A successful exploit of these vulnerabilities requires the local user to load a crafted DLL file in the system directory on servers running Schneider Electric OFS v3.5 with version v7.40 of SCADA Expert Vijeo Citect/CitectSCADA, OFS v3.5 with version v7.30 of Vijeo Citect/CitectSCADA, and OFS v3.5 with version v7.20 of Vijeo Citect/CitectSCADA.. If the application attempts to open that file, the application could crash or allow the attacker to execute arbitrary code. Schneider Electric recommends vulnerable users upgrade the OFS to V3.5 and install the latest service pack (SP 6 or newer) for their associated version.
References
Link | Resource |
---|---|
https://ics-cert.us-cert.gov/advisories/ICSA-15-141-01 | Mitigation Third Party Advisory US Government Resource |
https://ics-cert.us-cert.gov/advisories/ICSA-15-141-01 | Mitigation Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 02:24
Type | Values Removed | Values Added |
---|---|---|
References | () https://ics-cert.us-cert.gov/advisories/ICSA-15-141-01 - Mitigation, Third Party Advisory, US Government Resource |
Information
Published : 2019-03-25 19:29
Updated : 2024-11-21 02:24
NVD link : CVE-2015-1014
Mitre link : CVE-2015-1014
CVE.ORG link : CVE-2015-1014
JSON object : View
Products Affected
schneider-electric
- opc_factory_server
- citectscada
- scada_expert_vijeo_citect
CWE
CWE-427
Uncontrolled Search Path Element