ID

VAR-201704-0597


CVE

CVE-2017-5158


TITLE

Schneider Electric Wonderware InTouch Access Anywhere Information Disclosure Vulnerability

Trust: 1.4

sources: IVD: 30233a00-4cc0-473a-9235-b883e95bb33b // CNVD: CNVD-2017-05157 // CNNVD: CNNVD-201703-1438

DESCRIPTION

An Information Exposure issue was discovered in Schneider Electric Wonderware InTouch Access Anywhere, version 11.5.2 and prior. Credentials may be exposed to external systems via specific URL parameters, as arbitrary destination addresses may be specified. Schneider Electric Wonderware InTouch is an open, scalable HMI and SCADA monitoring solution from Schneider Electric, France, which creates standardized, reusable visualization applications. Wonderware InTouch Access Anywhere is a product that provides access to InTouch applications through a web browser. An attacker could exploit the vulnerability to obtain a certificate with the help of a URL parameter. A successful exploit may allow an attacker to obtain sensitive information, and perform certain unauthorized actions and gain access to the affected application. Other attacks are also possible

Trust: 2.61

sources: NVD: CVE-2017-5158 // JVNDB: JVNDB-2017-003245 // CNVD: CNVD-2017-05157 // BID: 97256 // IVD: 30233a00-4cc0-473a-9235-b883e95bb33b

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: 30233a00-4cc0-473a-9235-b883e95bb33b // CNVD: CNVD-2017-05157

AFFECTED PRODUCTS

vendor:avevamodel:wonderware intouch access anywherescope:lteversion:11.5.2

Trust: 1.0

vendor:schneider electricmodel:wonderware intouch access anywhere 2014scope:lteversion:r2 sp1b (11.5.2)

Trust: 0.8

vendor:schneidermodel:electric wonderware intouch access anywherescope:lteversion:<=11.5.2

Trust: 0.6

vendor:schneider electricmodel:wonderware intouch access anywhere 2014scope:eqversion:11.5.2

Trust: 0.6

vendor:schneider electricmodel:wonderware intouch access anywherescope:eqversion:11.5.2

Trust: 0.3

vendor:schneider electricmodel:wonderware intouch access anywherescope:neversion:17.0

Trust: 0.3

vendor:wonderware intouch access anywhere 2014model: - scope:eqversion:*

Trust: 0.2

sources: IVD: 30233a00-4cc0-473a-9235-b883e95bb33b // CNVD: CNVD-2017-05157 // BID: 97256 // JVNDB: JVNDB-2017-003245 // NVD: CVE-2017-5158 // CNNVD: CNNVD-201703-1438

CVSS

SEVERITY

CVSSV2

CVSSV3

NVD: CVE-2017-5158
value: CRITICAL

Trust: 1.8

CNVD: CNVD-2017-05157
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201703-1438
value: CRITICAL

Trust: 0.6

IVD: 30233a00-4cc0-473a-9235-b883e95bb33b
value: MEDIUM

Trust: 0.2

NVD:
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: FALSE
obtainAllPrivilege: FALSE
obtainUserPrivilege: FALSE
obtainOtherPrivilege: FALSE
userInteractionRequired: FALSE
version: 2.0

Trust: 1.0

NVD: CVE-2017-5158
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2017-05157
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 30233a00-4cc0-473a-9235-b883e95bb33b
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

NVD:
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2017-5158
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: IVD: 30233a00-4cc0-473a-9235-b883e95bb33b // CNVD: CNVD-2017-05157 // JVNDB: JVNDB-2017-003245 // NVD: CVE-2017-5158 // CNNVD: CNNVD-201703-1438

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.8

sources: JVNDB: JVNDB-2017-003245 // NVD: CVE-2017-5158

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201703-1438

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-201703-1438

CONFIGURATIONS

sources: NVD: CVE-2017-5158

PATCH

title:Wonderware Security Bulletin LFSEC00000114url:http://software.schneider-electric.com/pdf/security-bulletin/lfsec00000114/

Trust: 0.8

title:Schneider Electric Wonderware InTouch Access Anywhere Information Disclosure Vulnerability Patchurl:https://www.cnvd.org.cn/patchinfo/show/92492

Trust: 0.6

title:Schneider Electric Wonderware InTouch Access Anywhere Repair measures for information disclosure vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=68928

Trust: 0.6

sources: CNVD: CNVD-2017-05157 // JVNDB: JVNDB-2017-003245 // CNNVD: CNNVD-201703-1438

EXTERNAL IDS

db:NVDid:CVE-2017-5158

Trust: 3.5

db:ICS CERTid:ICSA-17-089-01

Trust: 2.7

db:BIDid:97256

Trust: 2.5

db:CNVDid:CNVD-2017-05157

Trust: 0.8

db:CNNVDid:CNNVD-201703-1438

Trust: 0.8

db:JVNDBid:JVNDB-2017-003245

Trust: 0.8

db:IVDid:30233A00-4CC0-473A-9235-B883E95BB33B

Trust: 0.2

sources: IVD: 30233a00-4cc0-473a-9235-b883e95bb33b // CNVD: CNVD-2017-05157 // BID: 97256 // JVNDB: JVNDB-2017-003245 // NVD: CVE-2017-5158 // CNNVD: CNNVD-201703-1438

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-17-089-01

Trust: 2.7

url:http://www.securityfocus.com/bid/97256

Trust: 2.2

url:http://software.schneider-electric.com/pdf/security-bulletin/lfsec00000114/

Trust: 1.6

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-5158

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-5158

Trust: 0.8

url:http://www.schneider-electric.com/products/ww/en/

Trust: 0.3

sources: CNVD: CNVD-2017-05157 // BID: 97256 // JVNDB: JVNDB-2017-003245 // NVD: CVE-2017-5158 // CNNVD: CNNVD-201703-1438

CREDITS

Ruslan Habalov and Jan Bee of the Google ISA Assessments Team

Trust: 0.9

sources: BID: 97256 // CNNVD: CNNVD-201703-1438

SOURCES

db:IVDid:30233a00-4cc0-473a-9235-b883e95bb33b
db:CNVDid:CNVD-2017-05157
db:BIDid:97256
db:JVNDBid:JVNDB-2017-003245
db:NVDid:CVE-2017-5158
db:CNNVDid:CNNVD-201703-1438

LAST UPDATE DATE

2023-12-18T12:44:39.593000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2017-05157date:2017-04-24T00:00:00
db:BIDid:97256date:2017-04-04T00:02:00
db:JVNDBid:JVNDB-2017-003245date:2017-05-22T00:00:00
db:NVDid:CVE-2017-5158date:2021-09-09T13:31:32.243
db:CNNVDid:CNNVD-201703-1438date:2021-09-10T00:00:00

SOURCES RELEASE DATE

db:IVDid:30233a00-4cc0-473a-9235-b883e95bb33bdate:2017-04-24T00:00:00
db:CNVDid:CNVD-2017-05157date:2017-04-24T00:00:00
db:BIDid:97256date:2017-03-31T00:00:00
db:JVNDBid:JVNDB-2017-003245date:2017-05-22T00:00:00
db:NVDid:CVE-2017-5158date:2017-04-20T20:59:00.440
db:CNNVDid:CNNVD-201703-1438date:2017-03-31T00:00:00