// For flags

CVE-2013-0687

 

Severity Score

6.6
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The installer routine in Schneider Electric MiCOM S1 Studio uses world-writable permissions for executable files, which allows local users to modify the service or the configuration files, and consequently gain privileges or trigger incorrect protective-relay operation, via a Trojan horse executable file.

La rutina de instalación en Schneider Electric MiCOM S1 Studio utiliza permisos globales de escribir de archivos ejecutables, lo que permite a usuarios locales modificar el servicio o los archivos de configuración, y por lo tanto obtener privilegios o disparar operaciones incorrectas protectiven-relay, a través de un archivo ejecutable troyano

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Medium
Authentication
Single
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2012-12-19 CVE Reserved
  • 2013-04-18 CVE Published
  • 2024-09-16 CVE Updated
  • 2024-11-16 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-264: Permissions, Privileges, and Access Controls
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Schneider-electric
Search vendor "Schneider-electric"
Micom S1 Studio
Search vendor "Schneider-electric" for product "Micom S1 Studio"
--
Affected