The installer routine in Schneider Electric MiCOM S1 Studio uses world-writable permissions for executable files, which allows local users to modify the service or the configuration files, and consequently gain privileges or trigger incorrect protective-relay operation, via a Trojan horse executable file.
References
Link | Resource |
---|---|
http://download.schneider-electric.com/files?p_File_Id=56543584&p_File_Name=SEVD-2013-087-01-MiCOM-S1-Studio-SW.pdf | Vendor Advisory |
http://ics-cert.us-cert.gov/pdf/ICSA-13-100-01.pdf | US Government Resource |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: icscert
Published: 2022-10-03T16:15:02
Updated: 2022-10-03T16:15:02
Reserved: 2022-10-03T00:00:00
Link: CVE-2013-0687
JSON object: View
NVD Information
Status : Analyzed
Published: 2013-04-18T02:25:37.237
Modified: 2013-04-18T04:00:00.000
Link: CVE-2013-0687
JSON object: View
Redhat Information
No data.
CWE