Search criteria
6 vulnerabilities found for Zelio Soft 2 by Schneider Electric
CVE-2024-8518 (GCVE-0-2024-8518)
Vulnerability from cvelistv5 – Published: 2024-10-08 10:12 – Updated: 2024-10-08 13:51- CWE-20 - Improper Input Validation
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Schneider Electric | Zelio Soft 2 |
Affected:
Versions prior to 5.4.2.2
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-8518",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-08T12:43:34.444260Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-08T13:51:42.894Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Zelio Soft 2",
"vendor": "Schneider Electric",
"versions": [
{
"status": "affected",
"version": "Versions prior to 5.4.2.2"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "CWE-20: Improper Input Validation vulnerability exists that could cause a crash of the Zelio Soft\n2 application when a specially crafted project file is loaded by an application user."
}
],
"value": "CWE-20: Improper Input Validation vulnerability exists that could cause a crash of the Zelio Soft\n2 application when a specially crafted project file is loaded by an application user."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20 Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-08T10:12:52.204Z",
"orgId": "076d1eb6-cfab-4401-b34d-6dfc2a413bdb",
"shortName": "schneider"
},
"references": [
{
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-282-06\u0026p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=SEVD-2024-282-06.pdf"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "076d1eb6-cfab-4401-b34d-6dfc2a413bdb",
"assignerShortName": "schneider",
"cveId": "CVE-2024-8518",
"datePublished": "2024-10-08T10:12:52.204Z",
"dateReserved": "2024-09-06T14:42:44.193Z",
"dateUpdated": "2024-10-08T13:51:42.894Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-8422 (GCVE-0-2024-8422)
Vulnerability from cvelistv5 – Published: 2024-10-08 10:09 – Updated: 2024-10-08 13:51- CWE-416 - Use After Free
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Schneider Electric | Zelio Soft 2 |
Affected:
Versions prior to 5.4.2.2
|
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:schneider-electric:zelio_soft_2:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "zelio_soft_2",
"vendor": "schneider-electric",
"versions": [
{
"lessThan": "5.4.2.2",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-8422",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-08T12:43:43.813201Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-08T13:51:54.776Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Zelio Soft 2",
"vendor": "Schneider Electric",
"versions": [
{
"status": "affected",
"version": "Versions prior to 5.4.2.2"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "CWE-416: Use After Free vulnerability exists that could cause arbitrary code execution, denial\nof service and loss of confidentiality \u0026amp; integrity when application user opens a malicious Zelio\nSoft 2 project file."
}
],
"value": "CWE-416: Use After Free vulnerability exists that could cause arbitrary code execution, denial\nof service and loss of confidentiality \u0026 integrity when application user opens a malicious Zelio\nSoft 2 project file."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-416",
"description": "CWE-416 Use After Free",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-08T10:09:34.543Z",
"orgId": "076d1eb6-cfab-4401-b34d-6dfc2a413bdb",
"shortName": "schneider"
},
"references": [
{
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-282-06\u0026p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=SEVD-2024-282-06.pdf"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "076d1eb6-cfab-4401-b34d-6dfc2a413bdb",
"assignerShortName": "schneider",
"cveId": "CVE-2024-8422",
"datePublished": "2024-10-08T10:09:34.543Z",
"dateReserved": "2024-09-04T14:02:49.645Z",
"dateUpdated": "2024-10-08T13:51:54.776Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-8518 (GCVE-0-2024-8518)
Vulnerability from nvd – Published: 2024-10-08 10:12 – Updated: 2024-10-08 13:51- CWE-20 - Improper Input Validation
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Schneider Electric | Zelio Soft 2 |
Affected:
Versions prior to 5.4.2.2
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-8518",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-08T12:43:34.444260Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-08T13:51:42.894Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Zelio Soft 2",
"vendor": "Schneider Electric",
"versions": [
{
"status": "affected",
"version": "Versions prior to 5.4.2.2"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "CWE-20: Improper Input Validation vulnerability exists that could cause a crash of the Zelio Soft\n2 application when a specially crafted project file is loaded by an application user."
