clearscada 2010 R2
Schneider-Electric Clearscada 2010 R1
,Schneider-Electric Clearscada 2015 R2 hotfix build
Schneider-Electric Clearscada 2015 R1.1 SP (build
Schneider-Electric Clearscada 2014 R1.1 hotfix bui

- 不受影响的程序版本

Schneider-Electric Clearscada 2015 R2 hotfix build
Schneider-Electric Clearscada 2015 R1.1 SP (build
Schneider-Electric Clearscada 2014 R1.1 hotfix bui

- 漏洞讨论

Schneider Electric ClearSCADA is prone to a denial-of-service vulnerability.

An attacker can exploit this issue to cause denial-of-service condition.

- 漏洞利用

Currently, we are not aware of any working exploits. If you feel we are in error or if you are aware of more recent information, please mail us at: vuldb@securityfocus.com.

- 解决方案

Updates are available. Please see the references or vendor advisory for more information.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站