ID

VAR-201802-0617


CVE

CVE-2017-9970


TITLE

Schneider Electric StruxureOn Gateway Remote code execution vulnerability

Trust: 0.8

sources: IVD: e2e3c6c1-39ab-11e9-a1ec-000c29342cb1 // CNVD: CNVD-2018-03480

DESCRIPTION

A remote code execution vulnerability exists in Schneider Electric's StruxureOn Gateway versions 1.1.3 and prior. Uploading a zip which contains carefully crafted metadata allows for the file to be uploaded to any directory on the host machine information which could lead to remote code execution. Schneider Electric StruxureOn Gateway Contains a vulnerability related to unlimited uploads of dangerous types of files.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Schneider Electric StruxureOn Gateway is a security gateway software from Schneider Electric, France. The software manages network devices and provides monitoring and alerting services through the data center. An attacker may leverage these issues to upload arbitrary files to the affected computer; this can result in arbitrary code execution within the context of the vulnerable application

Trust: 2.7

sources: NVD: CVE-2017-9970 // JVNDB: JVNDB-2017-012626 // CNVD: CNVD-2018-03480 // BID: 103052 // IVD: e2e3c6c1-39ab-11e9-a1ec-000c29342cb1 // VULHUB: VHN-118173

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: e2e3c6c1-39ab-11e9-a1ec-000c29342cb1 // CNVD: CNVD-2018-03480

AFFECTED PRODUCTS

vendor:schneider electricmodel:struxureon gatewayscope:lteversion:1.1.3

Trust: 1.8

vendor:schneidermodel:electric struxureon gatewayscope:lteversion:<=1.1.3

Trust: 0.6

vendor:schneider electricmodel:struxureon gatewayscope:eqversion:1.1.3

Trust: 0.6

vendor:schneider electricmodel:struxureon gatewayscope:eqversion:1.0

Trust: 0.3

vendor:schneider electricmodel:struxureon gatewayscope:neversion:1.2

Trust: 0.3

vendor:struxureon gatewaymodel: - scope:eqversion:*

Trust: 0.2

sources: IVD: e2e3c6c1-39ab-11e9-a1ec-000c29342cb1 // CNVD: CNVD-2018-03480 // BID: 103052 // JVNDB: JVNDB-2017-012626 // CNNVD: CNNVD-201706-1078 // NVD: CVE-2017-9970

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-9970
value: HIGH

Trust: 1.0

NVD: CVE-2017-9970
value: HIGH

Trust: 0.8

CNVD: CNVD-2018-03480
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201706-1078
value: CRITICAL

Trust: 0.6

IVD: e2e3c6c1-39ab-11e9-a1ec-000c29342cb1
value: CRITICAL

Trust: 0.2

VULHUB: VHN-118173
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2017-9970
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2018-03480
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: e2e3c6c1-39ab-11e9-a1ec-000c29342cb1
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-118173
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-9970
baseSeverity: HIGH
baseScore: 7.2
vectorString: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.2
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: IVD: e2e3c6c1-39ab-11e9-a1ec-000c29342cb1 // CNVD: CNVD-2018-03480 // VULHUB: VHN-118173 // JVNDB: JVNDB-2017-012626 // CNNVD: CNNVD-201706-1078 // NVD: CVE-2017-9970

PROBLEMTYPE DATA

problemtype:CWE-434

Trust: 1.9

sources: VULHUB: VHN-118173 // JVNDB: JVNDB-2017-012626 // NVD: CVE-2017-9970

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201706-1078

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201706-1078

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-012626

PATCH

title:SEVD-2018-039-01url:https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet&p_File_Id=9555022265&p_File_Name=SEVD-2018-039-01+Struxureon+Gateway.pdf&p_Reference=SEVD-2018-039-01

Trust: 0.8

title:Patch for Schneider Electric StruxureOn Gateway Remote Code Execution Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/117905

Trust: 0.6

sources: CNVD: CNVD-2018-03480 // JVNDB: JVNDB-2017-012626

EXTERNAL IDS

db:NVDid:CVE-2017-9970

Trust: 3.6

db:ICS CERTid:ICSA-18-046-04

Trust: 2.8

db:BIDid:103052

Trust: 2.0

db:SCHNEIDERid:SEVD-2018-039-01

Trust: 2.0

db:CNNVDid:CNNVD-201706-1078

Trust: 0.9

db:CNVDid:CNVD-2018-03480

Trust: 0.8

db:JVNDBid:JVNDB-2017-012626

Trust: 0.8

db:IVDid:E2E3C6C1-39AB-11E9-A1EC-000C29342CB1

Trust: 0.2

db:SEEBUGid:SSVID-99012

Trust: 0.1

db:VULHUBid:VHN-118173

Trust: 0.1

sources: IVD: e2e3c6c1-39ab-11e9-a1ec-000c29342cb1 // CNVD: CNVD-2018-03480 // VULHUB: VHN-118173 // BID: 103052 // JVNDB: JVNDB-2017-012626 // CNNVD: CNNVD-201706-1078 // NVD: CVE-2017-9970

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-18-046-04

Trust: 2.8

url:http://www.securityfocus.com/bid/103052

Trust: 1.7

url:https://www.schneider-electric.com/en/download/document/sevd-2018-039-01/

Trust: 1.7

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-9970

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-9970

Trust: 0.8

url:http://www.schneider-electric.com/site/home/index.cfm/ww/?selectcountry=true

Trust: 0.3

url:https://download.schneider-electric.com/files?p_endoctype=technical+leaflet&p_file_id=9105033564&p_file_name=sevd-2018-039-01+struxureon+gateway.pdf&p_reference=sevd-2018-039-01

Trust: 0.3

sources: CNVD: CNVD-2018-03480 // VULHUB: VHN-118173 // BID: 103052 // JVNDB: JVNDB-2017-012626 // CNNVD: CNNVD-201706-1078 // NVD: CVE-2017-9970

CREDITS

The vendor reported this issue.

Trust: 0.3

sources: BID: 103052

SOURCES

db:IVDid:e2e3c6c1-39ab-11e9-a1ec-000c29342cb1
db:CNVDid:CNVD-2018-03480
db:VULHUBid:VHN-118173
db:BIDid:103052
db:JVNDBid:JVNDB-2017-012626
db:CNNVDid:CNNVD-201706-1078
db:NVDid:CVE-2017-9970

LAST UPDATE DATE

2024-11-23T22:06:59.752000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2018-03480date:2018-02-26T00:00:00
db:VULHUBid:VHN-118173date:2018-03-09T00:00:00
db:BIDid:103052date:2018-02-15T00:00:00
db:JVNDBid:JVNDB-2017-012626date:2018-03-28T00:00:00
db:CNNVDid:CNNVD-201706-1078date:2018-02-13T00:00:00
db:NVDid:CVE-2017-9970date:2024-11-21T03:37:16.613

SOURCES RELEASE DATE

db:IVDid:e2e3c6c1-39ab-11e9-a1ec-000c29342cb1date:2018-02-26T00:00:00
db:CNVDid:CNVD-2018-03480date:2018-02-26T00:00:00
db:VULHUBid:VHN-118173date:2018-02-12T00:00:00
db:BIDid:103052date:2018-02-15T00:00:00
db:JVNDBid:JVNDB-2017-012626date:2018-03-28T00:00:00
db:CNNVDid:CNNVD-201706-1078date:2017-06-27T00:00:00
db:NVDid:CVE-2017-9970date:2018-02-12T23:29:00.450