CVE-2017-5178

CVSS V2 High 10 CVSS V3 Critical 9.8
Description
An issue was discovered in Schneider Electric Tableau Server/Desktop Versions 7.0 to 10.1.3 in Wonderware Intelligence Versions 2014R3 and prior. These versions contain a system account that is installed by default. The default system account is difficult to configure with non-default credentials after installation, and changing the default credentials in the embedded Tableau Server is not documented. If Tableau Server is used with Windows integrated security (Active Directory), the software is not vulnerable. However, when Tableau Server is used with local authentication mode, the software is vulnerable. The default system account could be used to gain unauthorized access.
Overview
  • CVE ID
  • CVE-2017-5178
  • Assigner
  • ics-cert@hq.dhs.gov
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2017-03-08T08:59:00
  • Last Modified Date
  • 2021-06-04T14:19:35
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:schneider-electric:tableau_desktop:7.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:schneider-electric:tableau_desktop:10.1.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:schneider-electric:tableau_server:7.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:schneider-electric:tableau_server:10.1.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:schneider-electric:wonderware_intelligence:*:r3:*:*:*:*:*:* 1 OR 2014
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:L/Au:N/C:C/I:C/A:C
  • Access Vector
  • NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • NONE
  • Confidentiality Impact
  • COMPLETE
  • Integrity Impact
  • COMPLETE
  • Availability Impact
  • COMPLETE
  • Base Score
  • 10
  • Severity
  • HIGH
  • Exploitability Score
  • 10
  • Impact Score
  • 10
CVSS Version 3
  • Version
  • 3.0
  • Vector String
  • CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • LOW
  • Privileges Required
  • NONE
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • HIGH
  • Availability Impact
  • HIGH
  • Base Score
  • 9.8
  • Base Severity
  • CRITICAL
  • Exploitability Score
  • 3.9
  • Impact Score
  • 5.9
References
Reference URL Reference Tags
https://ics-cert.us-cert.gov/advisories/ICSA-17-066-01 Third Party Advisory US Government Resource
http://software.schneider-electric.com/pdf/security-bulletin/lfsec00000119/ Vendor Advisory
http://www.securityfocus.com/bid/96721 Third Party Advisory VDB Entry
History
Created Old Value New Value Data Type Notes
2022-05-10 16:13:36 Added to TrackCVE
2022-12-02 14:33:40 2017-03-08T08:59Z 2017-03-08T08:59:00 CVE Published Date updated
2022-12-02 14:33:40 2021-06-04T14:19:35 CVE Modified Date updated
2022-12-02 14:33:40 Analyzed Vulnerability Status updated