Schneider Electric U.motion Builder up to 1.2.1 access control

entryeditHistoryDiffjsonxmlCTI

A vulnerability, which was classified as problematic, has been found in Schneider Electric U.motion Builder up to 1.2.1 (Automation Software). This issue affects an unknown code block. There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.

Field09/26/2017 03:17 PM11/19/2019 05:56 PM01/14/2021 02:14 PM
typeAutomation SoftwareAutomation SoftwareAutomation Software
vendorSchneider ElectricSchneider ElectricSchneider Electric
nameU.motion BuilderU.motion BuilderU.motion Builder
version<=1.2.1<=1.2.1<=1.2.1
cwe284 (privilege escalation)284 (privilege escalation)284 (privilege escalation)
risk111
cvss2_vuldb_basescore1.91.91.9
cvss2_vuldb_tempscore1.91.91.9
cvss2_vuldb_avLLL
cvss2_vuldb_acMMM
cvss2_vuldb_auNNN
cvss2_vuldb_ciNNN
cvss2_vuldb_iiNNN
cvss2_vuldb_aiPPP
cvss2_nvd_avLLL
cvss2_nvd_acLLL
cvss2_nvd_auNNN
cvss2_nvd_ciNNN
cvss2_nvd_iiNNN
cvss2_nvd_aiCCC
cvss3_meta_basescore4.74.74.7
cvss3_meta_tempscore4.74.74.7
cvss3_vuldb_basescore4.04.04.0
cvss3_vuldb_tempscore4.04.04.0
cvss3_vuldb_avLLL
cvss3_vuldb_acLLL
cvss3_vuldb_prNNN
cvss3_vuldb_uiNNN
cvss3_vuldb_sUUU
cvss3_vuldb_cNNN
cvss3_vuldb_iNNN
cvss3_vuldb_aLLL
cvss3_nvd_avLLL
cvss3_nvd_acLLL
cvss3_nvd_prLLL
cvss3_nvd_uiNNN
cvss3_nvd_sUUU
cvss3_nvd_cNNN
cvss3_nvd_iNNN
cvss3_nvd_aHHH
date1506384000 (09/26/2017)1506384000 (09/26/2017)1506384000 (09/26/2017)
urlhttp://www.schneider-electric.com/en/download/document/SEVD-2017-178-01/http://www.schneider-electric.com/en/download/document/SEVD-2017-178-01/http://www.schneider-electric.com/en/download/document/SEVD-2017-178-01/
viaZDI (Zero Day Initiative)ZDI (Zero Day Initiative)ZDI (Zero Day Initiative)
person_nicknamergodrgodrgod
price_0day$0-$5k$0-$5k$0-$5k
cveCVE-2017-9959CVE-2017-9959CVE-2017-9959
cve_assigned149843520014984352001498435200
cve_nvd_published150629760015062976001506297600
cve_nvd_summaryA vulnerability exists in Schneider Electric's U.motion Builder software versions 1.2.1 and prior in which the system accepts reboot in session from unauthenticated users, supporting a denial of service condition.A vulnerability exists in Schneider Electric's U.motion Builder software versions 1.2.1 and prior in which the system accepts reboot in session from unauthenticated users, supporting a denial of service condition.A vulnerability exists in Schneider Electric's U.motion Builder software versions 1.2.1 and prior in which the system accepts reboot in session from unauthenticated users, supporting a denial of service condition.
securityfocus993449934499344
securityfocus_date1498780800 (06/30/2017)1498780800 (06/30/2017)1498780800 (06/30/2017)
securityfocus_classUnknownUnknownUnknown
securityfocus_titleSchneider Electric U.motion Builder Multiple Security VulnerabilitiesSchneider Electric U.motion Builder Multiple Security VulnerabilitiesSchneider Electric U.motion Builder Multiple Security Vulnerabilities
seealso107142 107143 107144 107145 107146 107148107142 107143 107144 107145 107146 107148107142 107143 107144 107145 107146 107148
locationWebsiteWebsiteWebsite
cvss2_vuldb_eNDNDND
cvss2_vuldb_rlNDNDND
cvss2_vuldb_rcNDNDND
cvss3_vuldb_eXXX
cvss3_vuldb_rlXXX
cvss3_vuldb_rcXXX
0day_days888888
cvss3_nvd_basescore5.55.55.5
discoverydate14986944001498694400
company_nameZero Day InitiativeZero Day Initiative
confirm_urlhttp://www.schneider-electric.com/en/download/document/SEVD-2017-178-01/http://www.schneider-electric.com/en/download/document/SEVD-2017-178-01/
person_namergod working with Trend Micro???s Zero Day Initiative.
cvss2_nvd_basescore4.9

Interested in the pricing of exploits?

See the underground prices here!