Schneider Electric has updated software to mitigate an uncontrolled search path element in its SoMove software and DTM software components, according to a report with ICS-CERT.
Successful exploitation of this vulnerability, discovered by ADLab of Venustech, may allow an attacker to execute arbitrary code.
Schneider Electric said the vulnerability affects the following SoMove software and DTM software components:
• SoMove software, versions prior to 2.6.2
• ATV320 DTM, versions prior to 1.1.6
• ATV340 DTM, versions prior to 1.2.3
• ATV6xx DTM, versions prior to 1.8.0
• ATV9xx DTM, versions prior to 1.3.5
• AltivarDtmLibrary, versions prior to 12.7.0
• ATV32 DTM
• ATV71 DTM
• ATV61 DTM
• ATV LIFT DTM
• ATV31/312 DTM
• ATV212 DTM
• ATV12 DTM
No known public exploits specifically target this vulnerability. This vulnerability is not exploitable remotely. However, an attacker with low skill level could leverage the vulnerability.
In the vulnerability, an attacker may execute malicious DLL files that have been placed within the search path.
CVE-2018-7239 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 7.8.
The product sees use mainly in the critical manufacturing sector. It also sees action on a global basis.
Schneider Electric provided the following updates for the affected software packages:
• SoMove Software—SoMove_V2.6.3
• ATV320 DTM—Schneider_Electric_Altivar_Machine_ATV320_DTM_Library_V1.1.6
• ATV340 DTM—Schneider_Electric_Altivar_Machine_ATV340_DTM_Library_V1.2.3
• ATV6XX DTM—Schneider_Electric_Altivar_Process_ATV6xx_DTM_Library_V1.8.0
• ATV9XX DTM—Schneider-Electric-Altivar-Process-ATV9xx-DTM-Library-V1.3.5
• ATV32 / ATV71 / ATV61 / ATV LIFT / ATV31_312 / ATV212 / ATV12 AltivarDtmLibraryV12.7.0
For more information on this vulnerability and its associated patches, please see Schneider Electric’s security notification SEVD-2018-060-01.
Click here for further information related to cybersecurity in Schneider Electric products.