ID CVE-2018-7246 Type cve Reporter cybersecurity@schneider-electric.com Modified 2019-10-03T00:03:00
Description
A cleartext transmission of sensitive information vulnerability exists in Schneider Electric's 66074 MGE Network Management Card Transverse installed in MGE UPS and MGE STS. he integrated web server (Port 80/443/TCP) of the affected devices could allow remote attackers to discover an administrative account. If default on device, it is not using a SSL in settings and if multiple request of the page "Access Control" (IP-address device/ups/pas_cont.htm) account data will be sent in cleartext
{"ptsecurity": [{"lastseen": "2021-01-15T04:42:09", "bulletinFamily": "info", "cvelist": ["CVE-2018-7246"], "description": "# PT-2018-38: Information Disclosure in APC Uninterrupted Power Supplies\n\n**Vulnerable products**\n\nMGE Galaxy 3000 \nMGE Galaxy 4000 \nMGE Galaxy 5000 \nMGE Galaxy 6000 \nMGE Galaxy 9000 \nMGE EPS 6000 \nMGE EPS 7000 \nMGE EPS 8000 \nMGE Comet UPS \nMGE Galaxy PW \nSTS (MGE Upsilon) \n\n\nLink: \n<https://www.schneider-electric.com/>\n\n**Severity level**\n\nSeverity level: High \nImpact: Information disclosure \nAccess Vector: Remote \n\n\nCVSS v3: \nBase Score: 10 \nVector: (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H) \n\nCVE: CVE-2018-7246 \n\n**Vulnerability description**\n\nThe specialists of the Positive Research center have detected an Information Disclosure vulnerability in APC Uninterrupted Power Supplies. \n\nVulnerability in Schneider Electric's MGE SNMP/Web Card 66074 installed in MGE UPS and MGE STS, related to the integrated web server (Port 80/443/TCP) and SSL disabled by default, allows remote attackers to discover an administrative account in cleartext by sending multiple requests of the page \"Access Control\" (IP-address device/ups/pas_cont.htm). \n\n**How to fix**\n\nUse vendor's advisory: \n<https://www.schneider-electric.com/en/download/document/SEVD-2018-074-01/>\n\n**Advisory status**\n\n20.02.2016 - Vendor gets vulnerability details \n15.03.2018 - Vendor releases fixed version and details \n18.12.2018 - Public disclosure \n\n**Credits**\n\nThe vulnerability was detected by Ilya Karpov, Positive Research Center (Positive Technologies Company) \n\n**References**\n\n<http://en.securitylab.ru/lab/PT-2018-38> \n[https://www.ptsecurity.com/](<https://www.ptsecurity.com/ww-en/about/news/292100/>https://www.ptsecurity.com/ww-en/about/news/292100/</a><br>%0A</p>%0A<p>%0A%09%20Reports%20on%20the%20vulnerabilities%20previously%20discovered%20by%20Positive%20Research:%0A</p>%0A<p>%0A%20<a%20href=>) \n<https://en.securitylab.ru/lab/>\n\n**About Positive Technologies**\n\nPositive Technologies is a leading digital security firm with over 15 years of experience in 360\u00b0 protection of critical IT systems against the most advanced cyberthreats. State-of-the-art solutions are developed at the company's research center\u2014one of the largest in Europe. Positive Technologies experts have helped to identify and fix over 250 zero-day vulnerabilities in products from Cisco, Google, Honeywell, Huawei, Microsoft, Oracle, SAP, Schneider Electric, Siemens, and others, earning a reputation for world-class expertise in protection of devices and infrastructures at all scales from ATMs to nuclear power stations. Findings by Positive Technologies researchers are used for updating the MaxPatrol knowledge base and for development of security solutions including PT Application Firewall, PT Application Inspector, MaxPatrol. These products allow securing web applications, evaluating network protection, blocking attacks in real time, ensuring compliance with industry and national standards, and training security specialists. Positive Technologies is the organizer of the annual Positive Hack Days international forum and security competition. \n\n", "edition": 9, "modified": "1970-01-01T00:00:00", "published": "2018-12-18T00:00:00", "id": "PT-2018-38", "href": "https://www.ptsecurity.com/ww-en/analytics/threatscape/pt-2018-38/", "title": "PT-2018-38: Information Disclosure in APC Uninterrupted Power Supplies", "type": "ptsecurity", "cvss": {}}]}