{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[],"affected_systems_content":"<P>PowerSCADA Expert v8.2</P>","content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2017-9629","url":"https://www.cve.org/CVERecord?id=CVE-2017-9629"},{"name":"CVE-2017-9631","url":"https://www.cve.org/CVERecord?id=CVE-2017-9631"},{"name":"CVE-2017-9627","url":"https://www.cve.org/CVERecord?id=CVE-2017-9627"}],"links":[{"title":"Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2017-236-01 du    24 ao\u00fbt 2017","url":"http://www.schneider-electric.com/en/download/document/SEVD-2017-236-01/"}],"reference":"CERTFR-2017-AVI-274","revisions":[{"description":"version initiale.","revision_date":"2017-08-28T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans <span\nclass=\"textit\">SCADA Schneider Electric PowerSCADA Expert</span>. Elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans SCADA Schneider Electric PowerSCADA Expert","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2017-236-01 du 24 ao\u00fbt 2017","url":null}]}
