Lucene search

K
nessusThis script is Copyright (C) 2022-2023 and is owned by Tenable, Inc. or an Affiliate thereof.TENABLE_OT_SCHNEIDER_CVE-2021-22713.NASL
HistoryJul 21, 2022 - 12:00 a.m.

Schneider Electric PowerLogic Improper Restriction of Operations within the Bounds of a Memory Buffer (CVE-2021-22713)

2022-07-2100:00:00
This script is Copyright (C) 2022-2023 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
15

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

35.6%

A CWE-119:Improper restriction of operations within the bounds of a memory buffer vulnerability exists in PowerLogic ION8650, ION8800, ION7650, ION7700/73xx, and ION83xx/84xx/85xx/8600 (see security notifcation for affected versions), which could cause the meter to reboot.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.

##
# (C) Tenable, Inc.
##

include('compat.inc');

if (description)
{
  script_id(500671);
  script_version("1.4");
  script_set_attribute(attribute:"plugin_modification_date", value:"2023/10/17");

  script_cve_id("CVE-2021-22713");

  script_name(english:"Schneider Electric PowerLogic Improper Restriction of Operations within the Bounds of a Memory Buffer (CVE-2021-22713)");

  script_set_attribute(attribute:"synopsis", value:
"The remote OT asset is affected by a vulnerability.");
  script_set_attribute(attribute:"description", value:
"A CWE-119:Improper restriction of operations within the bounds of a
memory buffer vulnerability exists in PowerLogic ION8650, ION8800,
ION7650, ION7700/73xx, and ION83xx/84xx/85xx/8600 (see security
notifcation for affected versions), which could cause the meter to
reboot.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.");
  script_set_attribute(attribute:"see_also", value:"https://www.se.com/ww/en/download/document/SEVD-2021-068-03");
  script_set_attribute(attribute:"solution", value:
"Refer to the vendor advisory.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2021-22713");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");
  script_cwe_id(119);

  script_set_attribute(attribute:"vuln_publication_date", value:"2021/03/11");
  script_set_attribute(attribute:"patch_publication_date", value:"2021/03/11");
  script_set_attribute(attribute:"plugin_publication_date", value:"2022/07/21");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:schneider-electric:ion7650_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:schneider-electric:powerlogic_ion7300_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:schneider-electric:powerlogic_ion7550_firmware:376");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:schneider-electric:powerlogic_ion7550_firmware:416");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:schneider-electric:powerlogic_ion7650_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:schneider-electric:powerlogic_ion7700_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:schneider-electric:powerlogic_ion8300_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:schneider-electric:powerlogic_ion8400_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:schneider-electric:powerlogic_ion8500_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:schneider-electric:powerlogic_ion8600_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:schneider-electric:powerlogic_ion8650_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:schneider-electric:powerlogic_ion8800_firmware");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Tenable.ot");

  script_copyright(english:"This script is Copyright (C) 2022-2023 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("tenable_ot_api_integration.nasl");
  script_require_keys("Tenable.ot/Schneider");

  exit(0);
}


include('tenable_ot_cve_funcs.inc');

get_kb_item_or_exit('Tenable.ot/Schneider');

var asset = tenable_ot::assets::get(vendor:'Schneider');

var vuln_cpes = {
    "cpe:/o:schneider-electric:powerlogic_ion8650_firmware" :
        {"versionEndExcluding" : "4.40.1", "family" : "ION"},
    "cpe:/o:schneider-electric:powerlogic_ion8800_firmware" :
        {"versionEndExcluding" : "372", "family" : "ION"},
    "cpe:/o:schneider-electric:powerlogic_ion7550_firmware:376" :
        {"versionEndExcluding" : "376", "family" : "ION"},
    "cpe:/o:schneider-electric:powerlogic_ion7650_firmware" :
        {"versionEndExcluding" : "376", "family" : "ION"},
    "cpe:/o:schneider-electric:powerlogic_ion7700_firmware" :
        {"family" : "ION"},
    "cpe:/o:schneider-electric:powerlogic_ion7300_firmware" :
        {"family" : "ION"},
    "cpe:/o:schneider-electric:powerlogic_ion8300_firmware" :
        {"family" : "ION"},
    "cpe:/o:schneider-electric:powerlogic_ion8400_firmware" :
        {"family" : "ION"},
    "cpe:/o:schneider-electric:powerlogic_ion8500_firmware" :
        {"family" : "ION"},
    "cpe:/o:schneider-electric:powerlogic_ion8600_firmware" :
        {"family" : "ION"},
    "cpe:/o:schneider-electric:powerlogic_ion7550_firmware:416" :
        {"versionEndExcluding" : "416", "family" : "ION"},
    "cpe:/o:schneider-electric:ion7650_firmware" :
        {"versionEndExcluding" : "416", "family" : "ION"}
};

tenable_ot::cve::compare_and_report(asset:asset, cpes:vuln_cpes, severity:SECURITY_HOLE);
VendorProductVersionCPE
schneider-electricion7650_firmwarecpe:/o:schneider-electric:ion7650_firmware
schneider-electricpowerlogic_ion7300_firmwarecpe:/o:schneider-electric:powerlogic_ion7300_firmware
schneider-electricpowerlogic_ion7550_firmware376cpe:/o:schneider-electric:powerlogic_ion7550_firmware:376
schneider-electricpowerlogic_ion7550_firmware416cpe:/o:schneider-electric:powerlogic_ion7550_firmware:416
schneider-electricpowerlogic_ion7650_firmwarecpe:/o:schneider-electric:powerlogic_ion7650_firmware
schneider-electricpowerlogic_ion7700_firmwarecpe:/o:schneider-electric:powerlogic_ion7700_firmware
schneider-electricpowerlogic_ion8300_firmwarecpe:/o:schneider-electric:powerlogic_ion8300_firmware
schneider-electricpowerlogic_ion8400_firmwarecpe:/o:schneider-electric:powerlogic_ion8400_firmware
schneider-electricpowerlogic_ion8500_firmwarecpe:/o:schneider-electric:powerlogic_ion8500_firmware
schneider-electricpowerlogic_ion8600_firmwarecpe:/o:schneider-electric:powerlogic_ion8600_firmware
Rows per page:
1-10 of 121

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

35.6%

Related for TENABLE_OT_SCHNEIDER_CVE-2021-22713.NASL