ID

VAR-201704-0596


CVE

CVE-2017-5156


TITLE

Schneider Electric Wonderware InTouch Access Anywhere Cross-Site Request Forgery Vulnerability

Trust: 1.4

sources: IVD: a9662f3b-eb92-4e1c-ae9f-1f61496bcd3f // CNVD: CNVD-2017-05156 // CNNVD: CNNVD-201703-1437

DESCRIPTION

A Cross-Site Request Forgery issue was discovered in Schneider Electric Wonderware InTouch Access Anywhere, version 11.5.2 and prior. The client request may be forged from a different site. This will allow an external site to access internal RDP systems on behalf of the currently logged in user. Schneider Electric Wonderware InTouch is an open, scalable HMI and SCADA monitoring solution from Schneider Electric, France, which creates standardized, reusable visualization applications. Wonderware InTouch Access Anywhere is a product that provides access to InTouch applications through a web browser. This vulnerability could be exploited by a remote attacker to access an internal RDP system. A successful exploit may allow an attacker to obtain sensitive information, and perform certain unauthorized actions and gain access to the affected application. Other attacks are also possible

Trust: 2.61

sources: NVD: CVE-2017-5156 // JVNDB: JVNDB-2017-003244 // CNVD: CNVD-2017-05156 // BID: 97256 // IVD: a9662f3b-eb92-4e1c-ae9f-1f61496bcd3f

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: a9662f3b-eb92-4e1c-ae9f-1f61496bcd3f // CNVD: CNVD-2017-05156

AFFECTED PRODUCTS

vendor:avevamodel:wonderware intouch access anywherescope:lteversion:11.5.2

Trust: 1.0

vendor:schneider electricmodel:wonderware intouch access anywhere 2014scope:lteversion:r2 sp1b (11.5.2)

Trust: 0.8

vendor:schneidermodel:electric wonderware intouch access anywherescope:lteversion:<=11.5.2

Trust: 0.6

vendor:schneider electricmodel:wonderware intouch access anywhere 2014scope:eqversion:11.5.2

Trust: 0.6

vendor:schneider electricmodel:wonderware intouch access anywherescope:eqversion:11.5.2

Trust: 0.3

vendor:schneider electricmodel:wonderware intouch access anywherescope:neversion:17.0

Trust: 0.3

vendor:wonderware intouch access anywhere 2014model: - scope:eqversion:*

Trust: 0.2

sources: IVD: a9662f3b-eb92-4e1c-ae9f-1f61496bcd3f // CNVD: CNVD-2017-05156 // BID: 97256 // JVNDB: JVNDB-2017-003244 // NVD: CVE-2017-5156 // CNNVD: CNNVD-201703-1437

CVSS

SEVERITY

CVSSV2

CVSSV3

NVD: CVE-2017-5156
value: HIGH

Trust: 1.8

CNVD: CNVD-2017-05156
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201703-1437
value: HIGH

Trust: 0.6

IVD: a9662f3b-eb92-4e1c-ae9f-1f61496bcd3f
value: MEDIUM

Trust: 0.2

NVD:
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: FALSE
obtainAllPrivilege: FALSE
obtainUserPrivilege: FALSE
obtainOtherPrivilege: FALSE
userInteractionRequired: TRUE
version: 2.0

Trust: 1.0

NVD: CVE-2017-5156
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2017-05156
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: a9662f3b-eb92-4e1c-ae9f-1f61496bcd3f
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

NVD:
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2017-5156
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: IVD: a9662f3b-eb92-4e1c-ae9f-1f61496bcd3f // CNVD: CNVD-2017-05156 // JVNDB: JVNDB-2017-003244 // NVD: CVE-2017-5156 // CNNVD: CNNVD-201703-1437

PROBLEMTYPE DATA

problemtype:CWE-352

Trust: 1.8

sources: JVNDB: JVNDB-2017-003244 // NVD: CVE-2017-5156

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201703-1437

TYPE

cross-site request forgery

Trust: 0.6

sources: CNNVD: CNNVD-201703-1437

CONFIGURATIONS

sources: NVD: CVE-2017-5156

PATCH

title:Wonderware Security Bulletin LFSEC00000114url:http://software.schneider-electric.com/pdf/security-bulletin/lfsec00000114/

Trust: 0.8

title:Patch for Schneider Electric Wonderware InTouch Access Anywhere Cross-Site Request Forgery Vulnerabilityurl:https://www.cnvd.org.cn/patchinfo/show/92491

Trust: 0.6

title:Schneider Electric Wonderware InTouch Access Anywhere Fixes for cross-site request forgery vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=68927

Trust: 0.6

sources: CNVD: CNVD-2017-05156 // JVNDB: JVNDB-2017-003244 // CNNVD: CNNVD-201703-1437

EXTERNAL IDS

db:NVDid:CVE-2017-5156

Trust: 3.5

db:ICS CERTid:ICSA-17-089-01

Trust: 2.7

db:BIDid:97256

Trust: 2.5

db:CNVDid:CNVD-2017-05156

Trust: 0.8

db:CNNVDid:CNNVD-201703-1437

Trust: 0.8

db:JVNDBid:JVNDB-2017-003244

Trust: 0.8

db:IVDid:A9662F3B-EB92-4E1C-AE9F-1F61496BCD3F

Trust: 0.2

sources: IVD: a9662f3b-eb92-4e1c-ae9f-1f61496bcd3f // CNVD: CNVD-2017-05156 // BID: 97256 // JVNDB: JVNDB-2017-003244 // NVD: CVE-2017-5156 // CNNVD: CNNVD-201703-1437

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-17-089-01

Trust: 2.7

url:http://www.securityfocus.com/bid/97256

Trust: 2.2

url:http://software.schneider-electric.com/pdf/security-bulletin/lfsec00000114/

Trust: 1.6

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-5156

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-5156

Trust: 0.8

url:http://www.schneider-electric.com/products/ww/en/

Trust: 0.3

sources: CNVD: CNVD-2017-05156 // BID: 97256 // JVNDB: JVNDB-2017-003244 // NVD: CVE-2017-5156 // CNNVD: CNNVD-201703-1437

CREDITS

Ruslan Habalov and Jan Bee of the Google ISA Assessments Team

Trust: 0.9

sources: BID: 97256 // CNNVD: CNNVD-201703-1437

SOURCES

db:IVDid:a9662f3b-eb92-4e1c-ae9f-1f61496bcd3f
db:CNVDid:CNVD-2017-05156
db:BIDid:97256
db:JVNDBid:JVNDB-2017-003244
db:NVDid:CVE-2017-5156
db:CNNVDid:CNNVD-201703-1437

LAST UPDATE DATE

2023-12-18T12:44:39.558000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2017-05156date:2017-04-24T00:00:00
db:BIDid:97256date:2017-04-04T00:02:00
db:JVNDBid:JVNDB-2017-003244date:2017-05-22T00:00:00
db:NVDid:CVE-2017-5156date:2021-09-09T13:37:31.263
db:CNNVDid:CNNVD-201703-1437date:2021-09-10T00:00:00

SOURCES RELEASE DATE

db:IVDid:a9662f3b-eb92-4e1c-ae9f-1f61496bcd3fdate:2017-04-24T00:00:00
db:CNVDid:CNVD-2017-05156date:2017-04-24T00:00:00
db:BIDid:97256date:2017-03-31T00:00:00
db:JVNDBid:JVNDB-2017-003244date:2017-05-22T00:00:00
db:NVDid:CVE-2017-5156date:2017-04-20T20:59:00.237
db:CNNVDid:CNNVD-201703-1437date:2017-03-31T00:00:00