Vulnerability Name:

CVE-2011-4053 (CCN-72423)

Assigned:2011-10-13
Published:2012-01-16
Updated:2012-01-23
Summary:Untrusted search path vulnerability in 7-Technologies (7T) Interactive Graphical SCADA System (IGSS) before 9.0.0.11291 allows local users to gain privileges via a Trojan horse DLL in the current working directory.
Per: http://cwe.mitre.org/data/definitions/426.html

'CWE-426: Untrusted Search Path'
CVSS v3 Severity:10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
9.3 High (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2011-4053

Source: CCN
Type: SA47558
7-Technologies Interactive Graphical SCADA System Insecure Library Loading Vulnerability

Source: CCN
Type: 7-Technologies Web site
Interactive Graphical SCADA System

Source: CCN
Type: OSVDB ID: 78328
7-Technologies Interactive Graphical SCADA System Path Subversion Arbitrary DLL Injection Code Execution

Source: CCN
Type: BID-51438
7T Interactive Graphical SCADA System DLL Loading Arbitrary Code Execution Vulnerability

Source: CCN
Type: ICSA-11-353-01
7-TECHNOLOGIES INTERACTIVE GRAPHICAL DLL HIJACKING

Source: MISC
Type: US Government Resource
http://www.us-cert.gov/control_systems/pdf/ICSA-11-353-01.pdf

Source: XF
Type: UNKNOWN
igss-dll-code-execution(72423)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:7t:igss:2.0:*:*:*:*:*:*:*
  • OR cpe:/a:7t:igss:3.0:*:*:*:*:*:*:*
  • OR cpe:/a:7t:igss:4.1:*:*:*:*:*:*:*
  • OR cpe:/a:7t:igss:5.0:*:*:*:*:*:*:*
  • OR cpe:/a:7t:igss:5.1:*:*:*:*:*:*:*
  • OR cpe:/a:7t:igss:6:*:*:*:*:*:*:*
  • OR cpe:/a:7t:igss:7:*:*:*:*:*:*:*
  • OR cpe:/a:7t:igss:8:*:*:*:*:*:*:*
  • OR cpe:/a:7t:igss:9:*:*:*:*:*:*:*
  • OR cpe:/a:7t:igss:9.0.0.11129:*:*:*:*:*:*:*
  • OR cpe:/a:7t:igss:*:*:*:*:*:*:*:* (Version <= 9.0.0.11200)

  • * Denotes that component is vulnerable
    BACK
    7t igss 2.0
    7t igss 3.0
    7t igss 4.1
    7t igss 5.0
    7t igss 5.1
    7t igss 6
    7t igss 7
    7t igss 8
    7t igss 9
    7t igss 9.0.0.11129
    7t igss *