{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"EcoStruxure Machine Expert versions ant\u00e9rieures \u00e0 2.0","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"spaceLYnk versions ant\u00e9rieures \u00e0 2.61 (ne corrige pas toutes les vuln\u00e9rabilit\u00e9s)","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"Triconex mod\u00e8le 3009 MP versions Tricon ant\u00e9rieures \u00e0 11.8.0 (build 753)","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"micrologiciel pour Modicon M241/M251 versions ant\u00e9rieures \u00e0 5.1.9.14","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"TCM 4351B versions Tricon ant\u00e9rieures \u00e0 11.5.1 ou 11.7.1 (build 638)","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"micrologiciel pour Modicon M218/M241/M251/M262, LMC PacDrive Eco/Pro/Pro2, HMISCU Logic Controllers sans le dernier correctif","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"Harmony STO, STU, GTO, GTU, GTUX, KG configur\u00e9 par Vijeo Designer versions ant\u00e9rieures \u00e0 6.2 SP11","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"Modicon Managed Switch MCSESM et MCSESP versions ant\u00e9rieures \u00e0 8.22","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"homeLYnk versions ant\u00e9rieures \u00e0 2.61 (ne corrige pas toutes les vuln\u00e9rabilit\u00e9s)","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"Harmony HMISCU configur\u00e9 par EcoStruxure Machine Expert versions ant\u00e9rieures \u00e0 2.0","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"Geo SCADA Expert 2020 version April 2021 (83.7787.1)","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2021-22731","url":"https://www.cve.org/CVERecord?id=CVE-2021-22731"},{"name":"CVE-2019-9008","url":"https://www.cve.org/CVERecord?id=CVE-2019-9008"},{"name":"CVE-2021-22741","url":"https://www.cve.org/CVERecord?id=CVE-2021-22741"},{"name":"CVE-2021-22747","url":"https://www.cve.org/CVERecord?id=CVE-2021-22747"},{"name":"CVE-2021-22732","url":"https://www.cve.org/CVERecord?id=CVE-2021-22732"},{"name":"CVE-2021-22742","url":"https://www.cve.org/CVERecord?id=CVE-2021-22742"},{"name":"CVE-2021-22736","url":"https://www.cve.org/CVERecord?id=CVE-2021-22736"},{"name":"CVE-2021-22733","url":"https://www.cve.org/CVERecord?id=CVE-2021-22733"},{"name":"CVE-2021-22744","url":"https://www.cve.org/CVERecord?id=CVE-2021-22744"},{"name":"CVE-2021-22740","url":"https://www.cve.org/CVERecord?id=CVE-2021-22740"},{"name":"CVE-2020-6081","url":"https://www.cve.org/CVERecord?id=CVE-2020-6081"},{"name":"CVE-2021-22699","url":"https://www.cve.org/CVERecord?id=CVE-2021-22699"},{"name":"CVE-2020-10245","url":"https://www.cve.org/CVERecord?id=CVE-2020-10245"},{"name":"CVE-2020-7052","url":"https://www.cve.org/CVERecord?id=CVE-2020-7052"},{"name":"CVE-2019-13538","url":"https://www.cve.org/CVERecord?id=CVE-2019-13538"},{"name":"CVE-2021-22705","url":"https://www.cve.org/CVERecord?id=CVE-2021-22705"},{"name":"CVE-2021-22735","url":"https://www.cve.org/CVERecord?id=CVE-2021-22735"},{"name":"CVE-2019-9009","url":"https://www.cve.org/CVERecord?id=CVE-2019-9009"},{"name":"CVE-2021-22734","url":"https://www.cve.org/CVERecord?id=CVE-2021-22734"},{"name":"CVE-2021-22746","url":"https://www.cve.org/CVERecord?id=CVE-2021-22746"},{"name":"CVE-2021-22737","url":"https://www.cve.org/CVERecord?id=CVE-2021-22737"},{"name":"CVE-2021-22743","url":"https://www.cve.org/CVERecord?id=CVE-2021-22743"},{"name":"CVE-2021-22745","url":"https://www.cve.org/CVERecord?id=CVE-2021-22745"},{"name":"CVE-2021-22738","url":"https://www.cve.org/CVERecord?id=CVE-2021-22738"},{"name":"CVE-2021-22739","url":"https://www.cve.org/CVERecord?id=CVE-2021-22739"}],"links":[],"reference":"CERTFR-2021-AVI-370","revisions":[{"description":"Version initiale","revision_date":"2021-05-12T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSchneider. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une\natteinte \u00e0 la confidentialit\u00e9.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans les produits Schneider","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-130-04 du 11 mai 2021","url":"https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-130-04"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-130-03 du 11 mai 2021","url":"https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-130-03"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-130-02 du 11 mai 2021","url":"https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-130-02"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-130-07 du 11 mai 2021","url":"https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-130-07"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-130-01 du 11 mai 2021","url":"https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-130-01"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-130-06 du 11 mai 2021","url":"https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-130-06"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-130-05 du 11 mai 2021","url":"https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-130-05"}]}
