ID

VAR-202010-0506


CVE

CVE-2020-26867


TITLE

ARC Informatique PcVue  Untrusted Data Deserialization Vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2020-012253

DESCRIPTION

ARC Informatique PcVue prior to version 12.0.17 is vulnerable due to the deserialization of untrusted data, which may allow an attacker to remotely execute arbitrary code on the web and mobile back-end server. ARC Informatique PcVue There is a vulnerability in deserialization of untrusted data.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Pcvue is a multifunctional HMI-SCADA software of ARC Informatique, an integrated solution that can monitor all aspects of customer assets. PcVue is widely used in industrial control, building management, energy management, smart grid, energy distribution, substation automation, security/fire protection systems, public facilities, material handling, transportation, renewable energy, and infrastructure. PcVue 8.10 and later versions have a remote code execution vulnerability. The vulnerability stems from a remote code execution vulnerability due to the unsafe deserialization of messages received on the interface. Attackers can use this vulnerability to execute code

Trust: 2.25

sources: NVD: CVE-2020-26867 // JVNDB: JVNDB-2020-012253 // CNVD: CNVD-2020-57822 // VULMON: CVE-2020-26867

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2020-57822

AFFECTED PRODUCTS

vendor:pcvuesolutionsmodel:pcvuescope:gteversion:8.10

Trust: 1.0

vendor:pcvuesolutionsmodel:pcvuescope:ltversion:12.0.17

Trust: 1.0

vendor:arc informatiquemodel:pcvuescope:eqversion: -

Trust: 0.8

vendor:arc informatiquemodel:pcvuescope:ltversion:12.0.17 less than

Trust: 0.8

vendor:arcmodel:informatique pcvuescope:gteversion:8.10

Trust: 0.6

sources: CNVD: CNVD-2020-57822 // JVNDB: JVNDB-2020-012253 // NVD: CVE-2020-26867

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-26867
value: CRITICAL

Trust: 1.0

vulnerability@kaspersky.com: CVE-2020-26867
value: CRITICAL

Trust: 1.0

NVD: CVE-2020-26867
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2020-57822
value: HIGH

Trust: 0.6

CNNVD: CNNVD-202010-437
value: CRITICAL

Trust: 0.6

VULMON: CVE-2020-26867
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2020-26867
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2020-57822
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2020-26867
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 2.0

OTHER: JVNDB-2020-012253
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2020-57822 // VULMON: CVE-2020-26867 // JVNDB: JVNDB-2020-012253 // CNNVD: CNNVD-202010-437 // NVD: CVE-2020-26867 // NVD: CVE-2020-26867

PROBLEMTYPE DATA

problemtype:CWE-502

Trust: 1.0

problemtype:Deserialization of untrusted data (CWE-502) [NVD Evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2020-012253 // NVD: CVE-2020-26867

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202010-437

TYPE

code problem

Trust: 0.6

sources: CNNVD: CNNVD-202010-437

PATCH

title:Security Alertsurl:https://www.pcvuesolutions.com/security

Trust: 0.8

title:Patch for ARC Informatique PcVue remote code execution vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/236968

Trust: 0.6

sources: CNVD: CNVD-2020-57822 // JVNDB: JVNDB-2020-012253

EXTERNAL IDS

db:NVDid:CVE-2020-26867

Trust: 3.1

db:ICS CERTid:ICSA-20-308-03

Trust: 2.4

db:JVNid:JVNVU95679259

Trust: 0.8

db:JVNDBid:JVNDB-2020-012253

Trust: 0.8

db:CNVDid:CNVD-2020-57822

Trust: 0.6

db:AUSCERTid:ESB-2020.3796

Trust: 0.6

db:CNNVDid:CNNVD-202010-437

Trust: 0.6

db:VULMONid:CVE-2020-26867

Trust: 0.1

sources: CNVD: CNVD-2020-57822 // VULMON: CVE-2020-26867 // JVNDB: JVNDB-2020-012253 // CNNVD: CNNVD-202010-437 // NVD: CVE-2020-26867

REFERENCES

url:https://us-cert.cisa.gov/ics/advisories/icsa-20-308-03

Trust: 3.0

url:https://ics-cert.kaspersky.com/advisories/klcert-advisories/2020/10/09/klcert-20-015-remote-code-execution-in-arc-informatique-pcvue/

Trust: 2.5

url:https://nvd.nist.gov/vuln/detail/cve-2020-26867

Trust: 2.0

url:https://www.pcvuesolutions.com/support/index.php/en/security-bulletin/1076-security-bulletin-2020-1

Trust: 1.6

url:https://www.pcvuesolutions.com/security

Trust: 1.6

url:https://jvn.jp/vu/jvnvu95679259/index.html

Trust: 0.8

url:https://www.pcvuesolutions.com/index.php/support-a-services/resources/security-alerts-95138

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.3796/

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/502.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2020-57822 // VULMON: CVE-2020-26867 // JVNDB: JVNDB-2020-012253 // CNNVD: CNNVD-202010-437 // NVD: CVE-2020-26867

SOURCES

db:CNVDid:CNVD-2020-57822
db:VULMONid:CVE-2020-26867
db:JVNDBid:JVNDB-2020-012253
db:CNNVDid:CNNVD-202010-437
db:NVDid:CVE-2020-26867

LAST UPDATE DATE

2024-11-23T22:33:17.346000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2020-57822date:2020-10-21T00:00:00
db:VULMONid:CVE-2020-26867date:2020-12-18T00:00:00
db:JVNDBid:JVNDB-2020-012253date:2021-04-27T09:05:00
db:CNNVDid:CNNVD-202010-437date:2020-12-24T00:00:00
db:NVDid:CVE-2020-26867date:2024-11-21T05:20:23.010

SOURCES RELEASE DATE

db:CNVDid:CNVD-2020-57822date:2020-10-21T00:00:00
db:VULMONid:CVE-2020-26867date:2020-10-12T00:00:00
db:JVNDBid:JVNDB-2020-012253date:2021-04-27T00:00:00
db:CNNVDid:CNNVD-202010-437date:2020-10-12T00:00:00
db:NVDid:CVE-2020-26867date:2020-10-12T14:15:12.260