Vulnerability Description
Schneider Electric Ampla MES 6.4 provides capability to interact with data from third party databases. When connectivity to those databases is configured to use a SQL user name and password, an attacker may be able to sniff details from the connection string. Schneider Electric recommends that users of Ampla MES versions 6.4 and prior should upgrade to Ampla MES version 6.5 as soon as possible.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Schneider-Electric | Ampla Manufacturing Execution System | <= 6.4 |
Related Weaknesses (CWE)
References
- http://software.schneider-electric.com/pdf/security-bulletin/lfsec00000118/Vendor Advisory
- http://www.securityfocus.com/bid/99469Third Party AdvisoryVDB Entry
- https://ics-cert.us-cert.gov/advisories/ICSA-17-187-05Third Party AdvisoryUS Government Resource
- http://software.schneider-electric.com/pdf/security-bulletin/lfsec00000118/Vendor Advisory
- http://www.securityfocus.com/bid/99469Third Party AdvisoryVDB Entry
- https://ics-cert.us-cert.gov/advisories/ICSA-17-187-05Third Party AdvisoryUS Government Resource
FAQ
What is CVE-2017-9637?
CVE-2017-9637 is a vulnerability with a CVSS score of 4.1 (MEDIUM). Schneider Electric Ampla MES 6.4 provides capability to interact with data from third party databases. When connectivity to those databases is configured to use a SQL user name and password, an attack...
How severe is CVE-2017-9637?
CVE-2017-9637 has been rated MEDIUM with a CVSS base score of 4.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-9637?
Check the references section above for vendor advisories and patch information. Affected products include: Schneider-Electric Ampla Manufacturing Execution System.