}
],
"value": "CWE-20: Improper Input Validation vulnerability exists that could cause a crash of the Zelio Soft\n2 application when a specially crafted project file is loaded by an application user."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20 Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-08T10:12:52.204Z",
"orgId": "076d1eb6-cfab-4401-b34d-6dfc2a413bdb",
"shortName": "schneider"
},
"references": [
{
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-282-06\u0026p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=SEVD-2024-282-06.pdf"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "076d1eb6-cfab-4401-b34d-6dfc2a413bdb",
"assignerShortName": "schneider",
"cveId": "CVE-2024-8518",
"datePublished": "2024-10-08T10:12:52.204Z",
"dateReserved": "2024-09-06T14:42:44.193Z",
"dateUpdated": "2024-10-08T13:51:42.894Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-8422 (GCVE-0-2024-8422)
Vulnerability from nvd – Published: 2024-10-08 10:09 – Updated: 2024-10-08 13:51- CWE-416 - Use After Free
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Schneider Electric | Zelio Soft 2 |
Affected:
Versions prior to 5.4.2.2
|
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:schneider-electric:zelio_soft_2:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "zelio_soft_2",
"vendor": "schneider-electric",
"versions": [
{
"lessThan": "5.4.2.2",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-8422",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-08T12:43:43.813201Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-08T13:51:54.776Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Zelio Soft 2",
"vendor": "Schneider Electric",
"versions": [
{
"status": "affected",
"version": "Versions prior to 5.4.2.2"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "CWE-416: Use After Free vulnerability exists that could cause arbitrary code execution, denial\nof service and loss of confidentiality \u0026amp; integrity when application user opens a malicious Zelio\nSoft 2 project file."
}
],
"value": "CWE-416: Use After Free vulnerability exists that could cause arbitrary code execution, denial\nof service and loss of confidentiality \u0026 integrity when application user opens a malicious Zelio\nSoft 2 project file."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-416",
"description": "CWE-416 Use After Free",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-08T10:09:34.543Z",
"orgId": "076d1eb6-cfab-4401-b34d-6dfc2a413bdb",
"shortName": "schneider"
},
"references": [
{
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-282-06\u0026p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=SEVD-2024-282-06.pdf"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "076d1eb6-cfab-4401-b34d-6dfc2a413bdb",
"assignerShortName": "schneider",
"cveId": "CVE-2024-8422",
"datePublished": "2024-10-08T10:09:34.543Z",
"dateReserved": "2024-09-04T14:02:49.645Z",
"dateUpdated": "2024-10-08T13:51:54.776Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
VAR-201902-0690
Vulnerability from variot - Updated: 2023-12-18 13:33A Use After Free (CWE-416) vulnerability exists in Zelio Soft 2 v5.1 and prior versions which could cause remote code execution when opening a specially crafted Zelio Soft project file. Zelio Soft 2 Contains a vulnerability in the use of freed memory.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Schneider Electric ZelioSoft 2. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of ZM2 files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the Zelio2 process. Schneider Electric Zelio Soft is a set of logic controller programming software from Schneider Electric of France.
