ID

VAR-201607-0386


CVE

CVE-2016-4529


TITLE

Schneider Electric M171/M172 Logic Controller for SoMachine HVAC Programming of ActiveX Vulnerability in arbitrary code execution in control

Trust: 0.8

sources: JVNDB: JVNDB-2016-003794

DESCRIPTION

An unspecified ActiveX control in Schneider Electric SoMachine HVAC Programming Software for M171/M172 Controllers before 2.1.0 allows remote attackers to execute arbitrary code via unknown vectors, related to the INTERFACESAFE_FOR_UNTRUSTED_CALLER (aka safe for scripting) flag. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the SetDataIntf method of the AxEditGrid control. The control has an untrusted pointer dereference vulnerability because it blindly calls an attacker-supplied memory address. A remote attacker can leverage this vulnerability to execute arbitrary code under the context of the process. Schneider Electric SoMachine HVAC Programming Software for M171 / M172 Controllers is a set of M171 / M172 controller-specific programming software from Schneider Electric (France). Failed attacks will likely cause denial-of-service conditions

Trust: 3.24

sources: NVD: CVE-2016-4529 // JVNDB: JVNDB-2016-003794 // ZDI: ZDI-16-440 // CNVD: CNVD-2016-05142 // BID: 91778 // VULHUB: VHN-93348 // VULMON: CVE-2016-4529

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2016-05142

AFFECTED PRODUCTS

vendor:schneider electricmodel:somachine hvacscope:lteversion:2.0.2

Trust: 1.0

vendor:schneider electricmodel:modicon m171 logic controllerscope: - version: -

Trust: 0.8

vendor:schneider electricmodel:modicon m172 logic controllerscope: - version: -

Trust: 0.8

vendor:schneider electricmodel:somachine hvac programming softwarescope:ltversion:2.1.0

Trust: 0.8

vendor:schneider electricmodel:somachine hvacscope: - version: -

Trust: 0.7

vendor:schneidermodel:electric somachine hvac programming software for m171/m172 controllersscope:ltversion:2.1.0

Trust: 0.6

vendor:schneider electricmodel:m171scope:eqversion: -

Trust: 0.6

vendor:schneider electricmodel:m172scope:eqversion: -

Trust: 0.6

vendor:schneider electricmodel:somachine hvac-applicationscope:eqversion:2.0.2

Trust: 0.3

vendor:schneider electricmodel:somachine hvac-applicationscope:eqversion:2.0

Trust: 0.3

sources: ZDI: ZDI-16-440 // CNVD: CNVD-2016-05142 // BID: 91778 // JVNDB: JVNDB-2016-003794 // NVD: CVE-2016-4529 // CNNVD: CNNVD-201607-435

CVSS

SEVERITY

CVSSV2

CVSSV3

NVD: CVE-2016-4529
value: HIGH

Trust: 1.8

ZDI: CVE-2016-4529
value: HIGH

Trust: 0.7

CNVD: CNVD-2016-05142
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201607-435
value: HIGH

Trust: 0.6

VULHUB: VHN-93348
value: HIGH

Trust: 0.1

VULMON: CVE-2016-4529
value: HIGH

Trust: 0.1

NVD: CVE-2016-4529
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.6

NVD:
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: TRUE
obtainAllPrivilege: FALSE
obtainUserPrivilege: FALSE
obtainOtherPrivilege: FALSE
userInteractionRequired: FALSE
version: 2.0

Trust: 1.0

CNVD: CNVD-2016-05142
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-93348
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

NVD:
baseSeverity: HIGH
baseScore: 7.3
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: LOW
exploitabilityScore: 3.9
impactScore: 3.4
version: 3.1

Trust: 1.0

NVD: CVE-2016-4529
baseSeverity: HIGH
baseScore: 7.3
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: LOW
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: ZDI: ZDI-16-440 // CNVD: CNVD-2016-05142 // VULHUB: VHN-93348 // VULMON: CVE-2016-4529 // JVNDB: JVNDB-2016-003794 // NVD: CVE-2016-4529 // CNNVD: CNNVD-201607-435

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

sources: NVD: CVE-2016-4529

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201607-435

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201607-435

CONFIGURATIONS

sources: NVD: CVE-2016-4529

PATCH

title:SEVD-2016-161-01url:http://download.schneider-electric.com/files?p_doc_ref=sevd-2016-161-01

Trust: 0.8

title:Schneider Electric has issued an update to correct this vulnerability.url:https://ics-cert.us-cert.gov/advisories/icsa-16-196-03

