{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[],"affected_systems_content":"<ul> <li>EcoStruxure Control Expert toutes versions (versions Unity Pro inclus) ant\u00e9rieures 15.0 SP1</li> <li>EcoStruxure Control Expert version ant\u00e9rieures \u00e0 V15.0 SP1 sans le dernier correctif</li> <li>EcoStruxure Process Expert toutes versions (versions EcoStruxure Hybrid DCS inclus)</li> <li>SCADAPack RemoteConnect for x70 toutes versions</li> <li>Modicon M580 CPU (part numbers BMEP* et BMEH*) toutes versions</li> <li>Modicon M340 CPU (part numbers BMXP34*) toutes versions</li> <li>SoSafe Configurable versions ant\u00e9rieures \u00e0 1.8.1</li> <li>C-Bus Toolkit versions ant\u00e9rieures \u00e0 1.15.9</li> <li>Easergy T300 avec un microgiciel (firmware) en versions ant\u00e9rieures \u00e0 2.8</li> <li>Easergy T200 (Modbus) versions ant\u00e9rieures \u00e0 SC2-04MOD-07000103</li> <li>Easergy T200 (IEC104) versions ant\u00e9rieures \u00e0 SC2-04IEC-07000103</li> <li>Easergy T200 (DNP3) versions ant\u00e9rieures \u00e0 SC2-04DNP-07000103</li> <li>EVlink CityEVC1S22P4 / EVC1S7P4 versions ant\u00e9rieures \u00e0 R8 V3.4.0.1</li> <li>EVlink ParkingEVW2 / EVF2 / EV.2 versions ant\u00e9rieures \u00e0 R8 V3.4.0.1</li> <li>EVlink Smart WallboxEVB1A versions ant\u00e9rieures \u00e0 R8 V3.4.0.1</li> </ul> <p><em>Note : Actuellement, aucun correctif n'est propos\u00e9 pour les vuln\u00e9rabilit\u00e9s dans les produits EcoStruxure Process Expert, Modicon M580, Modicon M340 et SCADAPack. Cependant des mesures de contournement sont propos\u00e9es par l'\u00e9diteur pour les produits Modicon M580 et M340 afin de r\u00e9duire le risque et l'impact d'exploitation de la CVE-2021-22779.</em></p> ","content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2021-22771","url":"https://www.cve.org/CVERecord?id=CVE-2021-22771"},{"name":"CVE-2021-22721","url":"https://www.cve.org/CVERecord?id=CVE-2021-22721"},{"name":"CVE-2021-22779","url":"https://www.cve.org/CVERecord?id=CVE-2021-22779"},{"name":"CVE-2021-22781","url":"https://www.cve.org/CVERecord?id=CVE-2021-22781"},{"name":"CVE-2021-22777","url":"https://www.cve.org/CVERecord?id=CVE-2021-22777"},{"name":"CVE-2021-22780","url":"https://www.cve.org/CVERecord?id=CVE-2021-22780"},{"name":"CVE-2021-22729","url":"https://www.cve.org/CVERecord?id=CVE-2021-22729"},{"name":"CVE-2021-22708","url":"https://www.cve.org/CVERecord?id=CVE-2021-22708"},{"name":"CVE-2021-22727","url":"https://www.cve.org/CVERecord?id=CVE-2021-22727"},{"name":"CVE-2021-22774","url":"https://www.cve.org/CVERecord?id=CVE-2021-22774"},{"name":"CVE-2021-22773","url":"https://www.cve.org/CVERecord?id=CVE-2021-22773"},{"name":"CVE-2021-22706","url":"https://www.cve.org/CVERecord?id=CVE-2021-22706"},{"name":"CVE-2021-22782","url":"https://www.cve.org/CVERecord?id=CVE-2021-22782"},{"name":"CVE-2021-22778","url":"https://www.cve.org/CVERecord?id=CVE-2021-22778"},{"name":"CVE-2021-22728","url":"https://www.cve.org/CVERecord?id=CVE-2021-22728"},{"name":"CVE-2021-22730","url":"https://www.cve.org/CVERecord?id=CVE-2021-22730"},{"name":"CVE-2021-22770","url":"https://www.cve.org/CVERecord?id=CVE-2021-22770"},{"name":"CVE-2021-22784","url":"https://www.cve.org/CVERecord?id=CVE-2021-22784"},{"name":"CVE-2021-22769","url":"https://www.cve.org/CVERecord?id=CVE-2021-22769"},{"name":"CVE-2021-22723","url":"https://www.cve.org/CVERecord?id=CVE-2021-22723"},{"name":"CVE-2021-22726","url":"https://www.cve.org/CVERecord?id=CVE-2021-22726"},{"name":"CVE-2021-22722","url":"https://www.cve.org/CVERecord?id=CVE-2021-22722"},{"name":"CVE-2020-12525","url":"https://www.cve.org/CVERecord?id=CVE-2020-12525"},{"name":"CVE-2021-22772","url":"https://www.cve.org/CVERecord?id=CVE-2021-22772"},{"name":"CVE-2021-22707","url":"https://www.cve.org/CVERecord?id=CVE-2021-22707"}],"links":[],"reference":"CERTFR-2021-AVI-517","revisions":[{"description":"Version initiale","revision_date":"2021-07-13T00:00:00.000000"}],"risks":[{"description":"Atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es"},{"description":"Ex\u00e9cution de code arbitraire"},{"description":"Contournement de la politique de s\u00e9curit\u00e9"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSchneider. Certaines d'entre elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire, un d\u00e9nis de service, un\ncontournement de la politique de s\u00e9curit\u00e9 et une atteinte \u00e0 l'int\u00e9grit\u00e9\ndes donn\u00e9es.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans les produits Schneider","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-194-04 du 13 juillet 2021","url":"https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-194-04"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-194-03 du 13 juillet 2021","url":"https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-194-03"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-194-02 du 13 juillet 2021","url":"https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-194-02"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-194-05 du 13 juillet 2021","url":"https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-194-05"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-194-06 du 13 juillet 2021","url":"https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet&p_File_Name=SEVD-2021-194-06_EVlink_City_Parking_SmartWallbox_Charging_Stations_Security_Notification.pdf&p_Doc_Ref=SEVD-2021-194-06"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-194-01 du 13 juillet 2021","url":"https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet&p_File_Name=SEVD-2021-194-01_EcoStruxure_Control_Expert_Process_Expert_SCADAPack_RemoteConnect_Modicon_M580_M340.pdf&p_Doc_Ref=SEVD-2021-194-01"}]}
