{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"IGSS Data Collector (dc.exe) versions ant\u00e9rieures \u00e0 V15.0.0.21244","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"fellerLYnk versions ant\u00e9rieures \u00e0 V2.6.2","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"micrologiciel TM5CSLC100FS version ant\u00e9rieures v2.57","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"Conext Advisor 2 Gateway","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"spaceLYnk versions ant\u00e9rieures \u00e0 V2.6.2","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"micrologiciel TM5NS31 versions ant\u00e9rieures \u00e0 2.79","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"Conext Advisor 2 Cloud","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"Wiser for KNX versions ant\u00e9rieures \u00e0 V2.6.2","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"Modicon M218 logic controller versions ant\u00e9rieures \u00e0 5.1.0.8","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"micrologiciel TM5NEIP1 versions ant\u00e9rieures \u00e0 3.12","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"ConneXium Network Manager","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"Conext Control V2 Gateway","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"micrologiciel TM5CSLC200FS version ant\u00e9rieures v2.57","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2020-17438","url":"https://www.cve.org/CVERecord?id=CVE-2020-17438"},{"name":"CVE-2019-0685","url":"https://www.cve.org/CVERecord?id=CVE-2019-0685"},{"name":"CVE-2020-1472","url":"https://www.cve.org/CVERecord?id=CVE-2020-1472"},{"name":"CVE-2020-0601","url":"https://www.cve.org/CVERecord?id=CVE-2020-0601"},{"name":"CVE-2019-11135","url":"https://www.cve.org/CVERecord?id=CVE-2019-11135"},{"name":"CVE-2019-0803","url":"https://www.cve.org/CVERecord?id=CVE-2019-0803"},{"name":"CVE-2021-22801","url":"https://www.cve.org/CVERecord?id=CVE-2021-22801"},{"name":"CVE-2020-0609","url":"https://www.cve.org/CVERecord?id=CVE-2020-0609"},{"name":"CVE-2021-22802","url":"https://www.cve.org/CVERecord?id=CVE-2021-22802"},{"name":"CVE-2019-0859","url":"https://www.cve.org/CVERecord?id=CVE-2019-0859"},{"name":"CVE-2020-13987","url":"https://www.cve.org/CVERecord?id=CVE-2020-13987"},{"name":"CVE-2020-1020","url":"https://www.cve.org/CVERecord?id=CVE-2020-1020"},{"name":"CVE-2020-0610","url":"https://www.cve.org/CVERecord?id=CVE-2020-0610"},{"name":"CVE-2020-0938","url":"https://www.cve.org/CVERecord?id=CVE-2020-0938"},{"name":"CVE-2020-1350","url":"https://www.cve.org/CVERecord?id=CVE-2020-1350"},{"name":"CVE-2021-22800","url":"https://www.cve.org/CVERecord?id=CVE-2021-22800"},{"name":"CVE-2021-22804","url":"https://www.cve.org/CVERecord?id=CVE-2021-22804"},{"name":"CVE-2020-0796","url":"https://www.cve.org/CVERecord?id=CVE-2020-0796"},{"name":"CVE-2021-22803","url":"https://www.cve.org/CVERecord?id=CVE-2021-22803"},{"name":"CVE-2021-22806","url":"https://www.cve.org/CVERecord?id=CVE-2021-22806"},{"name":"CVE-2019-1040","url":"https://www.cve.org/CVERecord?id=CVE-2019-1040"},{"name":"CVE-2021-22805","url":"https://www.cve.org/CVERecord?id=CVE-2021-22805"}],"links":[],"reference":"CERTFR-2021-AVI-772","revisions":[{"description":"Version initiale","revision_date":"2021-10-12T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"},{"description":"Atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSchneider. Certaines d'entre elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de\nservice \u00e0 distance et une atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans les produits Schneider","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-285-04 du 12 octobre 2021","url":"https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-285-04"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-285-03 du 12 octobre 2021","url":"https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-285-03"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-285-02 du 12 octobre 2021","url":"https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-285-02"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-285-05 du 12 octobre 2021","url":"https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-285-05"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-285-01 du 12 octobre 2021","url":"https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-285-01"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-285-06 du 12 octobre 2021","url":"https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-285-06"}]}