Trust: 0.7

title:Patch for Schneider Electric SoMachine HVAC Programming Software for M171 / M172 Controllers Arbitrary Code Execution Vulnerabilityurl:https://www.cnvd.org.cn/patchinfo/show/79425

Trust: 0.6

title:Schneider Electric SoMachine HVAC Programming Software for M171/M172 Controllers Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=62977

Trust: 0.6

title:CVE-2016-4529url:https://github.com/alaial90/cve-2016-4529

Trust: 0.1

sources: ZDI: ZDI-16-440 // CNVD: CNVD-2016-05142 // VULMON: CVE-2016-4529 // JVNDB: JVNDB-2016-003794 // CNNVD: CNNVD-201607-435

EXTERNAL IDS

db:NVDid:CVE-2016-4529

Trust: 4.2

db:ICS CERTid:ICSA-16-196-03

Trust: 2.9

db:ZDIid:ZDI-16-440

Trust: 2.8

db:BIDid:91778

Trust: 2.7

db:SCHNEIDERid:SEVD-2016-161-01

Trust: 2.4

db:JVNDBid:JVNDB-2016-003794

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-3581

Trust: 0.7

db:CNNVDid:CNNVD-201607-435

Trust: 0.7

db:CNVDid:CNVD-2016-05142

Trust: 0.6

db:VULHUBid:VHN-93348

Trust: 0.1

db:VULMONid:CVE-2016-4529

Trust: 0.1

sources: ZDI: ZDI-16-440 // CNVD: CNVD-2016-05142 // VULHUB: VHN-93348 // VULMON: CVE-2016-4529 // BID: 91778 // JVNDB: JVNDB-2016-003794 // NVD: CVE-2016-4529 // CNNVD: CNNVD-201607-435

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-16-196-03

Trust: 3.7

url:http://download.schneider-electric.com/files?p_doc_ref=sevd-2016-161-01

Trust: 2.4

url:http://www.securityfocus.com/bid/91778

Trust: 1.8

url:http://www.zerodayinitiative.com/advisories/zdi-16-440

Trust: 1.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-4529

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-4529

Trust: 0.8

url:http://www.schneider-electric.com/site/home/index.cfm/ww/?selectcountry=true

Trust: 0.3

url:http://www.zerodayinitiative.com/advisories/zdi-16-440/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/.html

Trust: 0.1

url:https://github.com/alaial90/cve-2016-4529

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: ZDI: ZDI-16-440 // CNVD: CNVD-2016-05142 // VULHUB: VHN-93348 // VULMON: CVE-2016-4529 // BID: 91778 // JVNDB: JVNDB-2016-003794 // NVD: CVE-2016-4529 // CNNVD: CNNVD-201607-435

CREDITS

rgod

Trust: 0.7

sources: ZDI: ZDI-16-440

SOURCES

db:ZDIid:ZDI-16-440
db:CNVDid:CNVD-2016-05142
db:VULHUBid:VHN-93348
db:VULMONid:CVE-2016-4529
db:BIDid:91778
db:JVNDBid:JVNDB-2016-003794
db:NVDid:CVE-2016-4529
db:CNNVDid:CNNVD-201607-435

LAST UPDATE DATE

2023-12-18T12:05:47.556000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-16-440date:2016-07-20T00:00:00
db:CNVDid:CNVD-2016-05142date:2016-07-21T00:00:00
db:VULHUBid:VHN-93348date:2016-11-28T00:00:00
db:VULMONid:CVE-2016-4529date:2021-08-19T00:00:00
db:BIDid:91778date:2016-07-22T00:00:00
db:JVNDBid:JVNDB-2016-003794date:2016-07-25T00:00:00
db:NVDid:CVE-2016-4529date:2022-02-03T14:25:19.803
db:CNNVDid:CNNVD-201607-435date:2021-08-20T00:00:00

SOURCES RELEASE DATE

db:ZDIid:ZDI-16-440date:2016-07-20T00:00:00
db:CNVDid:CNVD-2016-05142date:2016-07-21T00:00:00
db:VULHUBid:VHN-93348date:2016-07-15T00:00:00
db:VULMONid:CVE-2016-4529date:2016-07-15T00:00:00
db:BIDid:91778date:2016-07-14T00:00:00
db:JVNDBid:JVNDB-2016-003794date:2016-07-25T00:00:00
db:NVDid:CVE-2016-4529date:2016-07-15T16:59:10.347
db:CNNVDid:CNNVD-201607-435date:2016-07-18T00:00:00