CVE-2015-3977
https://notcve.org/view.php?id=CVE-2015-3977
Buffer overflow in Schneider Electric IMT25 Magnetic Flow DTM before 1.500.004 for the HART Protocol allows remote authenticated users to execute arbitrary code or cause a denial of service (memory corruption) via a crafted HART reply. Desbordamiento de buffer en Schneider Electric IMT25 Magnetic Flow DTM en versiones anteriores a 1.500.004 para el HART Protocol permite a usuarios remotos autenticados ejecutar código arbitrario o provocar una denegación de servicio (corrupción de memoria) a través de una respuesta HART manipulada. • http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2015-215-01 https://ics-cert.us-cert.gov/advisories/ICSA-15-223-01 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2015-3962
https://notcve.org/view.php?id=CVE-2015-3962
Schneider Electric StruxureWare Building Expert MPM before 2.15 does not use encryption for the client-server data stream, which allows remote attackers to discover credentials by sniffing the network. Vulnerabilidad en Schneider Electric StruxureWare Building Expert MPM en versiones anteriores a 2.15, no usa el cifrado para el flujo de datos cliente-servidor, lo que permite a atacantes remotos descubrir las credenciales rastreando la red. • http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2015-254-01 https://ics-cert.us-cert.gov/advisories/ICSA-15-258-01 • CWE-522: Insufficiently Protected Credentials •
CVE-2015-3963
https://notcve.org/view.php?id=CVE-2015-3963
Wind River VxWorks before 5.5.1, 6.5.x through 6.7.x before 6.7.1.1, 6.8.x before 6.8.3, 6.9.x before 6.9.4.4, and 7.x before 7 ipnet_coreip 1.2.2.0, as used on Schneider Electric SAGE RTU devices before J2 and other devices, does not properly generate TCP initial sequence number (ISN) values, which makes it easier for remote attackers to spoof TCP sessions by predicting an ISN value. Vulnerabilidad en Wind River VxWorks en versiones anteriores a 5.5.1, 6.5.x hasta la versión 6.7.x en versiones anteriores a 6.7.1.1, 6.8.x hasta la versión 6.8.3, 6.9.x en versiones anteriores a 6.9.4.4 y 7.x en versiones anteriores a 7 ipnet_coreip 1.2.2.0, tal como se utiliza en dispositivos Schneider Electric SAGE RTU en versiones anteriores a J2 y otros dispositivos, no genera correctamente valores del número inicial de secuencia (ISN) de TCP, lo que hace que sea más fácil para los atacantes remotos falsificar las sesiones TCP al predecir un valor ISN. • http://www.schneider-electric.com/ww/en/download/document/SEVD-2015-162-01 http://www.securityfocus.com/bid/75302 http://www.securitytracker.com/id/1032730 http://www.securitytracker.com/id/1033181 https://ics-cert.us-cert.gov/advisories/ICSA-15-169-01 https://ics-cert.us-cert.gov/advisories/ICSA-15-169-01A https://security.netapp.com/advisory/ntap-20160324-0001 • CWE-330: Use of Insufficiently Random Values •
CVE-2015-3940
https://notcve.org/view.php?id=CVE-2015-3940
Untrusted search path vulnerability in Schneider Electric Wonderware System Platform before 2014 R2 Patch 01 allows local users to gain privileges via a Trojan horse DLL in an unspecified directory. Vulnerabilidad de ruta de búsqueda no confiable en Schneider Electric Wonderware System Platform en versiones anteriores a 2014 R2 Patch 01, permite a usuarios locales obtener privilegios a través de un Troyano DLL en un directorio no especificado. • http://iom.invensys.com/EN/pdfLibrary/Security_Bulletin_LFSEC00000106.pdf http://www.securityfocus.com/bid/75297 http://www.securitytracker.com/id/1033179 http://www.securitytracker.com/id/1033180 https://ics-cert.us-cert.gov/advisories/ICSA-15-169-02 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2014-8390
https://notcve.org/view.php?id=CVE-2014-8390
Multiple buffer overflows in Schneider Electric VAMPSET before 2.2.168 allow local users to gain privileges via malformed disturbance-recording data in a (1) CFG or (2) DAT file. Múltiples desbordamientos de buffer en Schneider Electric VAMPSET anterior a 2.2.168 permiten a usuarios locales ganar privilegios a través de datos que graban disturbios malformados en un fichero (1) CFG o (2) DAT. • http://www.coresecurity.com/advisories/schneider-vampset-stack-and-heap-buffer-overflow http://www.schneider-electric.com/ww/en/download/document/SEVD-2015-084-01 http://www.securityfocus.com/archive/1/535142/100/0/threaded http://www.securityfocus.com/bid/73405 https://ics-cert.us-cert.gov/advisories/ICSA-15-092-01 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •