Lucene search

K
cve[email protected]CVE-2020-7547
HistoryDec 01, 2020 - 3:15 p.m.

CVE-2020-7547

2020-12-0115:15:12
CWE-284
web.nvd.nist.gov
20
cve-2020-7547
cwe-284
ecostruxure
smartstruxure
power monitoring
scada software
security notification

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.6 High

AI Score

Confidence

High

6.5 Medium

CVSS2

Access Vector

Access Complexity

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

36.7%

A CWE-284: Improper Access Control vulnerability exists in EcoStruxureª and SmartStruxureª Power Monitoring and SCADA Software (see security notification for version information) that could allow a user the ability to perform actions via the web interface at a higher privilege level.

Affected configurations

NVD
Node
schneider-electricecostruxure_energy_expertMatch2.0
OR
schneider-electricecostruxure_power_monitoring_expertMatch7.0
OR
schneider-electricecostruxure_power_monitoring_expertMatch8.0
OR
schneider-electricecostruxure_power_monitoring_expertMatch9.0
OR
schneider-electricpower_managerMatch1.1
OR
schneider-electricpower_managerMatch1.2
OR
schneider-electricpower_managerMatch1.3
OR
schneider-electricpowerscada_expert_with_advanced_reporting_and_dashboardsMatch8.0
OR
schneider-electricpowerscada_operation_with_advanced_reporting_and_dashboardsMatch9.0

CNA Affected

[
  {
    "product": "EcoStruxureª and SmartStruxureª Power Monitoring and SCADA Software (see security notification for version information)",
    "vendor": "n/a",
    "versions": [
      {
        "status": "affected",
        "version": "EcoStruxureª and SmartStruxureª Power Monitoring and SCADA Software (see security notification for version information)"
      }
    ]
  }
]

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.6 High

AI Score

Confidence

High

6.5 Medium

CVSS2

Access Vector

Access Complexity

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

36.7%

Related for CVE-2020-7547