11 results (0.004 seconds)

CVSS: 10.0EPSS: 11%CPEs: 2EXPL: 0

A remote attacker could send a carefully crafted packet in InduSoft Web Studio v8.1 and prior versions, and/or InTouch Machine Edition 2017 v8.1 and prior versions during a tag, alarm, or event related action such as read and write, which may allow remote code execution. Un atacante remoto podría enviar un paquete cuidadosamente manipulado en InduSoft Web Studio, en versiones 8.1 y anteriores, y/o en InTouch Machine Edition 2017, en versiones 8.1 y anteriores, durante una acción relacionada con una etiqueta, alarma o evento como la lectura o escritura. Esto podría permitir la ejecución remota de código. • http://software.schneider-electric.com/pdf/security-bulletin/lfsec00000125 http://www.securityfocus.com/bid/103949 https://ics-cert.us-cert.gov/advisories/ICSA-18-107-01 https://www.tenable.com/security/research/tra-2018-07 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-121: Stack-based Buffer Overflow •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

Schneider Electric InduSoft Web Studio before 8.0 allows remote attackers to execute arbitrary code or cause a denial of service (unhandled runtime exception and application crash) via a crafted Indusoft Project file. Vulnerabilidad en Schneider Electric InduSoft Web Studio en versiones anteriores a 8.0, permite a atacantes remotos ejecutar código arbitrario o provocar una denegación de servicio (excepción de tiempo de ejecución no manejada y caída de la aplicación) a través de un archivo Indusoft Project. • http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2015-251-01 • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 10%CPEs: 1EXPL: 0

The Remote Agent component in Schneider Electric InduSoft Web Studio before 8.0 allows remote attackers to execute arbitrary code via unspecified vectors, aka ZDI-CAN-2649. Vulnerabilidad en el componente Remote Agent en Schneider Electric InduSoft Web Studio en versiones anteriores a 8.0, permite a atacantes remotos ejecutar código arbitrario a través de vectores no especificados, también conocida como ZDI-CAN-2649. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of InduSoft WebStudio. User interaction is not required to exploit this vulnerability. The specific flaw exists within the Remote Agent service listening on TCP port 1234. The issue lies in the lack of authentication, allowing attackers to execute remote API calls on the service. • http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2015-251-01 http://www.zerodayinitiative.com/advisories/ZDI-15-451 • CWE-20: Improper Input Validation •

CVSS: 1.7EPSS: 0%CPEs: 2EXPL: 0

Schneider Electric InduSoft Web Studio before 7.1.3.5 Patch 5 and Wonderware InTouch Machine Edition through 7.1 SP3 Patch 4 use cleartext for project-window password storage, which allows local users to obtain sensitive information by reading a file. Vulnerabilidad en Schneider Electric InduSoft Web Studio en versiones anteriores a 7.1.3.5 Patch 5 y Wonderware InTouch Machine Edition hasta la versión 7.1 SP3 Patch 4, utiliza almacenamiento de contraseñas en texto plano para project-window, lo que permite a usuarios locales obtener información sensible mediante la lectura de un archivo. • http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2015-100-01 https://gcsresource.invensys.com/support/docs/_securitybulletins/Security_bulletin_LFSEC00000110.pdf https://ics-cert.us-cert.gov/advisories/ICSA-15-211-01 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.8EPSS: 2%CPEs: 6EXPL: 1

Absolute path traversal vulnerability in NTWebServer.exe in Indusoft Studio 7.0 and earlier and Advantech Studio 7.0 and earlier allows remote attackers to read arbitrary files via a full pathname in an argument to the sub_401A90 CreateFileW function. Vulnerabilidad de salto de directorio absoluto en NTWebServer.exe en Indusoft Studio v7.0 y anteriores, y Advantech Studio v7.0 y anteriores, permite a atacantes remotos leer archivos de su elección a través de un nombre de ruta absoluto en un argumento a la función sub_401A90 CreateFileW. • https://www.exploit-db.com/exploits/23132 http://ics-cert.us-cert.gov/pdf/ICSA-13-067-01.pdf • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •