An issue was discovered in Schneider Electric Unity PRO prior to V11.1. Unity projects can be compiled as x86 instructions and loaded onto the PLC Simulator delivered with Unity PRO. These x86 instructions are subsequently executed directly by the simulator. A specially crafted patched Unity project file can make the simulator execute malicious code by redirecting the control flow of these instructions.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/93830 | Third Party Advisory VDB Entry |
https://ics-cert.us-cert.gov/advisories/ICSA-16-306-03 | Third Party Advisory US Government Resource |
http://www.securityfocus.com/bid/93830 | Third Party Advisory VDB Entry |
https://ics-cert.us-cert.gov/advisories/ICSA-16-306-03 | Third Party Advisory US Government Resource |
Configurations
History
21 Nov 2024, 02:59
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/93830 - Third Party Advisory, VDB Entry | |
References | () https://ics-cert.us-cert.gov/advisories/ICSA-16-306-03 - Third Party Advisory, US Government Resource |
Information
Published : 2017-02-13 21:59
Updated : 2024-11-21 02:59
NVD link : CVE-2016-8354
Mitre link : CVE-2016-8354
CVE.ORG link : CVE-2016-8354
JSON object : View
Products Affected
schneider-electric
- unity_pro
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')