CNVD-2021-25688

Vulnerability from cnvd - Published: 2021-04-08
VLAI Severity ?
Title
Schneider Electric Vijeo Designer和Vijeo Designer Basic信任管理问题漏洞
Description
Schneider Electric Vijeo Designer Basic和Schneider Electric Vijeo Designer都是法国施耐德电气(Schneider Electric)公司的一套用于HMI(人机界面)的编程和设计软件。 Schneider Electric Vijeo Designer Basic和Vijeo Designer存在信任管理问题漏洞。攻击者可利用该漏洞进行读取和写入操作。
Severity
Patch Name
Schneider Electric Vijeo Designer和Vijeo Designer Basic信任管理问题漏洞的补丁
Patch Description
Schneider Electric Vijeo Designer Basic和Schneider Electric Vijeo Designer都是法国施耐德电气(Schneider Electric)公司的一套用于HMI(人机界面)的编程和设计软件。 Schneider Electric Vijeo Designer Basic V1.1 HotFix 16及之前版本和Vijeo Designer V6.2 SP9及之前版本中存在信任管理问题漏洞。攻击者可利用该漏洞进行读取和写入操作。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

目前厂商已发布升级补丁以修复漏洞,补丁获取链接: https://www.se.com/ww/en/download/document/SEVD-2020-133-02/

Reference
https://nvd.nist.gov/vuln/detail/CVE-2020-7501
Impacted products
Name
['Schneider Electric Vijeo Designer Basic <=1.0', 'Schneider Electric Vijeo Designer Basic 1.1 basic', 'Schneider Electric Vijeo Designer Basic 1.1 hotfix_15 basic', 'Schneider Electric Vijeo Designer <=6.2', 'Schneider Electric Vijeo Designer 6.9', 'Schneider Electric Vijeo Designer 6.9 sp9']
Show details on source website

{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2020-7501"
    }
  },
  "description": "Schneider Electric Vijeo Designer Basic\u548cSchneider Electric Vijeo Designer\u90fd\u662f\u6cd5\u56fd\u65bd\u8010\u5fb7\u7535\u6c14\uff08Schneider Electric\uff09\u516c\u53f8\u7684\u4e00\u5957\u7528\u4e8eHMI\uff08\u4eba\u673a\u754c\u9762\uff09\u7684\u7f16\u7a0b\u548c\u8bbe\u8ba1\u8f6f\u4ef6\u3002\n\nSchneider Electric Vijeo Designer Basic\u548cVijeo Designer\u5b58\u5728\u4fe1\u4efb\u7ba1\u7406\u95ee\u9898\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u8fdb\u884c\u8bfb\u53d6\u548c\u5199\u5165\u64cd\u4f5c\u3002",
  "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://www.se.com/ww/en/download/document/SEVD-2020-133-02/",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2021-25688",
  "openTime": "2021-04-08",
  "patchDescription": "Schneider Electric Vijeo Designer Basic\u548cSchneider Electric Vijeo Designer\u90fd\u662f\u6cd5\u56fd\u65bd\u8010\u5fb7\u7535\u6c14\uff08Schneider Electric\uff09\u516c\u53f8\u7684\u4e00\u5957\u7528\u4e8eHMI\uff08\u4eba\u673a\u754c\u9762\uff09\u7684\u7f16\u7a0b\u548c\u8bbe\u8ba1\u8f6f\u4ef6\u3002\r\n\r\nSchneider Electric Vijeo Designer Basic V1.1 HotFix 16\u53ca\u4e4b\u524d\u7248\u672c\u548cVijeo Designer V6.2 SP9\u53ca\u4e4b\u524d\u7248\u672c\u4e2d\u5b58\u5728\u4fe1\u4efb\u7ba1\u7406\u95ee\u9898\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u8fdb\u884c\u8bfb\u53d6\u548c\u5199\u5165\u64cd\u4f5c\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "Schneider Electric Vijeo Designer\u548cVijeo Designer Basic\u4fe1\u4efb\u7ba1\u7406\u95ee\u9898\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": [
      "Schneider Electric Vijeo Designer Basic \u003c=1.0",
      "Schneider Electric Vijeo Designer Basic 1.1 basic",
      "Schneider Electric Vijeo Designer Basic 1.1 hotfix_15 basic",
      "Schneider Electric Vijeo Designer \u003c=6.2",
      "Schneider Electric Vijeo Designer 6.9",
      "Schneider Electric Vijeo Designer 6.9 sp9"
    ]
  },
  "referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2020-7501",
  "serverity": "\u4e2d",
  "submitTime": "2020-06-17",
  "title": "Schneider Electric Vijeo Designer\u548cVijeo Designer Basic\u4fe1\u4efb\u7ba1\u7406\u95ee\u9898\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…