Schneider Electric Zelio Soft has a resource management error vulnerability. Zelio Soft 2 Versions 5.1 and prior are vulnerable
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201902-0690",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "zelio soft 2",
"scope": "lte",
"trust": 1.8,
"vendor": "schneider electric",
"version": "5.1"
},
{
"model": "zelio soft 2",
"scope": null,
"trust": 1.4,
"vendor": "schneider electric",
"version": null
},
{
"model": "electric zelio soft",
"scope": "lte",
"trust": 0.6,
"vendor": "schneider",
"version": "\u003c=2.5.1"
},
{
"model": "zelio soft",
"scope": "eq",
"trust": 0.3,
"vendor": "schneider electric",
"version": "25.1"
},
{
"model": "zelio soft",
"scope": "ne",
"trust": 0.3,
"vendor": "schneider electric",
"version": "25.2"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "zelio soft 2",
"version": "*"
}
],
"sources": [
{
"db": "IVD",
"id": "2528b8cc-a329-4001-8499-1bacd3249546"
},
{
"db": "ZDI",
"id": "ZDI-19-004"
},
{
"db": "ZDI",
"id": "ZDI-19-005"
},
{
"db": "CNVD",
"id": "CNVD-2019-45189"
},
{
"db": "BID",
"id": "106481"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-014379"
},
{
"db": "NVD",
"id": "CVE-2018-7817"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:schneider-electric:zelio_soft_2:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "5.1",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2018-7817"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "rgod and mdm of 9sg Security Team",
"sources": [
{
"db": "ZDI",
"id": "ZDI-19-004"
}
],
"trust": 0.7
},
"cve": "CVE-2018-7817",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": true,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Local",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 4.4,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2018-7817",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CNVD-2019-45189",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "2528b8cc-a329-4001-8499-1bacd3249546",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.9 [IVD]"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "ZDI",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2018-7817",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.4,
"userInteraction": "REQUIRED",
"vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 7.3,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2018-7817",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "Low",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2018-7817",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "ZDI",
"id": "CVE-2018-7817",
"trust": 1.4,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2019-45189",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201901-186",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "IVD",
"id": "2528b8cc-a329-4001-8499-1bacd3249546",
"trust": 0.2,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "2528b8cc-a329-4001-8499-1bacd3249546"
},
{
"db": "ZDI",
"id": "ZDI-19-004"
},
{
"db": "ZDI",
"id": "ZDI-19-005"
},
{
"db": "CNVD",
"id": "CNVD-2019-45189"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-014379"
},
{
"db": "NVD",
"id": "CVE-2018-7817"
},
{
"db": "CNNVD",
"id": "CNNVD-201901-186"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "A Use After Free (CWE-416) vulnerability exists in Zelio Soft 2 v5.1 and prior versions which could cause remote code execution when opening a specially crafted Zelio Soft project file. Zelio Soft 2 Contains a vulnerability in the use of freed memory.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Schneider Electric ZelioSoft 2. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of ZM2 files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the Zelio2 process. Schneider Electric Zelio Soft is a set of logic controller programming software from Schneider Electric of France. \n\nSchneider Electric Zelio Soft has a resource management error vulnerability. \nZelio Soft 2 Versions 5.1 and prior are vulnerable",
"sources": [
{
"db": "NVD",
"id": "CVE-2018-7817"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-014379"
},
{
"db": "ZDI",
"id": "ZDI-19-004"
},
{
"db": "ZDI",
"id": "ZDI-19-005"
},
{
"db": "CNVD",
"id": "CNVD-2019-45189"
},
{
"db": "BID",
"id": "106481"
},
{
"db": "IVD",
"id": "2528b8cc-a329-4001-8499-1bacd3249546"
}
],
"trust": 3.87
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2018-7817",
"trust": 4.9
},
{
"db": "ICS CERT",
"id": "ICSA-19-008-01",
"trust": 2.7
},
{
"db": "SCHNEIDER",
