VAR-201305-0089
Vulnerability from variot - Updated: 2023-12-18 12:09Invensys Wonderware Information Server (WIS) 4.0 SP1SP1, 4.5- Portal, and 5.0- Portal does not restrict unspecified size and amount values, which allows remote attackers to execute arbitrary code or cause a denial of service (resource consumption) via unknown vectors. Invensys Wonderware Information Server is a graphical visualization, reporting and analysis of real-time network-based plant operations data that helps drive productivity across the enterprise. Invensys Wonderware Information Server is prone to a denial-of-service vulnerability. Successful exploits may allow an attacker to trigger high CPU consumption and make the application unresponsive. Note that this issue could be exploited to execute arbitrary code, however, Symantec has not been confirmed. The following versions are vulnerable: Wonderware Information Server 4.0 SP1 Wonderware Information Server 4.5 Portal Wonderware Information Server 5.0 Portal. Through the network solution, this product can conveniently display the factory performance indicators and production data to the operation, operation and maintenance and engineering personnel, and is widely used in petroleum, natural gas, chemical and other industries
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201305-0089",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "wonderware information server",
"scope": "eq",
"trust": 1.6,
"vendor": "invensys",
"version": "4.5"
},
{
"model": "wonderware information server",
"scope": "eq",
"trust": 1.6,
"vendor": "invensys",
"version": "5.0"
},
{
"model": "wonderware information server",
"scope": "eq",
"trust": 1.6,
"vendor": "invensys",
"version": "4.0"
},
{
"model": "wonderware information server sp1",
"scope": "eq",
"trust": 0.9,
"vendor": "invensys",
"version": "4.0"
},
{
"model": "wonderware information server portal",
"scope": "eq",
"trust": 0.9,
"vendor": "invensys",
"version": "4.5"
},
{
"model": "wonderware information server",
"scope": "eq",
"trust": 0.8,
"vendor": "invensys",
"version": "4.0 sp1sp1"
},
{
"model": "wonderware information server",
"scope": "eq",
"trust": 0.8,
"vendor": "invensys",
"version": "4.5- portal"
},
{
"model": "wonderware information server",
"scope": "eq",
"trust": 0.8,
"vendor": "invensys",
"version": "5.0- portal"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "wonderware information server",
"version": "4.0"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "wonderware information server",
"version": "4.5"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "wonderware information server",
"version": "5.0"
}
],
"sources": [
{
"db": "IVD",
"id": "f4b1e066-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-05052"
},
{
"db": "BID",
"id": "59709"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-002604"
},
{
"db": "NVD",
"id": "CVE-2013-0685"
},
{
"db": "CNNVD",
"id": "CNNVD-201305-137"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:invensys:wonderware_information_server:4.5:-:portal:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:invensys:wonderware_information_server:5.0:-:portal:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:invensys:wonderware_information_server:4.0:sp1sp1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2013-0685"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Timur Yunusov, Alexey Osipov, and Ilya Karpov of the Positive Technologies Research Team",
"sources": [
{
"db": "BID",
"id": "59709"
},
{
"db": "CNNVD",
"id": "CNNVD-201305-137"
}
],
"trust": 0.9
},
"cve": "CVE-2013-0685",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 9.3,
"confidentialityImpact": "Complete",
"exploitabilityScore": null,
"id": "CVE-2013-0685",
"impactScore": null,
"integrityImpact": "Complete",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "CNVD-2013-05052",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "f4b1e066-2352-11e6-abef-000c29c66e3d",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 8.6,
"id": "VHN-60687",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2013-0685",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2013-05052",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201305-137",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "IVD",
"id": "f4b1e066-2352-11e6-abef-000c29c66e3d",
"trust": 0.2,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-60687",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "f4b1e066-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-05052"
},
{
"db": "VULHUB",
"id": "VHN-60687"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-002604"
},
{
"db": "NVD",
"id": "CVE-2013-0685"
},
{
"db": "CNNVD",
"id": "CNNVD-201305-137"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Invensys Wonderware Information Server (WIS) 4.0 SP1SP1, 4.5- Portal, and 5.0- Portal does not restrict unspecified size and amount values, which allows remote attackers to execute arbitrary code or cause a denial of service (resource consumption) via unknown vectors. Invensys Wonderware Information Server is a graphical visualization, reporting and analysis of real-time network-based plant operations data that helps drive productivity across the enterprise. Invensys Wonderware Information Server is prone to a denial-of-service vulnerability. \nSuccessful exploits may allow an attacker to trigger high CPU consumption and make the application unresponsive. Note that this issue could be exploited to execute arbitrary code, however, Symantec has not been confirmed. \nThe following versions are vulnerable:\nWonderware Information Server 4.0 SP1\nWonderware Information Server 4.5 Portal\nWonderware Information Server 5.0 Portal. Through the network solution, this product can conveniently display the factory performance indicators and production data to the operation, operation and maintenance and engineering personnel, and is widely used in petroleum, natural gas, chemical and other industries",
