First published: Mon Sep 25 2017(Updated: )
A vulnerability exists in Schneider Electric's U.motion Builder software versions 1.2.1 and prior in which the system accepts reboot in session from unauthenticated users, supporting a denial of service condition.
Credit: cybersecurity@se.com
Affected Software | Affected Version | How to fix |
---|---|---|
Schneider Electric U.motion Builder | <=1.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-9959 has been rated as a high-severity vulnerability due to its potential to allow unauthorized access leading to denial of service.
To fix CVE-2017-9959, upgrade the Schneider Electric U.motion Builder software to version 1.2.2 or later.
Users of Schneider Electric's U.motion Builder software version 1.2.1 and prior are affected by CVE-2017-9959.
CVE-2017-9959 allows an attacker to perform a denial of service attack by sending reboot commands from an unauthenticated session.
CVE-2017-9959 was disclosed in 2017, highlighting a critical security flaw in Schneider Electric's software.