ID

VAR-201709-1078


CVE

CVE-2017-9961


TITLE

Schneider Electric Pro-face GP-Pro EX Arbitrary code execution vulnerability

Trust: 0.8

sources: IVD: 9d5553fd-7a78-4b9d-aa56-2beaa93655c1 // CNVD: CNVD-2017-22834

DESCRIPTION

A vulnerability exists in Schneider Electric's Pro-Face GP Pro EX version 4.07.000 that allows an attacker to execute arbitrary code. Malicious code installation requires an access to the computer. By placing a specific DLL/OCX file, an attacker is able to force the process to load arbitrary DLL and execute arbitrary code in the context of the process. Schneider Electric GP Pro EX Contains an access control vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Pro-face GP-Pro EX is the development software for Pro-face GP4000, GP4100, GP4000M, LT4000M, LT3000, EZ Series, SP5000 Smart Portal series products. Schneider Electric Pro-face GP-Pro EX is prone to an arbitrary code-execution vulnerability. Failed exploit attempts will result in a denial of service condition. Pro-face GP-Pro EX 4.07.000 is vulnerable

Trust: 2.61

sources: NVD: CVE-2017-9961 // JVNDB: JVNDB-2017-008556 // CNVD: CNVD-2017-22834 // BID: 100114 // IVD: 9d5553fd-7a78-4b9d-aa56-2beaa93655c1

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: 9d5553fd-7a78-4b9d-aa56-2beaa93655c1 // CNVD: CNVD-2017-22834

AFFECTED PRODUCTS

vendor:schneider electricmodel:pro-face gp pro exscope:eqversion:4.07.000

Trust: 1.6

vendor:schneider electricmodel:gp pro exscope:eqversion:4.07.000

Trust: 0.8

vendor:schneidermodel:electric pro-face gp-pro exscope:eqversion:4.07.000

Trust: 0.6

vendor:schneider electricmodel:pro-face gp-pro exscope:eqversion:4.7

Trust: 0.3

vendor:schneider electricmodel:pro-face gp-pro exscope:neversion:4.7.100

Trust: 0.3

vendor:pro face gp pro exmodel: - scope:eqversion:4.07.000

Trust: 0.2

sources: IVD: 9d5553fd-7a78-4b9d-aa56-2beaa93655c1 // CNVD: CNVD-2017-22834 // BID: 100114 // JVNDB: JVNDB-2017-008556 // CNNVD: CNNVD-201706-1087 // NVD: CVE-2017-9961

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-9961
value: HIGH

Trust: 1.0

NVD: CVE-2017-9961
value: HIGH

Trust: 0.8

CNVD: CNVD-2017-22834
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201706-1087
value: HIGH

Trust: 0.6

IVD: 9d5553fd-7a78-4b9d-aa56-2beaa93655c1
value: HIGH

Trust: 0.2

nvd@nist.gov: CVE-2017-9961
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2017-22834
severity: MEDIUM
baseScore: 5.6
vectorString: AV:L/AC:H/AU:N/C:N/I:C/A:C
accessVector: LOCAL
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: NONE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 1.9
impactScore: 9.2
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 9d5553fd-7a78-4b9d-aa56-2beaa93655c1
severity: MEDIUM
baseScore: 5.6
vectorString: AV:L/AC:H/AU:N/C:N/I:C/A:C
accessVector: LOCAL
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: NONE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 1.9
impactScore: 9.2
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

nvd@nist.gov: CVE-2017-9961
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: IVD: 9d5553fd-7a78-4b9d-aa56-2beaa93655c1 // CNVD: CNVD-2017-22834 // JVNDB: JVNDB-2017-008556 // CNNVD: CNNVD-201706-1087 // NVD: CVE-2017-9961

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:CWE-284

Trust: 0.8

sources: JVNDB: JVNDB-2017-008556 // NVD: CVE-2017-9961

THREAT TYPE

local

Trust: 0.9

sources: BID: 100114 // CNNVD: CNNVD-201706-1087

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201706-1087

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-008556

PATCH

title:SEVD-2017-195-01url:http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2017-195-01

Trust: 0.8

title:Patch for Schneider Electric Pro-face GP-Pro EX arbitrary code execution vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/100839

Trust: 0.6

title:Schneider Electric Pro-face GP-Pro EX Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=99880

Trust: 0.6

sources: CNVD: CNVD-2017-22834 // JVNDB: JVNDB-2017-008556 // CNNVD: CNNVD-201706-1087

EXTERNAL IDS

db:NVDid:CVE-2017-9961

Trust: 3.5

db:BIDid:100114

Trust: 1.9

db:SCHNEIDERid:SEVD-2017-195-01

Trust: 1.6

db:ICS CERTid:ICSA-17-215-01

Trust: 0.9

db:CNVDid:CNVD-2017-22834

Trust: 0.8

db:CNNVDid:CNNVD-201706-1087

Trust: 0.8

db:JVNDBid:JVNDB-2017-008556

Trust: 0.8

db:IVDid:9D5553FD-7A78-4B9D-AA56-2BEAA93655C1

Trust: 0.2

sources: IVD: 9d5553fd-7a78-4b9d-aa56-2beaa93655c1 // CNVD: CNVD-2017-22834 // BID: 100114 // JVNDB: JVNDB-2017-008556 // CNNVD: CNNVD-201706-1087 // NVD: CVE-2017-9961

REFERENCES

url:http://www.schneider-electric.com/en/download/document/sevd-2017-195-01/

Trust: 1.6

url:http://www.securityfocus.com/bid/100114

Trust: 1.6

url:https://ics-cert.us-cert.gov/advisories/icsa-17-215-01

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-9961

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-9961

Trust: 0.8

url:http://www.schneider-electric.com/site/home/index.cfm/ww/?selectcountry=true

Trust: 0.3

sources: CNVD: CNVD-2017-22834 // BID: 100114 // JVNDB: JVNDB-2017-008556 // CNNVD: CNNVD-201706-1087 // NVD: CVE-2017-9961

CREDITS

Karn Ganeshen

Trust: 0.3

sources: BID: 100114

SOURCES

db:IVDid:9d5553fd-7a78-4b9d-aa56-2beaa93655c1
db:CNVDid:CNVD-2017-22834
db:BIDid:100114
db:JVNDBid:JVNDB-2017-008556
db:CNNVDid:CNNVD-201706-1087
db:NVDid:CVE-2017-9961

LAST UPDATE DATE

2025-04-20T23:30:52.482000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2017-22834date:2017-08-25T00:00:00
db:BIDid:100114date:2017-08-03T00:00:00
db:JVNDBid:JVNDB-2017-008556date:2017-10-23T00:00:00
db:CNNVDid:CNNVD-201706-1087date:2019-10-23T00:00:00
db:NVDid:CVE-2017-9961date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:IVDid:9d5553fd-7a78-4b9d-aa56-2beaa93655c1date:2017-08-25T00:00:00
db:CNVDid:CNVD-2017-22834date:2017-08-25T00:00:00
db:BIDid:100114date:2017-08-03T00:00:00
db:JVNDBid:JVNDB-2017-008556date:2017-10-23T00:00:00
db:CNNVDid:CNNVD-201706-1087date:2017-06-27T00:00:00
db:NVDid:CVE-2017-9961date:2017-09-26T01:29:04.007