ID

VAR-201508-0386


CVE

CVE-2015-3940


TITLE

Schneider Electric Wonderware System Platform Vulnerability gained in

Trust: 0.8

sources: JVNDB: JVNDB-2015-003986

DESCRIPTION

Untrusted search path vulnerability in Schneider Electric Wonderware System Platform before 2014 R2 Patch 01 allows local users to gain privileges via a Trojan horse DLL in an unspecified directory. Wonderware System Platform is a system platform applied in multiple fields. A fixed search path vulnerability exists in Schneider Electric's Wonderware InTouch, Application Server, Historian, and SuiteLink applications. Allows attackers to exploit this vulnerability to install and execute malicious code. Schneider Electric Wonderware System Platform is prone to a local arbitrary-code-execution vulnerability. An attacker can exploit this issue to execute arbitrary code within the context of the affected application or cause the application to crash, resulting in a denial-of-service condition. Wonderware System Platform 2014 R2 and prior are vulnerable. The platform provides visual configuration and deployment, secure data connectivity and communication, data storage and management, and more

Trust: 2.52

sources: NVD: CVE-2015-3940 // JVNDB: JVNDB-2015-003986 // CNVD: CNVD-2015-03940 // BID: 75297 // VULHUB: VHN-81901

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2015-03940

AFFECTED PRODUCTS

vendor:schneider electricmodel:wonderware system platform 2014scope:eqversion:r2

Trust: 1.6

vendor:schneider electricmodel:wonderware system platform 2014scope:ltversion:r2 patch 01

Trust: 0.8

vendor:schneidermodel:electric wonderware system platform r2scope:ltversion:2014

Trust: 0.6

vendor:schneider electricmodel:wonderware system platform r2scope:eqversion:2014

Trust: 0.3

vendor:schneider electricmodel:wonderware system platform r2 patchscope:neversion:201401

Trust: 0.3

sources: CNVD: CNVD-2015-03940 // BID: 75297 // JVNDB: JVNDB-2015-003986 // CNNVD: CNNVD-201507-319 // NVD: CVE-2015-3940

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-3940
value: MEDIUM

Trust: 1.0

NVD: CVE-2015-3940
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2015-03940
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201507-319
value: MEDIUM

Trust: 0.6

VULHUB: VHN-81901
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2015-3940
severity: MEDIUM
baseScore: 6.9
vectorString: AV:L/AC:M/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.4
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2015-03940
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-81901
severity: MEDIUM
baseScore: 6.9
vectorString: AV:L/AC:M/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.4
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2015-03940 // VULHUB: VHN-81901 // JVNDB: JVNDB-2015-003986 // CNNVD: CNNVD-201507-319 // NVD: CVE-2015-3940

PROBLEMTYPE DATA

problemtype:CWE-22

Trust: 1.9

sources: VULHUB: VHN-81901 // JVNDB: JVNDB-2015-003986 // NVD: CVE-2015-3940

THREAT TYPE

local

Trust: 0.9

sources: BID: 75297 // CNNVD: CNNVD-201507-319

TYPE

path traversal

Trust: 0.6

sources: CNNVD: CNNVD-201507-319

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-003986

PATCH

title:LFSEC00000106url:http://software.schneider-electric.com/pdf/security-bulletin/lfsec00000106/

Trust: 0.8

title:Patch for Schneider Electric Wonderware System Platform has an unknown vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/60021

Trust: 0.6

sources: CNVD: CNVD-2015-03940 // JVNDB: JVNDB-2015-003986

EXTERNAL IDS

db:ICS CERTid:ICSA-15-169-02

Trust: 3.4

db:NVDid:CVE-2015-3940

Trust: 3.4

db:BIDid:75297

Trust: 2.6

db:SECTRACKid:1033179

Trust: 1.1

db:SECTRACKid:1033180

Trust: 1.1

db:JVNDBid:JVNDB-2015-003986

Trust: 0.8

db:CNNVDid:CNNVD-201507-319

Trust: 0.7

db:CNVDid:CNVD-2015-03940

Trust: 0.6

db:VULHUBid:VHN-81901

Trust: 0.1

sources: CNVD: CNVD-2015-03940 // VULHUB: VHN-81901 // BID: 75297 // JVNDB: JVNDB-2015-003986 // CNNVD: CNNVD-201507-319 // NVD: CVE-2015-3940

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-15-169-02

Trust: 3.4

url:http://www.securityfocus.com/bid/75297

Trust: 1.7

url:http://iom.invensys.com/en/pdflibrary/security_bulletin_lfsec00000106.pdf

Trust: 1.7

url:http://www.securitytracker.com/id/1033179

Trust: 1.1

url:http://www.securitytracker.com/id/1033180

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-3940

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-3940

Trust: 0.8

url:https://gcsresource.invensys.com/tracking/confirmdownload.aspx?id=21913

Trust: 0.6

url:http://www.schneider-electric.com/site/home/index.cfm/ww/?selectcountry=true

Trust: 0.3

url:http://software.schneider-electric.com/products/wonderware/hmi-and-supervisory-control/system-platform/

Trust: 0.3

sources: CNVD: CNVD-2015-03940 // VULHUB: VHN-81901 // BID: 75297 // JVNDB: JVNDB-2015-003986 // CNNVD: CNNVD-201507-319 // NVD: CVE-2015-3940

CREDITS

Ivan Sanchez of WiseSecurity Team

Trust: 0.9

sources: BID: 75297 // CNNVD: CNNVD-201507-319

SOURCES

db:CNVDid:CNVD-2015-03940
db:VULHUBid:VHN-81901
db:BIDid:75297
db:JVNDBid:JVNDB-2015-003986
db:CNNVDid:CNNVD-201507-319
db:NVDid:CVE-2015-3940

LAST UPDATE DATE

2025-04-13T23:39:05.781000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2015-03940date:2015-06-25T00:00:00
db:VULHUBid:VHN-81901date:2016-12-24T00:00:00
db:BIDid:75297date:2015-06-19T00:00:00
db:JVNDBid:JVNDB-2015-003986date:2015-08-05T00:00:00
db:CNNVDid:CNNVD-201507-319date:2015-08-04T00:00:00
db:NVDid:CVE-2015-3940date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:CNVDid:CNVD-2015-03940date:2015-06-25T00:00:00
db:VULHUBid:VHN-81901date:2015-08-04T00:00:00
db:BIDid:75297date:2015-06-19T00:00:00
db:JVNDBid:JVNDB-2015-003986date:2015-08-05T00:00:00
db:CNNVDid:CNNVD-201507-319date:2015-06-19T00:00:00
db:NVDid:CVE-2015-3940date:2015-08-04T01:59:00.107