ID

VAR-201702-0074


CVE

CVE-2016-8367


TITLE

plural Schneider Electric Magelis Target of product Web Vulnerability to open multiple connections to the server

Trust: 0.8

sources: JVNDB: JVNDB-2016-007994

DESCRIPTION

An issue was discovered in Schneider Electric Magelis HMI Magelis GTO Advanced Optimum Panels, all versions, Magelis GTU Universal Panel, all versions, Magelis STO5xx and STU Small panels, all versions, Magelis XBT GH Advanced Hand-held Panels, all versions, Magelis XBT GK Advanced Touchscreen Panels with Keyboard, all versions, Magelis XBT GT Advanced Touchscreen Panels, all versions, and Magelis XBT GTW Advanced Open Touchscreen Panels (Windows XPe). An attacker can open multiple connections to a targeted web server and keep connections open preventing new connections from being made, rendering the web server unavailable during an attack. There are resource consumption vulnerabilities in several Schneider Electric products. An attacker exploiting a vulnerability can lead to resource exhaustion and restart, causing a denial of service attack. Attackers can exploit this issue to cause excessive resource consumption, resulting in a denial-of-service condition

Trust: 2.7

sources: NVD: CVE-2016-8367 // JVNDB: JVNDB-2016-007994 // CNVD: CNVD-2016-10625 // BID: 94093 // IVD: bc3cda95-7f34-4f84-b136-bedc75c028d8 // VULHUB: VHN-97187

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: bc3cda95-7f34-4f84-b136-bedc75c028d8 // CNVD: CNVD-2016-10625

AFFECTED PRODUCTS

vendor:schneider electricmodel:magelis gtu universal panelscope:eqversion: -

Trust: 2.4

vendor:schneider electricmodel:magelis xbt gh advanced hand-held panelscope:eqversion: -

Trust: 1.6

vendor:schneider electricmodel:magelis xbt gk advanced touchscreen panel with keyboardscope:eqversion: -

Trust: 1.6

vendor:schneider electricmodel:magelis gto advanced optimum panelscope:eqversion: -

Trust: 1.6

vendor:schneider electricmodel:magelis sto5 small panelscope:eqversion: -

Trust: 1.6

vendor:schneider electricmodel:magelis xbt gt advanced touchscreen panelscope:eqversion: -

Trust: 1.6

vendor:schneider electricmodel:magelis xbt gtw advanced open touchscreen panelscope:eqversion: -

Trust: 1.6

vendor:schneider electricmodel:magelis stu small panelscope:eqversion: -

Trust: 1.6

vendor:schneider electricmodel:magelis gto advanced optimum panelsscope:eqversion: -

Trust: 0.8

vendor:schneider electricmodel:magelis sto5xx small panelsscope:eqversion: -

Trust: 0.8

vendor:schneider electricmodel:magelis stu small panelsscope:eqversion: -

Trust: 0.8

vendor:schneider electricmodel:magelis xbt gh advanced hand-held panelsscope:eqversion: -

Trust: 0.8

vendor:schneider electricmodel:magelis xbt gk advanced touchscreen panels with keyboardscope:eqversion: -

Trust: 0.8

vendor:schneider electricmodel:magelis xbt gt advanced touchscreen panelsscope:eqversion: -

Trust: 0.8

vendor:schneider electricmodel:magelis xbt gtw advanced open touchscreen panelsscope:eqversion: -

Trust: 0.8

vendor:schneidermodel:electric magelis xbt gtw advanced open touchscreen panelsscope: - version: -

Trust: 0.6

vendor:schneidermodel:electric magelis xbt gt advanced touchscreen panels allscope: - version: -

Trust: 0.6

vendor:schneidermodel:electric magelis xbt gk advanced touchscreen panels with keyboard allscope: - version: -

Trust: 0.6

vendor:schneidermodel:electric magelis xbt gh advanced hand-held panel allscope: - version: -

Trust: 0.6

vendor:schneidermodel:electric magelis sto & stu small panels allscope: - version: -

Trust: 0.6

vendor:schneidermodel:electric magelis gtu universal panel allscope: - version: -

Trust: 0.6

vendor:schneidermodel:electric magelis gto advanced optimum panels allscope: - version: -

Trust: 0.6

vendor:schneider electricmodel:magelis xbt gtwscope:eqversion:0

Trust: 0.3

vendor:schneider electricmodel:magelis xbt gkscope:eqversion:0

Trust: 0.3

vendor:schneider electricmodel:magelis xbt ghscope:eqversion:0

Trust: 0.3

vendor:schneider electricmodel:magelis xbt gtscope:eqversion:0

Trust: 0.3

vendor:schneider electricmodel:magelis stuscope:eqversion:0

Trust: 0.3

vendor:schneider electricmodel:magelis stoscope:eqversion:0

Trust: 0.3

vendor:schneider electricmodel:magelis gtuscope:eqversion:0

Trust: 0.3

vendor:schneider electricmodel:magelis gtoscope:eqversion:0

Trust: 0.3

vendor:magelis gtu universal panelmodel: - scope:eqversion: -

Trust: 0.2

vendor:magelis gto advanced optimum panelmodel: - scope:eqversion: -

Trust: 0.2

vendor:magelis sto5 small panelmodel: - scope:eqversion: -

Trust: 0.2

vendor:magelis stu small panelmodel: - scope:eqversion: -

Trust: 0.2

vendor:magelis xbt gh advanced hand held panelmodel: - scope:eqversion: -

Trust: 0.2

vendor:magelis xbt gk advanced touchscreen panel with keyboardmodel: - scope:eqversion: -

