Schneider Electric U.motion Builder up to 1.2.1 Request hard-coded credentials

entryeditHistoryDiffjsonxmlCTI

A vulnerability was found in Schneider Electric U.motion Builder up to 1.2.1 (Automation Software). It has been rated as critical. Affected by this issue is some unknown functionality. There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.

Field09/26/2017 03:16 PM11/19/2019 05:37 PM01/14/2021 02:01 PM
typeAutomation SoftwareAutomation SoftwareAutomation Software
vendorSchneider ElectricSchneider ElectricSchneider Electric
nameU.motion BuilderU.motion BuilderU.motion Builder
version<=1.2.1<=1.2.1<=1.2.1
input_typeRequestRequestRequest
cwe798 (weak authentication)798 (weak authentication)798 (weak authentication)
risk222
cvss2_vuldb_basescore7.57.57.5
cvss2_vuldb_tempscore7.57.57.5
cvss2_vuldb_avNNN
cvss2_vuldb_acLLL
cvss2_vuldb_auNNN
cvss2_vuldb_ciPPP
cvss2_vuldb_iiPPP
cvss2_vuldb_aiPPP
cvss2_nvd_avNNN
cvss2_nvd_acLLL
cvss2_nvd_auNNN
cvss2_nvd_ciPPP
cvss2_nvd_iiPPP
cvss2_nvd_aiPPP
cvss3_meta_basescore7.37.37.3
cvss3_meta_tempscore7.37.37.3
cvss3_vuldb_basescore7.37.37.3
cvss3_vuldb_tempscore7.37.37.3
cvss3_vuldb_avNNN
cvss3_vuldb_acLLL
cvss3_vuldb_prNNN
cvss3_vuldb_uiNNN
cvss3_vuldb_sUUU
cvss3_vuldb_cLLL
cvss3_vuldb_iLLL
cvss3_vuldb_aLLL
cvss3_nvd_avNNN
cvss3_nvd_acLLL
cvss3_nvd_prNNN
cvss3_nvd_uiNNN
cvss3_nvd_sUUU
cvss3_nvd_cLLL
cvss3_nvd_iLLL
cvss3_nvd_aLLL
date1506384000 (09/26/2017)1506384000 (09/26/2017)1506384000 (09/26/2017)
urlhttp://www.schneider-electric.com/en/download/document/SEVD-2017-178-01/http://www.schneider-electric.com/en/download/document/SEVD-2017-178-01/http://www.schneider-electric.com/en/download/document/SEVD-2017-178-01/
viaZDI (Zero Day Initiative)ZDI (Zero Day Initiative)ZDI (Zero Day Initiative)
person_nicknamergodrgodrgod
price_0day$0-$5k$0-$5k$0-$5k
cveCVE-2017-9956CVE-2017-9956CVE-2017-9956
cve_assigned149843520014984352001498435200
cve_nvd_published150629760015062976001506297600
cve_nvd_summaryAn authentication bypass vulnerability exists in Schneider Electric's U.motion Builder software versions 1.2.1 and prior in which the system contains a hard-coded valid session. An attacker can use that session ID as part of the HTTP cookie of a web request, resulting in authentication bypassAn authentication bypass vulnerability exists in Schneider Electric's U.motion Builder software versions 1.2.1 and prior in which the system contains a hard-coded valid session. An attacker can use that session ID as part of the HTTP cookie of a web request, resulting in authentication bypassAn authentication bypass vulnerability exists in Schneider Electric's U.motion Builder software versions 1.2.1 and prior in which the system contains a hard-coded valid session. An attacker can use that session ID as part of the HTTP cookie of a web request, resulting in authentication bypass
securityfocus993449934499344
securityfocus_date1498780800 (06/30/2017)1498780800 (06/30/2017)1498780800 (06/30/2017)
securityfocus_classUnknownUnknownUnknown
securityfocus_titleSchneider Electric U.motion Builder Multiple Security VulnerabilitiesSchneider Electric U.motion Builder Multiple Security VulnerabilitiesSchneider Electric U.motion Builder Multiple Security Vulnerabilities
seealso107142 107143 107145 107146 107147 107148107142 107143 107145 107146 107147 107148107142 107143 107145 107146 107147 107148
locationWebsiteWebsiteWebsite
cvss2_vuldb_eNDNDND
cvss2_vuldb_rlNDNDND
cvss2_vuldb_rcNDNDND
cvss3_vuldb_eXXX
cvss3_vuldb_rlXXX
cvss3_vuldb_rcXXX
0day_days888888
cvss3_nvd_basescore7.37.37.3
discoverydate14986944001498694400
company_nameZero Day InitiativeZero Day Initiative
confirm_urlhttp://www.schneider-electric.com/en/download/document/SEVD-2017-178-01/http://www.schneider-electric.com/en/download/document/SEVD-2017-178-01/
person_namergod working with Trend Micro???s Zero Day Initiative.
cvss2_nvd_basescore7.5

Do you know our Splunk app?

Download it now for free!