"id": "SEVD-2018-361-01",
"trust": 2.5
},
{
"db": "BID",
"id": "106481",
"trust": 1.9
},
{
"db": "CNVD",
"id": "CNVD-2019-45189",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201901-186",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2018-014379",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-7100",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-19-004",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-7099",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-19-005",
"trust": 0.7
},
{
"db": "IVD",
"id": "2528B8CC-A329-4001-8499-1BACD3249546",
"trust": 0.2
}
],
"sources": [
{
"db": "IVD",
"id": "2528b8cc-a329-4001-8499-1bacd3249546"
},
{
"db": "ZDI",
"id": "ZDI-19-004"
},
{
"db": "ZDI",
"id": "ZDI-19-005"
},
{
"db": "CNVD",
"id": "CNVD-2019-45189"
},
{
"db": "BID",
"id": "106481"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-014379"
},
{
"db": "NVD",
"id": "CVE-2018-7817"
},
{
"db": "CNNVD",
"id": "CNNVD-201901-186"
}
]
},
"id": "VAR-201902-0690",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "2528b8cc-a329-4001-8499-1bacd3249546"
},
{
"db": "CNVD",
"id": "CNVD-2019-45189"
}
],
"trust": 1.8
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "2528b8cc-a329-4001-8499-1bacd3249546"
},
{
"db": "CNVD",
"id": "CNVD-2019-45189"
}
]
},
"last_update_date": "2023-12-18T13:33:33.698000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Schneider Electric has issued an update to correct this vulnerability.",
"trust": 1.4,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-19-008-01"
},
{
"title": "SEVD-2018-361-01",
"trust": 0.8,
"url": "https://www.schneider-electric.com/en/download/document/sevd-2018-361-01/"
},
{
"title": "Patch for Schneider Electric Zelio Soft Resource Management Error Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/194029"
},
{
"title": "Schneider Electric Zelio Soft Security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=88389"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-19-004"
},
{
"db": "ZDI",
"id": "ZDI-19-005"
},
{
"db": "CNVD",
"id": "CNVD-2019-45189"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-014379"
},
{
"db": "CNNVD",
"id": "CNNVD-201901-186"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-416",
"trust": 1.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-014379"
},
{
"db": "NVD",
"id": "CVE-2018-7817"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 4.1,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-19-008-01"
},
{
"trust": 2.5,
"url": "https://www.schneider-electric.com/en/download/document/sevd-2018-361-01/"
},
{
"trust": 2.2,
"url": "http://www.securityfocus.com/bid/106481"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-7817"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7817"
},
{
"trust": 0.6,
"url": "https://www.schneider-electric.com/en/download/document/sevd-2018-361-01/vendor advisory"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/bid/106481third party advisoryvdb entry"
},
{
"trust": 0.3,
"url": "http://www.schneider-electric.com/site/home/index.cfm/ww/?selectcountry=true"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-19-004"
},
{
"db": "ZDI",
"id": "ZDI-19-005"
},
{
"db": "CNVD",
"id": "CNVD-2019-45189"
},
{
"db": "BID",
"id": "106481"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-014379"
},
{
"db": "NVD",
"id": "CVE-2018-7817"
},
{
"db": "CNNVD",
"id": "CNNVD-201901-186"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "2528b8cc-a329-4001-8499-1bacd3249546"
},
{
"db": "ZDI",
"id": "ZDI-19-004"
},
{
"db": "ZDI",
"id": "ZDI-19-005"
},
{
"db": "CNVD",
"id": "CNVD-2019-45189"
},
{
"db": "BID",
"id": "106481"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-014379"
},
{
"db": "NVD",
"id": "CVE-2018-7817"
},
{
"db": "CNNVD",
"id": "CNNVD-201901-186"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-12-13T00:00:00",
"db": "IVD",
"id": "2528b8cc-a329-4001-8499-1bacd3249546"
},
{
"date": "2019-01-09T00:00:00",
"db": "ZDI",
"id": "ZDI-19-004"
},
{
"date": "2019-01-09T00:00:00",
"db": "ZDI",
"id": "ZDI-19-005"
},
{
"date": "2019-12-13T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-45189"
},
{
"date": "2019-01-08T00:00:00",
"db": "BID",
"id": "106481"
},
{
"date": "2019-03-19T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-014379"
},
{
"date": "2019-02-06T23:29:00.590000",
"db": "NVD",
"id": "CVE-2018-7817"
},
{
"date": "2019-01-10T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201901-186"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-01-09T00:00:00",
