The installer routine in Schneider Electric MiCOM S1 Studio uses world-writable permissions for executable files, which allows local users to modify the service or the configuration files, and consequently gain privileges or trigger incorrect protective-relay operation, via a Trojan horse executable file.
                
            References
                    | Link | Resource | 
|---|---|
| http://download.schneider-electric.com/files?p_File_Id=56543584&p_File_Name=SEVD-2013-087-01-MiCOM-S1-Studio-SW.pdf | Vendor Advisory | 
| http://ics-cert.us-cert.gov/pdf/ICSA-13-100-01.pdf | US Government Resource | 
| http://download.schneider-electric.com/files?p_File_Id=56543584&p_File_Name=SEVD-2013-087-01-MiCOM-S1-Studio-SW.pdf | Vendor Advisory | 
| http://ics-cert.us-cert.gov/pdf/ICSA-13-100-01.pdf | US Government Resource | 
Configurations
                    History
                    21 Nov 2024, 01:48
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://download.schneider-electric.com/files?p_File_Id=56543584&p_File_Name=SEVD-2013-087-01-MiCOM-S1-Studio-SW.pdf - Vendor Advisory | |
| References | () http://ics-cert.us-cert.gov/pdf/ICSA-13-100-01.pdf - US Government Resource | 
Information
                Published : 2013-04-18 02:25
Updated : 2025-04-11 00:51
NVD link : CVE-2013-0687
Mitre link : CVE-2013-0687
CVE.ORG link : CVE-2013-0687
JSON object : View
Products Affected
                schneider-electric
- micom_s1_studio
CWE
                
                    
                        
                        CWE-264
                        
            Permissions, Privileges, and Access Controls
