Schneider.Electric.IIoT.Monitor.downloadCSV.Path.Traversal

description-logoDescription

This indicates an attack attempt to exploit a Directory Traversal Vulnerability in Schneider Electric IIoT Monitor.
A remote, unauthenticated attacker can exploit this vulnerability by sending a crafted request to downloadCSV.jsp. Successful exploitation could result in the disclosure of arbitrary file contents for any file accessible by SYSTEM.

affected-products-logoAffected Products

Schneider Electric IIoT Monitor 3.1.38 and prior

Impact logoImpact

Information Disclosure: Remote attackers can gain sensitive information from vulnerable systems.

recomended-action-logoRecommended Actions

Apply the most recent upgrade or patch from the vendor.
https://www.schneider-electric.com/en/download/document/SEVD-2018-354-03/

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2019-04-23 14.598 Default_action:pass:drop
2019-04-08 14.588

References

ICSA-19-008-02