"db": "ZDI",
"id": "ZDI-19-004"
},
{
"date": "2019-01-09T00:00:00",
"db": "ZDI",
"id": "ZDI-19-005"
},
{
"date": "2019-12-13T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-45189"
},
{
"date": "2019-02-08T04:00:00",
"db": "BID",
"id": "106481"
},
{
"date": "2019-03-25T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-014379"
},
{
"date": "2019-10-09T23:42:31.410000",
"db": "NVD",
"id": "CVE-2018-7817"
},
{
"date": "2019-10-17T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201901-186"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201901-186"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Schneider Electric Zelio Soft Resource Management Error Vulnerability",
"sources": [
{
"db": "IVD",
"id": "2528b8cc-a329-4001-8499-1bacd3249546"
},
{
"db": "CNVD",
"id": "CNVD-2019-45189"
},
{
"db": "CNNVD",
"id": "CNNVD-201901-186"
}
],
"trust": 1.4
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Resource management error",
"sources": [
{
"db": "IVD",
"id": "2528b8cc-a329-4001-8499-1bacd3249546"
},
{
"db": "CNNVD",
"id": "CNNVD-201901-186"
}
],
"trust": 0.8
}
}
VAR-201907-0067
Vulnerability from variot - Updated: 2022-05-04 09:10A Use After Free: CWE-416 vulnerability exists in Zelio Soft 2, V5.2 and earlier, which could cause remote code execution when opening a specially crafted Zelio Soft 2 project file. Zelio Soft 2 Contains a vulnerability in the use of freed memory.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Schneider Electric ZelioSoft 2. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of ZM2 files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Schneider Electric Zelio Soft 2 version 5.2 and prior are vulnerable
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201907-0067",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "zelio soft 2",
"scope": "lte",
"trust": 1.8,
"vendor": "schneider electric",
"version": "5.2"
},
{
"model": "zelio soft 2",
"scope": null,
"trust": 0.7,
"vendor": "schneider electric",
"version": null
},
{
"model": "zelio soft",
"scope": "eq",
"trust": 0.3,
"vendor": "schneider electric",
"version": "25.2"
},
{
"model": "zelio soft",
"scope": "eq",
"trust": 0.3,
"vendor": "schneider electric",
"version": "25.1"
},
{
"model": "zelio soft",
"scope": "ne",
"trust": 0.3,
"vendor": "schneider electric",
"version": "25.3"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-19-658"
},
{
"db": "BID",
"id": "109100"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-006480"
},
{
"db": "NVD",
"id": "CVE-2019-6822"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:schneider-electric:zelio_soft_2:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "5.2",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2019-6822"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "9sg Security Team working with Trend Micro Zero Day Initiative",
"sources": [
{
"db": "BID",
"id": "109100"
},
{
"db": "CNNVD",
"id": "CNNVD-201907-521"
}
],
"trust": 0.9
},
"cve": "CVE-2019-6822",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 6.8,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2019-6822",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 1.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 7.8,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2019-6822",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 1.8,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "ZDI",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2019-6822",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 0.7,
"userInteraction": "REQUIRED",
"vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2019-6822",
"trust": 1.8,
"value": "High"
},
{
"author": "ZDI",
"id": "CVE-2019-6822",
"trust": 0.7,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201907-521",
"trust": 0.6,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-19-658"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-006480"
},
{
"db": "CNNVD",
"id": "CNNVD-201907-521"
},
{
"db": "NVD",
"id": "CVE-2019-6822"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "A Use After Free: CWE-416 vulnerability exists in Zelio Soft 2, V5.2 and earlier, which could cause remote code execution when opening a specially crafted Zelio Soft 2 project file. Zelio Soft 2 Contains a vulnerability in the use of freed memory.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Schneider Electric ZelioSoft 2. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of ZM2 files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. \nSchneider Electric Zelio Soft 2 version 5.2 and prior are vulnerable",
