{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Easergy Studio versions ant\u00e9rieures \u00e0 v9.3.5","product":{"name":"N/A","vendor":{"name":"Schneider Electric","scada":true}}},{"description":"Magelis XBT","product":{"name":"N/A","vendor":{"name":"Schneider Electric","scada":true}}},{"description":"Modicon M580 versions ant\u00e9rieures \u00e0 sv4.20","product":{"name":"N/A","vendor":{"name":"Schneider Electric","scada":true}}},{"description":"EcoStruxure Control Expert versions ant\u00e9rieures \u00e0 v16.0","product":{"name":"N/A","vendor":{"name":"Schneider Electric","scada":true}}},{"description":"Harmony/Magelis HMISCU versions ant\u00e9rieures \u00e0 6.3.1","product":{"name":"N/A","vendor":{"name":"Schneider Electric","scada":true}}},{"description":"contr\u00f4leurs PacDrive sans le dernier correctif de s\u00e9curit\u00e9","product":{"name":"N/A","vendor":{"name":"Schneider Electric","scada":true}}},{"description":"PowerLogic T300, MiCOM C264 D7.21 (et ult\u00e9rieures) ou Easergy C5 1.1.6 (et ult\u00e9rieures), PACiS GTW et EPAS GTW sans les derni\u00e8res mesures de contournement","product":{"name":"N/A","vendor":{"name":"Schneider Electric","scada":true}}},{"description":"contr\u00f4leurs Modicon M241, M251 et M262, HMISCU et EcoStruxure Machine Expert sans les derniers correctifs de s\u00e9curit\u00e9 et mesures de contournement","product":{"name":"N/A","vendor":{"name":"Schneider Electric","scada":true}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2022-4046","url":"https://www.cve.org/CVERecord?id=CVE-2022-4046"},{"name":"CVE-2023-7032","url":"https://www.cve.org/CVERecord?id=CVE-2023-7032"},{"name":"CVE-2023-27976","url":"https://www.cve.org/CVERecord?id=CVE-2023-27976"},{"name":"CVE-2023-1548","url":"https://www.cve.org/CVERecord?id=CVE-2023-1548"},{"name":"CVE-2020-25176","url":"https://www.cve.org/CVERecord?id=CVE-2020-25176"},{"name":"CVE-2020-25178","url":"https://www.cve.org/CVERecord?id=CVE-2020-25178"},{"name":"CVE-2023-28355","url":"https://www.cve.org/CVERecord?id=CVE-2023-28355"},{"name":"CVE-2022-4224","url":"https://www.cve.org/CVERecord?id=CVE-2022-4224"},{"name":"CVE-2020-25180","url":"https://www.cve.org/CVERecord?id=CVE-2020-25180"},{"name":"CVE-2019-6833","url":"https://www.cve.org/CVERecord?id=CVE-2019-6833"},{"name":"CVE-2020-25184","url":"https://www.cve.org/CVERecord?id=CVE-2020-25184"},{"name":"CVE-2020-25182","url":"https://www.cve.org/CVERecord?id=CVE-2020-25182"}],"links":[],"reference":"CERTFR-2024-AVI-0013","revisions":[{"description":"Version initiale","revision_date":"2024-01-09T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"},{"description":"Atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es"},{"description":"Contournement de la politique de s\u00e9curit\u00e9"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"},{"description":"\u00c9l\u00e9vation de privil\u00e8ges"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSchneider Electric. Certaines d'entre elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de\nservice \u00e0 distance et un contournement de la politique de s\u00e9curit\u00e9.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans les produits Schneider Electric","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2019-225-01 du 13 ao\u00fbt 2019","url":"https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2019-225-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=sevd-2019-225-01.json"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2024-009-02 du 09 janvier 2024","url":"https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-009-02&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-009-02.pdf"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2023-101-03 du 11 avril 2023","url":"https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-101-03&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-101-03.pdf"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2023-010-06 du 10 janvier 2023","url":"https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-010-06&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-010-06_Modicon_Controllers_Security_Notification.pdf"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2023-101-01 du 11 avril 2023","url":"https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-101-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-101-01.pdf"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2023-192-04 du 11 juillet 2023","url":"https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-192-04&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-192-04.pdf"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2021-159-04 du 10 janvier 2023","url":"https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-159-04&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2021-159-04_ISaGRAF_Security_Notification.pdf"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2021-159-04 du 08 juin 2021","url":"https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-159-04&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2021-159-04_ISaGRAF_Security_Notification.pdf"}]}
