CVE-2017-6021
Summary
| CVE | CVE-2017-6021 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2018-05-14 14:29:00 UTC |
| Updated | 2019-10-09 23:28:00 UTC |
| Description | In Schneider Electric ClearSCADA 2014 R1 (build 75.5210) and prior, 2014 R1.1 (build 75.5387) and prior, 2015 R1 (build 76.5648) and prior, and 2015 R2 (build 77.5882) and prior, an attacker with network access to the ClearSCADA server can send specially crafted sequences of commands and data packets to the ClearSCADA server that can cause the ClearSCADA server process and ClearSCADA communications driver processes to terminate. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). |
Risk And Classification
Problem Types: CWE-20
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Aveva | Clearscada | All | All | All | All |
| Application | Schneider-electric | Clearscada | 2014 | r1 | All | All |
| Application | Schneider-electric | Clearscada | 2014 | r1.1 | All | All |
| Application | Schneider-electric | Clearscada | 2015 | r1 | All | All |
| Application | Schneider-electric | Clearscada | 2015 | r2 | All | All |
| Application | Schneider-electric | Clearscada | 2014 | r1 | All | All |
| Application | Schneider-electric | Clearscada | 2014 | r1.1 | All | All |
| Application | Schneider-electric | Clearscada | 2015 | r1 | All | All |
| Application | Schneider-electric | Clearscada | 2015 | r2 | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| 96768 | BID | www.securityfocus.com | Third Party Advisory, VDB Entry |
| Schneider Electric ClearSCADA | ICS-CERT | MISC | ics-cert.us-cert.gov | Third Party Advisory, US Government Resource |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.