"sources": [
{
"db": "NVD",
"id": "CVE-2019-6822"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-006480"
},
{
"db": "ZDI",
"id": "ZDI-19-658"
},
{
"db": "BID",
"id": "109100"
}
],
"trust": 2.52
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2019-6822",
"trust": 3.4
},
{
"db": "ICS CERT",
"id": "ICSA-19-190-03",
"trust": 2.7
},
{
"db": "ZDI",
"id": "ZDI-19-658",
"trust": 2.3
},
{
"db": "BID",
"id": "109100",
"trust": 1.9
},
{
"db": "SCHNEIDER",
"id": "SEVD-2019-190-01",
"trust": 1.6
},
{
"db": "JVNDB",
"id": "JVNDB-2019-006480",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-7895",
"trust": 0.7
},
{
"db": "AUSCERT",
"id": "ESB-2019.2523",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-201907-521",
"trust": 0.6
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-19-658"
},
{
"db": "BID",
"id": "109100"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-006480"
},
{
"db": "CNNVD",
"id": "CNNVD-201907-521"
},
{
"db": "NVD",
"id": "CVE-2019-6822"
}
]
},
"id": "VAR-201907-0067",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VARIoT devices database",
"id": null
}
],
"trust": 0.42424244
},
"last_update_date": "2022-05-04T09:10:15.048000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "SEVD-2019-190-01",
"trust": 0.8,
"url": "https://www.schneider-electric.com/ww/en/download/document/sevd-2019-190-01"
},
{
"title": "Schneider Electric has issued an update to correct this vulnerability.",
"trust": 0.7,
"url": "https://www.us-cert.gov/ics/advisories/icsa-19-190-03"
},
{
"title": "Schneider Electric Zelio Soft 2 Remediation of resource management error vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=94654"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-19-658"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-006480"
},
{
"db": "CNNVD",
"id": "CNNVD-201907-521"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-416",
"trust": 1.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-006480"
},
{
"db": "NVD",
"id": "CVE-2019-6822"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.4,
"url": "https://www.us-cert.gov/ics/advisories/icsa-19-190-03"
},
{
"trust": 2.2,
"url": "https://www.securityfocus.com/bid/109100"
},
{
"trust": 1.6,
"url": "https://www.schneider-electric.com/ww/en/download/document/sevd-2019-190-01"
},
{
"trust": 1.6,
"url": "https://www.zerodayinitiative.com/advisories/zdi-19-658/"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-6822"
},
{
"trust": 0.9,
"url": "http://www.schneider-electric.com/products/ww/en/"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-6822"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2019.2523/"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-19-658"
},
{
"db": "BID",
"id": "109100"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-006480"
},
{
"db": "CNNVD",
"id": "CNNVD-201907-521"
},
{
"db": "NVD",
"id": "CVE-2019-6822"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "ZDI",
"id": "ZDI-19-658"
},
{
"db": "BID",
"id": "109100"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-006480"
},
{
"db": "CNNVD",
"id": "CNNVD-201907-521"
},
{
"db": "NVD",
"id": "CVE-2019-6822"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-07-10T00:00:00",
"db": "ZDI",
"id": "ZDI-19-658"
},
{
"date": "2019-07-09T00:00:00",
"db": "BID",
"id": "109100"
},
{
"date": "2019-07-22T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-006480"
},
{
"date": "2019-07-09T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201907-521"
},
{
"date": "2019-07-15T21:15:00",
"db": "NVD",
"id": "CVE-2019-6822"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-07-10T00:00:00",
"db": "ZDI",
"id": "ZDI-19-658"
},
{
"date": "2019-07-09T00:00:00",
"db": "BID",
"id": "109100"
},
{
"date": "2019-08-05T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-006480"
},
{
"date": "2019-07-23T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201907-521"
},
{
"date": "2019-07-22T20:15:00",
"db": "NVD",
"id": "CVE-2019-6822"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201907-521"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Zelio Soft 2 Uses freed memory vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-006480"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "resource management error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201907-521"
}
],
"trust": 0.6
}
}