SCADA Vulnerabilities & Exposures (SVE)

CRITIFENCE® SCADA Vulnerabilities and Exposures Database (SVE)

[SVE-266384194] Schneider Electric Wonderware ArchestrA Logger

Date Type Platform Author EDB-ID CVE-ID OSVDB-ID Download App SIS Signature
2017-07-06OtherSchneider ElectricAndrey Zhukov of USSC discovered this vulnerability and reported it to Schneider Electric. Schneider Electric then self-reportedN/ACVE-2017-9629 CVE-2017-9627 CVE-2017-9631 N/AN/AN/A

Source

						
							
								
#
# Schneider Electric Wonderware ArchestrA Logger
#


### VULNERABLE VENDOR
Schneider Electric


### VULNERABLE PRODUCT
Wonderware ArchestrA Logger



### RESEARCHER
Andrey Zhukov of USSC discovered this vulnerability and reported it to Schneider Electric. Schneider Electric then self-reported this vulnerability to ICS-CERT.



### AFFECTED PRODUCTS

Schneider Electric reports that the following versions of Wonderware ArchestrA Logger, a logging software, are affected:

Wonderware ArchestrA Logger, versions 2017.426.2307.1 and prior.



### IMPACT

Successful exploitation of these vulnerabilities could allow a remote attacker to execute code or cause a denial of service.



### VULNERABILITY OVERVIEW

STACK-BASED BUFFER OVERFLOW CWE-121
The stack-based buffer overflow vulnerability has been identified, which may allow a remote attacker to execute arbitrary code in the context of a highly privileged account.
CVE-2017-9629 has been assigned to this vulnerability.
Schneider Electric has assigned a CVSS v3 base score of 9.8 to this vulnerability; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)


UNCONTROLLED RESOURCE CONSUMPTION CWE-400
The uncontrolled resource consumption vulnerability could allow an attacker to exhaust the memory resources of the machine, causing a denial of service.
CVE-2017-9627 has been assigned to this vulnerability.
Schneider Electric has assigned a CVSS v3 base score of 8.6 to this vulnerability; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H)


NULL POINTER DEFERENCE CWE-476
The null pointer deference vulnerability could allow an attacker to crash the logger process, causing a denial of service for logging and log-viewing.
Schneider Electric notes that applications which use the Wonderware ArchestrA Logger continue to run when the Wonderware ArchestrA Logger service is unavailable.
CVE-2017-9631 has been assigned to this vulnerability.
Schneider Electric has assigned a CVSS v3 base score of 7.5 to this vulnerability; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)





### BACKGROUND

Critical Infrastructure Sectors: Critical Manufacturing, Dams, Defense Industrial Base, Energy, Food and Agriculture, Government Facilities, Nuclear Reactors, Materials, and Waste, Transportation Systems, Water and Wastewater Systems
Countries/Areas Deployed: Worldwide
Company Headquarters Location: Paris, France




### MITIGATION

Schneider Electric recommends that users of any Wonderware, Avantis, SimSci, or Skelta product that installs the Wonderware ArchestrA Logger version 2017.426.2307.1 or prior should apply the Wonderware ArchestrA Logger Security Patch v2017.517.2328.1 as soon as possible.

Software updates can be downloaded from the Global Customer Support "Software Download" area or from the links below:

Wonderware ArchestrA Logger Security Patch v2017.517.2328.1 (requires login):

https://gcsresource.invensys.com/tracking/ConfirmDownload.aspx?id=22429


For more information about this vulnerability and patch, please refer to Schneider Electric Security Bulletin LFSec00000116, which is available at the following location:

http://software.schneider-electric.com/pdf/security-bulletin/lfsec00000116/