VAR-201307-0319
Vulnerability from variot - Updated: 2023-12-18 13:53Alstom Grid MiCOM S1 Agile before 1.0.3 and Alstom Grid MiCOM S1 Studio use weak permissions for the MiCOM S1 %PROGRAMFILES% directory, which allows local users to gain privileges via a Trojan horse executable file. The MiCOM S1 software does not restrict user access to the installer. When the MiCOM S1 application runs, the malicious program is executed, and the successful exploitation of the vulnerability can improve the user. Permissions. Multiple Alstom Grid products are prone to a local access-bypass vulnerability. Local attackers can exploit this issue to bypass certain security restrictions and perform unauthorized actions; this may aid in launching further attacks. Note: An attacker can further exploit this issue to gain administrator privileges to the system
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201307-0319",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "micom s1 studio",
"scope": "eq",
"trust": 1.6,
"vendor": "alstom",
"version": null
},
{
"model": "micom s1 agile",
"scope": "lte",
"trust": 1.0,
"vendor": "alstom",
"version": "1.0.2"
},
{
"model": "grid micom s1 agile",
"scope": "lt",
"trust": 0.8,
"vendor": "alstom",
"version": "1.0.3"
},
{
"model": "grid micom s1 studio",
"scope": null,
"trust": 0.8,
"vendor": "alstom",
"version": null
},
{
"model": "grid legacy micom s1 studio software",
"scope": null,
"trust": 0.6,
"vendor": "alstom",
"version": null
},
{
"model": "grid micom s1 agile software",
"scope": null,
"trust": 0.6,
"vendor": "alstom",
"version": null
},
{
"model": "micom s1 agile",
"scope": "eq",
"trust": 0.6,
"vendor": "alstom",
"version": "1.0.2"
},
{
"model": "micom s1 agile software",
"scope": "eq",
"trust": 0.3,
"vendor": "alstom",
"version": "1.0.2"
},
{
"model": "legacy micom s1 studio software",
"scope": "eq",
"trust": 0.3,
"vendor": "alstom",
"version": "0"
},
{
"model": "micom s1 agile software",
"scope": "ne",
"trust": 0.3,
"vendor": "alstom",
"version": "1.0.3"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "micom s1 agile",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "micom s1 studio",
"version": null
}
],
"sources": [
{
"db": "IVD",
"id": "87f7b1a9-cae2-4c38-a0e8-b8e02cfb5059"
},
{
"db": "CNVD",
"id": "CNVD-2013-08914"
},
{
"db": "BID",
"id": "60942"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003330"
},
{
"db": "NVD",
"id": "CVE-2013-2786"
},
{
"db": "CNNVD",
"id": "CNNVD-201307-078"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:alstom:micom_s1_agile:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.0.2",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:alstom:micom_s1_studio:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2013-2786"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The vendor reported this issue.",
"sources": [
{
"db": "BID",
"id": "60942"
}
],
"trust": 0.3
},
"cve": "CVE-2013-2786",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 6.6,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 2.7,
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:L/AC:M/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Local",
"authentication": "Single",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 6.6,
"confidentialityImpact": "Complete",
"exploitabilityScore": null,
"id": "CVE-2013-2786",
"impactScore": null,
"integrityImpact": "Complete",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:L/AC:M/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 6.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 1.5,
"id": "CNVD-2013-08914",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"author": "IVD",
"availabilityImpact": "COMPLETE",
"baseScore": 6.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 1.5,
"id": "87f7b1a9-cae2-4c38-a0e8-b8e02cfb5059",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
"version": "2.9 [IVD]"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2013-2786",
"trust": 1.8,
"value": "MEDIUM"
},
{
"author": "CNVD",
"id": "CNVD-2013-08914",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201307-078",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "IVD",
"id": "87f7b1a9-cae2-4c38-a0e8-b8e02cfb5059",
"trust": 0.2,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "87f7b1a9-cae2-4c38-a0e8-b8e02cfb5059"
},
{
"db": "CNVD",
"id": "CNVD-2013-08914"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003330"
},
{
"db": "NVD",
"id": "CVE-2013-2786"
},
{
"db": "CNNVD",
