Schneider Electric Device Type Managers (DTMs) Stack-based Buffer Overflow
Summary
| CVE | CVE-2014-9200 |
|---|---|
| State | PUBLISHED |
| Assigner | icscert |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2015-02-01 15:59:06 UTC |
| Updated | 2026-05-06 22:30:45 UTC |
| Description | Stack-based buffer overflow in an unspecified DLL file in a DTM development kit in Schneider Electric Unity Pro, SoMachine, SoMove, SoMove Lite, Modbus Communication Library 2.2.6 and earlier, CANopen Communication Library 1.0.2 and earlier, EtherNet/IP Communication Library 1.0.0 and earlier, EM X80 Gateway DTM (MB TCP/SL), Advantys DTM for OTB, Advantys DTM for STB, KINOS DTM, SOLO DTM, and Xantrex DTMs allows remote attackers to execute arbitrary code via unspecified vectors. |
Risk And Classification
Primary CVSS: v2.0 7.5 from [email protected]
AV:N/AC:L/Au:N/C:P/I:P/A:P
Problem Types: CWE-121 | CWE-119 | CWE-121 CWE-121
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 2.0 | [email protected] | Primary | 7.5 | AV:N/AC:L/Au:N/C:P/I:P/A:P | |
| 2.0 | [email protected] | Secondary | 7.5 | AV:N/AC:L/Au:N/C:P/I:P/A:P | |
| 2.0 | CNA | CVSS | 7.5 | AV:N/AC:L/Au:N/C:P/I:P/A:P |
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
LowAuthentication
NoneConfidentiality
PartialIntegrity
PartialAvailability
PartialAV:N/AC:L/Au:N/C:P/I:P/A:P
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Schneider-electric | Somachine | - | All | All | All |
| Application | Schneider-electric | Somove | - | All | All | All |
| Application | Schneider-electric | Somove Lite | - | All | All | All |
| Application | Schneider-electric | Unity Pro | - | All | All | All |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Schneider Electric | Unity Pro | affected all versions | Not specified |
| CNA | Schneider Electric | SoMachine | affected all versions | Not specified |
| CNA | Schneider Electric | SoMove | affected all versions | Not specified |
| CNA | Schneider Electric | SoMove Lite | affected all versions | Not specified |
| CNA | Schneider Electric | Modbus Communication Library | affected Version 2.2.6 custom | Not specified |
| CNA | Schneider Electric | CANopen Communication Library | affected Version 1.0.2 custom | Not specified |
| CNA | Schneider Electric | EtherNet/IP Communication Library | affected Version 1.0.0 custom | Not specified |
| CNA | Schneider Electric | EM X80 Gateway DTM MB TCP/SL | affected all versions | Not specified |
| CNA | Schneider Electric | Advantys DTMs OTB STB | affected all versions | Not specified |
| CNA | Schneider Electric | KINOS DTM | affected all versions | Not specified |
| CNA | Schneider Electric | SOLO DTM | affected all versions | Not specified |
| CNA | Schneider Electric | Xantrex DTM | affected all versions | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| www.cisa.gov/news-events/ics-advisories/icsa-15-027-02 | [email protected] | www.cisa.gov | |
| download.schneider-electric.com/files | af854a3a-2127-422b-91ae-364da2661108 | download.schneider-electric.com | Vendor Advisory |
| Schneider Electric Multiple Products Buffer Overflow Vulnerability | ICS-CERT | af854a3a-2127-422b-91ae-364da2661108 | ics-cert.us-cert.gov | Third Party Advisory, US Government Resource |
| download.schneider-electric.com/files | [email protected] | download.schneider-electric.com | |
| Multiple Schneider Electric Products CVE-2014-9200 Stack Based Buffer Overflow Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
Discovery Credit
CNA: Ariele Caltabiano (kimiya) with HP’s Zero Day Initiative (ZDI) (en)
Additional Advisory Data
Solutions
CNA: Schneider Electric has released a patch that resolves the vulnerability by removing the vulnerable DLL. Schneider Electric’s patch is available at the follow location: http://download.schneider-electric.com/files?p_Doc_Ref=FDT1 DLL Removal Kit. Schneider Electric’s security notice SEVD-2015-009-01 is available at the following location: http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2015-009-01 .
Legacy QID Mappings
- 590681 Schneider Electric Unity Pro Buffer Overflow Vulnerability Vulnerability (ICSA-15-027-02)