Trust: 0.2

vendor:magelis xbt gt advanced touchscreen panelmodel: - scope:eqversion: -

Trust: 0.2

vendor:magelis xbt gtw advanced open touchscreen panelmodel: - scope:eqversion: -

Trust: 0.2

sources: IVD: bc3cda95-7f34-4f84-b136-bedc75c028d8 // CNVD: CNVD-2016-10625 // BID: 94093 // JVNDB: JVNDB-2016-007994 // CNNVD: CNNVD-201610-908 // NVD: CVE-2016-8367

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-8367
value: MEDIUM

Trust: 1.0

NVD: CVE-2016-8367
value: HIGH

Trust: 0.8

CNVD: CNVD-2016-10625
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201610-908
value: MEDIUM

Trust: 0.6

IVD: bc3cda95-7f34-4f84-b136-bedc75c028d8
value: MEDIUM

Trust: 0.2

VULHUB: VHN-97187
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2016-8367
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: CVE-2016-8367
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2016-10625
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: bc3cda95-7f34-4f84-b136-bedc75c028d8
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-97187
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-8367
baseSeverity: MEDIUM
baseScore: 5.3
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: LOW
exploitabilityScore: 3.9
impactScore: 1.4
version: 3.1

Trust: 1.0

NVD: CVE-2016-8367
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: IVD: bc3cda95-7f34-4f84-b136-bedc75c028d8 // CNVD: CNVD-2016-10625 // VULHUB: VHN-97187 // JVNDB: JVNDB-2016-007994 // CNNVD: CNNVD-201610-908 // NVD: CVE-2016-8367

PROBLEMTYPE DATA

problemtype:CWE-400

Trust: 1.9

sources: VULHUB: VHN-97187 // JVNDB: JVNDB-2016-007994 // NVD: CVE-2016-8367

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201610-908

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201610-908

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-007994

PATCH

title:Magelis HMIurl:http://www.schneider-electric.com/b2b/en/products/product-launch/magelis-hmi/

Trust: 0.8

title:Multiple Schneider Electric Product security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=180272

Trust: 0.6

sources: JVNDB: JVNDB-2016-007994 // CNNVD: CNNVD-201610-908

EXTERNAL IDS

db:NVDid:CVE-2016-8367

Trust: 3.6

db:ICS CERTid:ICSA-16-308-02

Trust: 2.8

db:BIDid:94093

Trust: 2.0

db:CNNVDid:CNNVD-201610-908

Trust: 0.9

db:SCHNEIDERid:SEVD-2016-302-01

Trust: 0.9

db:CNVDid:CNVD-2016-10625

Trust: 0.8

db:JVNDBid:JVNDB-2016-007994

Trust: 0.8

db:IVDid:BC3CDA95-7F34-4F84-B136-BEDC75C028D8

Trust: 0.2

db:VULHUBid:VHN-97187

Trust: 0.1

sources: IVD: bc3cda95-7f34-4f84-b136-bedc75c028d8 // CNVD: CNVD-2016-10625 // VULHUB: VHN-97187 // BID: 94093 // JVNDB: JVNDB-2016-007994 // CNNVD: CNNVD-201610-908 // NVD: CVE-2016-8367

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-16-308-02

Trust: 2.8

url:http://www.securityfocus.com/bid/94093

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-8367

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2016-8367

Trust: 0.8

url:http://www.schneider-electric.com/ww/en/download/document/sevd-2016-302-01

Trust: 0.6

url:http://www.critifence.com/sve/sve.php?id=82003201

Trust: 0.6

url:www.controlmicrosystems.com

Trust: 0.3

url:http://www.schneider-electric.com/en/download/document/sevd-2016-302-01/

Trust: 0.3

sources: CNVD: CNVD-2016-10625 // VULHUB: VHN-97187 // BID: 94093 // JVNDB: JVNDB-2016-007994 // CNNVD: CNNVD-201610-908 // NVD: CVE-2016-8367

CREDITS

Eran Goldstein, in collaboration with Check Point Software Technologies and CRITIFENCE.

Trust: 0.3

sources: BID: 94093

SOURCES

db:IVDid:bc3cda95-7f34-4f84-b136-bedc75c028d8
db:CNVDid:CNVD-2016-10625
db:VULHUBid:VHN-97187
db:BIDid:94093
db:JVNDBid:JVNDB-2016-007994
db:CNNVDid:CNNVD-201610-908
db:NVDid:CVE-2016-8367

LAST UPDATE DATE

2025-04-20T23:23:53.324000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2016-10625date:2016-11-04T00:00:00
db:VULHUBid:VHN-97187date:2017-06-28T00:00:00
db:BIDid:94093date:2016-11-24T01:07:00
db:JVNDBid:JVNDB-2016-007994date:2017-04-06T00:00:00
db:CNNVDid:CNNVD-201610-908date:2022-02-07T00:00:00
db:NVDid:CVE-2016-8367date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:IVDid:bc3cda95-7f34-4f84-b136-bedc75c028d8date:2016-11-04T00:00:00
db:CNVDid:CNVD-2016-10625date:2016-11-04T00:00:00
db:VULHUBid:VHN-97187date:2017-02-13T00:00:00
db:BIDid:94093date:2016-11-03T00:00:00
db:JVNDBid:JVNDB-2016-007994date:2017-04-06T00:00:00
db:CNNVDid:CNNVD-201610-908date:2016-11-02T00:00:00
db:NVDid:CVE-2016-8367date:2017-02-13T21:59:01.143