"id": "CNNVD-201307-078"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Alstom Grid MiCOM S1 Agile before 1.0.3 and Alstom Grid MiCOM S1 Studio use weak permissions for the MiCOM S1 %PROGRAMFILES% directory, which allows local users to gain privileges via a Trojan horse executable file. The MiCOM S1 software does not restrict user access to the installer. When the MiCOM S1 application runs, the malicious program is executed, and the successful exploitation of the vulnerability can improve the user. Permissions. Multiple Alstom Grid products are prone to a local access-bypass vulnerability. \nLocal attackers can exploit this issue to bypass certain security restrictions and perform unauthorized actions; this may aid in launching further attacks. \nNote: An attacker can further exploit this issue to gain administrator privileges to the system",
"sources": [
{
"db": "NVD",
"id": "CVE-2013-2786"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003330"
},
{
"db": "CNVD",
"id": "CNVD-2013-08914"
},
{
"db": "BID",
"id": "60942"
},
{
"db": "IVD",
"id": "87f7b1a9-cae2-4c38-a0e8-b8e02cfb5059"
}
],
"trust": 2.61
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2013-2786",
"trust": 3.5
},
{
"db": "ICS CERT",
"id": "ICSA-13-184-01",
"trust": 3.3
},
{
"db": "BID",
"id": "60942",
"trust": 1.5
},
{
"db": "CNVD",
"id": "CNVD-2013-08914",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201307-078",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003330",
"trust": 0.8
},
{
"db": "IVD",
"id": "87F7B1A9-CAE2-4C38-A0E8-B8E02CFB5059",
"trust": 0.2
}
],
"sources": [
{
"db": "IVD",
"id": "87f7b1a9-cae2-4c38-a0e8-b8e02cfb5059"
},
{
"db": "CNVD",
"id": "CNVD-2013-08914"
},
{
"db": "BID",
"id": "60942"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003330"
},
{
"db": "NVD",
"id": "CVE-2013-2786"
},
{
"db": "CNNVD",
"id": "CNNVD-201307-078"
}
]
},
"id": "VAR-201307-0319",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "87f7b1a9-cae2-4c38-a0e8-b8e02cfb5059"
},
{
"db": "CNVD",
"id": "CNVD-2013-08914"
}
],
"trust": 1.55
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "87f7b1a9-cae2-4c38-a0e8-b8e02cfb5059"
},
{
"db": "CNVD",
"id": "CNVD-2013-08914"
}
]
},
"last_update_date": "2023-12-18T13:53:28.985000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Top Page",
"trust": 0.8,
"url": "http://www.alstom.com/grid/"
},
{
"title": "Alstom Grid multiple products local access bypass vulnerability patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/34993"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-08914"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003330"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-264",
"trust": 1.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2013-003330"
},
{
"db": "NVD",
"id": "CVE-2013-2786"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.3,
"url": "http://ics-cert.us-cert.gov/advisories/icsa-13-184-01"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-2786"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-2786"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/bid/60942"
},
{
"trust": 0.3,
"url": "http://www.alstom.com/grid/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-08914"
},
{
"db": "BID",
"id": "60942"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003330"
},
{
"db": "NVD",
"id": "CVE-2013-2786"
},
{
"db": "CNNVD",
"id": "CNNVD-201307-078"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "87f7b1a9-cae2-4c38-a0e8-b8e02cfb5059"
},
{
"db": "CNVD",
"id": "CNVD-2013-08914"
},
{
"db": "BID",
"id": "60942"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003330"
},
{
"db": "NVD",
"id": "CVE-2013-2786"
},
{
"db": "CNNVD",
"id": "CNNVD-201307-078"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2013-07-08T00:00:00",
"db": "IVD",
"id": "87f7b1a9-cae2-4c38-a0e8-b8e02cfb5059"
},
{
"date": "2013-07-08T00:00:00",
"db": "CNVD",
"id": "CNVD-2013-08914"
},
{
"date": "2013-07-03T00:00:00",
"db": "BID",
"id": "60942"
},
{
"date": "2013-07-16T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2013-003330"
},
{
"date": "2013-07-10T22:55:03.500000",
"db": "NVD",
"id": "CVE-2013-2786"
},
{
"date": "2013-07-12T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201307-078"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2013-07-08T00:00:00",
"db": "CNVD",
"id": "CNVD-2013-08914"
},
{
"date": "2013-07-03T00:00:00",
"db": "BID",
"id": "60942"
},
{
"date": "2013-07-16T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2013-003330"
},
{
"date": "2013-07-11T04:00:00",
"db": "NVD",
"id": "CVE-2013-2786"
},
{
"date": "2013-07-12T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201307-078"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "BID",
"id": "60942"
},
{
"db": "CNNVD",
"id": "CNNVD-201307-078"
}
],
"trust": 0.9
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Alstom Grid MiCOM S1 Agile and Alstom Grid MiCOM S1 Studio Vulnerability gained in",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2013-003330"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "permissions and access control",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201307-078"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.