"sources": [
{
"db": "NVD",
"id": "CVE-2013-0685"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-002604"
},
{
"db": "CNVD",
"id": "CNVD-2013-05052"
},
{
"db": "BID",
"id": "59709"
},
{
"db": "IVD",
"id": "f4b1e066-2352-11e6-abef-000c29c66e3d"
},
{
"db": "VULHUB",
"id": "VHN-60687"
}
],
"trust": 2.7
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2013-0685",
"trust": 3.6
},
{
"db": "ICS CERT",
"id": "ICSA-13-113-01",
"trust": 3.4
},
{
"db": "BID",
"id": "59709",
"trust": 1.6
},
{
"db": "CNNVD",
"id": "CNNVD-201305-137",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2013-05052",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2013-002604",
"trust": 0.8
},
{
"db": "SECUNIA",
"id": "53308",
"trust": 0.6
},
{
"db": "IVD",
"id": "F4B1E066-2352-11E6-ABEF-000C29C66E3D",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-60687",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "f4b1e066-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-05052"
},
{
"db": "VULHUB",
"id": "VHN-60687"
},
{
"db": "BID",
"id": "59709"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-002604"
},
{
"db": "NVD",
"id": "CVE-2013-0685"
},
{
"db": "CNNVD",
"id": "CNNVD-201305-137"
}
]
},
"id": "VAR-201305-0089",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "f4b1e066-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-05052"
},
{
"db": "VULHUB",
"id": "VHN-60687"
}
],
"trust": 1.6211111
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "f4b1e066-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-05052"
}
]
},
"last_update_date": "2023-12-18T12:09:22.066000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Top Page",
"trust": 0.8,
"url": "http://global.wonderware.com/en/pages/default.aspx"
},
{
"title": "Wonderware \u65e5\u672c\u306e\u30d1\u30fc\u30c8\u30ca\u30fc",
"trust": 0.8,
"url": "http://global.wonderware.com/jp/pages/jppartnerssi.aspx"
},
{
"title": "\u30cf\u30fc\u30c9\u30a6\u30a7\u30a2\u30fb\u30d1\u30fc\u30c8\u30ca\u30fc",
"trust": 0.8,
"url": "http://iom.invensys.com/jp/pages/iom_hardwarepartners.aspx"
},
{
"title": "\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u30fb\u30d1\u30fc\u30c8\u30ca\u30fc",
"trust": 0.8,
"url": "http://iom.invensys.com/jp/pages/iom_softwarepartners.aspx"
},
{
"title": "Wonderware Top Page",
"trust": 0.8,
"url": "http://iom.invensys.com/jp/pages/home.aspx"
},
{
"title": "Patch for Invensys Wonderware Information Server Denial of Service Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/33856"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-05052"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-002604"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-264",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-60687"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-002604"
},
{
"db": "NVD",
"id": "CVE-2013-0685"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.4,
"url": "http://ics-cert.us-cert.gov/advisories/icsa-13-113-01"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-0685"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-0685"
},
{
"trust": 0.6,
"url": "http://secunia.com/advisories/53308"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/bid/59709"
},
{
"trust": 0.3,
"url": "http://global.wonderware.com/en/pages/wonderwareinformationserver.aspx"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-05052"
},
{
"db": "VULHUB",
"id": "VHN-60687"
},
{
"db": "BID",
"id": "59709"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-002604"
},
{
"db": "NVD",
"id": "CVE-2013-0685"
},
{
"db": "CNNVD",
"id": "CNNVD-201305-137"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "f4b1e066-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-05052"
},
{
"db": "VULHUB",
"id": "VHN-60687"
},
{
"db": "BID",
"id": "59709"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-002604"
},
{
"db": "NVD",
"id": "CVE-2013-0685"
},
{
"db": "CNNVD",
"id": "CNNVD-201305-137"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2013-05-10T00:00:00",
"db": "IVD",
"id": "f4b1e066-2352-11e6-abef-000c29c66e3d"
},
{
"date": "2013-05-10T00:00:00",
"db": "CNVD",
"id": "CNVD-2013-05052"
},
{
"date": "2013-05-09T00:00:00",
"db": "VULHUB",
"id": "VHN-60687"
},
{
"date": "2013-05-07T00:00:00",
"db": "BID",
"id": "59709"
},
{
"date": "2013-05-10T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2013-002604"
},
{
"date": "2013-05-09T12:31:18.970000",
"db": "NVD",
"id": "CVE-2013-0685"
},
{
"date": "2013-05-17T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201305-137"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2013-05-27T00:00:00",
"db": "CNVD",
"id": "CNVD-2013-05052"
},
{
"date": "2013-05-09T00:00:00",
"db": "VULHUB",
"id": "VHN-60687"
},
{
"date": "2013-05-07T00:00:00",
"db": "BID",
"id": "59709"
},
{
"date": "2013-05-10T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2013-002604"
},
{
"date": "2013-05-09T12:31:18.970000",
"db": "NVD",
"id": "CVE-2013-0685"
},
{
"date": "2013-05-17T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201305-137"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201305-137"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Invensys Wonderware Information Server Denial of service vulnerability",
"sources": [
{
"db": "IVD",
"id": "f4b1e066-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-05052"
},
{
"db": "CNNVD",
"id": "CNNVD-201305-137"
}
],
"trust": 1.4
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "permissions and access control",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201305-137"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.