CVE-2021-22784 – Schneider Electric C-Bus Toolkit Missing Authentication Vulnerability
https://notcve.org/view.php?id=CVE-2021-22784
A CWE-306: Missing Authentication for Critical Function vulnerability exists in C-Bus Toolkit v1.15.8 and prior that could allow an attacker to use a crafted webpage to obtain remote access to the system. A CWE-306: Se presenta una vulnerabilidad de Falta de Autentificación para una Función Crítica en C-Bus Toolkit versiones v1.15.8 y anteriores, que podría permitir a un atacante usar una página web diseñada para obtener acceso remoto al sistema This vulnerability allows remote attackers to bypass authentication on affected installations of Schneider Electric C-Bus Toolkit. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the C-Gate 2 Service, which listens on TCP port 20023. A crafted webpage can be used to enable remote access. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of SYSTEM. • http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-194-04 https://www.tenable.com/security/research/tra-2021-50 • CWE-306: Missing Authentication for Critical Function •
CVE-2021-22707 – Schneider Electric EVlink Charging Stations Authentication Bypass / Code Execution
https://notcve.org/view.php?id=CVE-2021-22707
A CWE-798: Use of Hard-coded Credentials vulnerability exists in EVlink City (EVC1S22P4 / EVC1S7P4 all versions prior to R8 V3.4.0.1), EVlink Parking (EVW2 / EVF2 / EV.2 all versions prior to R8 V3.4.0.1), and EVlink Smart Wallbox (EVB1A all versions prior to R8 V3.4.0.1 ) that could allow an attacker to issue unauthorized commands to the charging station web server with administrative privileges. A CWE-798: Se presenta una vulnerabilidad de uso de credenciales embebidas en EVlink City (EVC1S22P4 / EVC1S7P4 todas las versiones anteriores a R8 V3.4.0.1), EVlink Parking (EVW2 / EVF2 / EV.2 todas las versiones anteriores a R8 V3.4.0.1), y EVlink Smart Wallbox (EVB1A todas las versiones anteriores a R8 V3.4.0.1 ) que podría permitir a un atacante emitir comandos no autorizados al servidor web de la estación de carga privilegiados administrativos Multiple Schneider Electric EVlink Charging Stations suffers from authentication bypass and remote code execution vulnerabilities. • http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-194-06 • CWE-798: Use of Hard-coded Credentials •
CVE-2021-22708 – Schneider Electric EVlink Charging Stations Authentication Bypass / Code Execution
https://notcve.org/view.php?id=CVE-2021-22708
A CWE-347: Improper Verification of Cryptographic Signature vulnerability exists in EVlink City (EVC1S22P4 / EVC1S7P4 all versions prior to R8 V3.4.0.1), EVlink Parking (EVW2 / EVF2 / EV.2 all versions prior to R8 V3.4.0.1), and EVlink Smart Wallbox (EVB1A all versions prior to R8 V3.4.0.1 ) that could allow an attacker to craft a malicious firmware package and bypass the signature verification mechanism. A CWE-347: Se presenta una vulnerabilidad de Comprobación Inapropiada de la Firma Criptográfica en EVlink City (EVC1S22P4 / EVC1S7P4 todas las versiones anteriores a R8 V3.4.0.1), EVlink Parking (EVW2 / EVF2 / EV.2 todas las versiones anteriores a R8 V3.4.0.1), y EVlink Smart Wallbox (EVB1A todas las versiones anteriores a R8 V3.4.0.1 ) que podría permitir a un atacante diseñar un paquete de firmware malicioso y omitir el mecanismo de comprobación de la firma Multiple Schneider Electric EVlink Charging Stations suffers from authentication bypass and remote code execution vulnerabilities. • http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-194-06 • CWE-347: Improper Verification of Cryptographic Signature •
CVE-2021-22782
https://notcve.org/view.php?id=CVE-2021-22782
Missing Encryption of Sensitive Data vulnerability exists in EcoStruxure Control Expert (all versions prior to V15.0 SP1, including all versions of Unity Pro), EcoStruxure Process Expert (all versions, including all versions of EcoStruxure Hybrid DCS), and SCADAPack RemoteConnect for x70, all versions, that could cause an information leak allowing disclosure of network and process information, credentials or intellectual property when an attacker can access a project file. Se presenta una vulnerabilidad de falta de encriptación de datos confidenciales en EcoStruxure Control Expert (todas las versiones anteriores a V15.0 SP1, incluyendo todas las versiones de Unity Pro), EcoStruxure Process Expert (todas las versiones, incluyendo todas las versiones de EcoStruxure Hybrid DCS), y SCADAPack RemoteConnect for x70, todas las versiones, que podría causar una filtración de información permitiendo la divulgación de información de red y de proceso, credenciales o propiedad intelectual cuando un atacante puede acceder a un archivo de proyecto • http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-194-01 • CWE-311: Missing Encryption of Sensitive Data •
CVE-2021-22781
https://notcve.org/view.php?id=CVE-2021-22781
Insufficiently Protected Credentials vulnerability exists in EcoStruxure Control Expert (all versions prior to V15.0 SP1, including all versions of Unity Pro), EcoStruxure Process Expert (all versions, including all versions of EcoStruxure Hybrid DCS), and SCADAPack RemoteConnect for x70, all versions, that could cause a leak of SMTP credential used for mailbox authentication when an attacker can access a project file. Se presenta una vulnerabilidad de credenciales insuficientemente protegidas en EcoStruxure Control Expert (todas las versiones anteriores a V15.0 SP1, incluidas todas las versiones de Unity Pro), EcoStruxure Process Expert (todas las versiones, incluidas todas las versiones de EcoStruxure Hybrid DCS) y SCADAPack RemoteConnect for x70, todas las versiones, que podría causar una filtración de credenciales SMTP usadas para la autenticación del buzón cuando un atacante puede acceder a un archivo de proyecto • http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-194-01 • CWE-522: Insufficiently Protected Credentials •