Risk | High |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2018-7239 |
CWE-ID | CWE-427 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
SoMove Client/Desktop applications / Other client software ATV12 DTM Universal components / Libraries / Libraries used by multiple products ATV212 DTM Universal components / Libraries / Libraries used by multiple products ATV31/312 DTM Universal components / Libraries / Libraries used by multiple products ATV LIFT DTM Universal components / Libraries / Libraries used by multiple products ATV61 DTM Universal components / Libraries / Libraries used by multiple products ATV71 DTM Universal components / Libraries / Libraries used by multiple products ATV32 DTM Universal components / Libraries / Libraries used by multiple products AltivarDtmLibrary Universal components / Libraries / Libraries used by multiple products ATV9xx DTM Universal components / Libraries / Libraries used by multiple products ATV6xx DTM Universal components / Libraries / Libraries used by multiple products ATV340 DTM Universal components / Libraries / Libraries used by multiple products ATV320 DTM Universal components / Libraries / Libraries used by multiple products |
Vendor | Schneider Electric |
Security Bulletin
This security bulletin contains one high risk vulnerability.
EUVDB-ID: #VU10858
Risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2018-7239
CWE-ID:
CWE-427 - Uncontrolled Search Path Element
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to insecure .dll loading mechanism when opening files. A remote attacker can place a file along with specially crafted .dll file on a remote SBM or WebDAV share, trick the victim into opening it and execute arbitrary code on the target system with privileges of the current victim.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
MitigationInstall update from vendor's website.
SoMove: All versions
ATV12 DTM: All versions
ATV212 DTM: All versions
ATV31/312 DTM: All versions
ATV LIFT DTM: All versions
ATV61 DTM: All versions
ATV71 DTM: All versions
ATV32 DTM: All versions
AltivarDtmLibrary: All versions
ATV9xx DTM: All versions
ATV6xx DTM: All versions
ATV340 DTM: All versions
ATV320 DTM: All versions
CPE2.3https://www.schneider-electric.com/en/download/document/SEVD-2018-060-01/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.