Security Bulletin
This security bulletin contains one high risk vulnerability.
EUVDB-ID: #VU10858
Risk: High
CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2018-7239
CWE-ID:
CWE-427 - Uncontrolled Search Path Element
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to insecure .dll loading mechanism when opening files. A remote attacker can place a file along with specially crafted .dll file on a remote SBM or WebDAV share, trick the victim into opening it and execute arbitrary code on the target system with privileges of the current victim.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
MitigationInstall update from vendor's website.
SoMove: All versions
ATV12 DTM: All versions
ATV212 DTM: All versions
ATV31/312 DTM: All versions
ATV LIFT DTM: All versions
ATV61 DTM: All versions
ATV71 DTM: All versions
ATV32 DTM: All versions
AltivarDtmLibrary: All versions
ATV9xx DTM: All versions
ATV6xx DTM: All versions
ATV340 DTM: All versions
ATV320 DTM: All versions
External linkshttp://www.schneider-electric.com/en/download/document/SEVD-2018-060-01/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.