| |
Vulnerability CVE-2013-0687
Published: 2013-04-17 Modified: 2013-04-18
Description: |
The installer routine in Schneider Electric MiCOM S1 Studio uses world-writable permissions for executable files, which allows local users to modify the service or the configuration files, and consequently gain privileges or trigger incorrect protective-relay operation, via a Trojan horse executable file. |
Type:
CWE-264 (Permissions, Privileges, and Access Controls)
CVSS2 => (AV:L/AC:M/Au:S/C:C/I:C/A:C)
CVSS Base Score |
Impact Subscore |
Exploitability Subscore |
6.6/10 |
10/10 |
2.7/10 |
Exploit range |
Attack complexity |
Authentication |
Local |
Medium |
Single time |
Confidentiality impact |
Integrity impact |
Availability impact |
Complete |
Complete |
Complete |
References: |
http://ics-cert.us-cert.gov/pdf/ICSA-13-100-01.pdf
http://download.schneider-electric.com/files?p_File_Id=56543584&p_File_Name=SEVD-2013-087-01-MiCOM-S1-Studio-SW.pdf
|
|
|
closedb();
?>
Copyright 2024, cxsecurity.com
|
|
|