Vulnerability Description
Schneider Electric Ampla MES 6.4 provides capability to configure users and their privileges. When Ampla MES users are configured to use Simple Security, a weakness in the password hashing algorithm could be exploited to reverse the user's password. Schneider Electric recommends that users of Ampla MES versions 6.4 and prior should upgrade to Ampla MES version 6.5 as soon as possible.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Schneider-Electric | Ampla Manufacturing Execution System | <= 6.4 |
Related Weaknesses (CWE)
References
- http://software.schneider-electric.com/pdf/security-bulletin/lfsec00000118/Vendor Advisory
- http://www.securityfocus.com/bid/99469Third Party AdvisoryVDB Entry
- https://ics-cert.us-cert.gov/advisories/ICSA-17-187-05Third Party AdvisoryUS Government Resource
- http://software.schneider-electric.com/pdf/security-bulletin/lfsec00000118/Vendor Advisory
- http://www.securityfocus.com/bid/99469Third Party AdvisoryVDB Entry
- https://ics-cert.us-cert.gov/advisories/ICSA-17-187-05Third Party AdvisoryUS Government Resource
FAQ
What is CVE-2017-9635?
CVE-2017-9635 is a vulnerability with a CVSS score of 3.9 (LOW). Schneider Electric Ampla MES 6.4 provides capability to configure users and their privileges. When Ampla MES users are configured to use Simple Security, a weakness in the password hashing algorithm c...
How severe is CVE-2017-9635?
CVE-2017-9635 has been rated LOW with a CVSS base score of 3.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-9635?
Check the references section above for vendor advisories and patch information. Affected products include: Schneider-Electric Ampla Manufacturing Execution System.