LOW · 3.9

CVE-2017-9635

Schneider Electric Ampla MES 6.4 provides capability to configure users and their privileges. When Ampla MES users are configured to use Simple Security, a weakness in the password hashing algorithm c...

Vulnerability Description

Schneider Electric Ampla MES 6.4 provides capability to configure users and their privileges. When Ampla MES users are configured to use Simple Security, a weakness in the password hashing algorithm could be exploited to reverse the user's password. Schneider Electric recommends that users of Ampla MES versions 6.4 and prior should upgrade to Ampla MES version 6.5 as soon as possible.

CVSS Score

3.9

LOW

CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
LOW
Integrity
LOW
Availability
LOW

Affected Products

VendorProductVersions
Schneider-ElectricAmpla Manufacturing Execution System<= 6.4

Related Weaknesses (CWE)

References

FAQ

What is CVE-2017-9635?

CVE-2017-9635 is a vulnerability with a CVSS score of 3.9 (LOW). Schneider Electric Ampla MES 6.4 provides capability to configure users and their privileges. When Ampla MES users are configured to use Simple Security, a weakness in the password hashing algorithm c...

How severe is CVE-2017-9635?

CVE-2017-9635 has been rated LOW with a CVSS base score of 3.9/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2017-9635?

Check the references section above for vendor advisories and patch information. Affected products include: Schneider-Electric Ampla Manufacturing Execution System.