Sploit.io - Search

Product: U.Motion, version: U.motion Builder Versions 1.2.1 and prior.

CVE-2017-7973

Severity: Unknown

Description: A SQL injection vulnerability exists in Schneider Electric's U.motion Builder software versions 1.2.1 and prior in which an unauthenticated user can use calls to various paths allowing performance of arbitrary SQL commands against the underlying database.

CVSS Score: N/A

Priority

D

CISA Data

EPSS Data

  • EPSS: 0.003360000
  • Percentile: 0.560180000
  • Date: 2026-02-28

ExploitDB

No data available.

HackerOne Data

  • Rank: 8793
  • Reports submitted count: 0
  • Unknown: 0
  • None: 0
  • Low: 0
  • Medium: 0
  • High: 0
  • Critical: 0

GitHub PoCs

    Nuclei Templates

    No data available.

    VulnCheck Data

    Affected Products:

    • Schneider Electric SE U.Motion - Versions: U.motion Builder Versions 1.2.1 and prior.

    References:

    Risk Assessment

    1. Risk Assessment
    The vulnerability CVE-2017-7973 is a SQL injection flaw present in Schneider Electric's U.motion Builder software, affecting versions 1.2.1 and earlier. This allows an unauthenticated user to inject arbitrary SQL commands into the underlying database via calls to various paths within the application. The risk is moderate to high, depending on the criticality of the data stored within the U.motion Builder database. The likelihood of exploitation is considered moderate, as SQL injection vulnerabilities are well understood and readily exploitable with standard tools. The ease of exploitation is also moderate, as it requires an attacker to craft malicious SQL queries, but does not require authentication. A successful exploit could lead to a compromise of confidentiality, allowing attackers to steal sensitive data stored in the database. Integrity could also be compromised if attackers can modify data within the database. Availability could be affected if attackers can execute commands that disrupt database operations, although this is less likely than confidentiality or integrity impacts. The EPSS score of 0.003360000 suggests a relatively low, but non-negligible, probability of exploitation in the wild.

    2. Potential Attack Scenarios
    An attacker could leverage this SQL injection vulnerability to gain access to user credentials stored within the U.motion Builder database. The attacker could send a crafted request to a vulnerable path, including a malicious SQL query designed to extract usernames and passwords. This could be achieved by manipulating parameters within a web request, or via API calls if the software exposes an API. For example, an attacker might submit a request to a path handling equipment configuration data, injecting a SQL query to retrieve all user accounts. Once the attacker obtains valid credentials, they can potentially gain full access to the U.motion Builder system and any connected industrial control systems, leading to operational disruption or even control system manipulation. Further, an attacker could modify configuration settings or even inject malicious code into the database, impacting the functionality of the system.

    3. Mitigation Recommendations
    The primary mitigation for CVE-2017-7973 is to upgrade U.motion Builder to a version later than 1.2.1. Schneider Electric provides updated versions that address the SQL injection vulnerability. Patching should be prioritized based on the criticality of the U.motion Builder installation. If immediate patching is not feasible, consider implementing input validation and sanitization measures to filter potentially malicious SQL queries. This can be done at the application layer to prevent injected SQL code from being executed. Web application firewalls (WAFs) can also be deployed to filter malicious SQL traffic. Regularly monitor database activity for unusual patterns that might indicate a successful SQL injection attack. Consult the following resources for more information: Schneider Electric Security Bulletin: http://www.schneider-electric.com/en/download/document/SEVD-2017-178-01/ and SecurityFocus BID: http://www.securityfocus.com/bid/99344.

    4. Executive Summary
    Schneider Electric’s U.motion Builder software, versions 1.2.1 and prior, is vulnerable to a SQL injection flaw that allows attackers to potentially steal sensitive data and compromise the system without needing to authenticate. This vulnerability could impact the confidentiality, integrity, and availability of data stored within the U.motion Builder database. While the probability of exploitation is moderate, the potential impact to operations is significant, particularly if U.motion Builder is critical to your industrial control systems. We recommend upgrading to the latest version of U.motion Builder as soon as possible. If immediate patching is not feasible, implement input validation and consider deploying a web application firewall. Proactive mitigation of this vulnerability is crucial to ensure the continued secure operation of your U.motion Builder systems and the broader industrial environment.

    CVE-2017-7974

    Severity: Unknown

    Description: A path traversal information disclosure vulnerability exists in Schneider Electric's U.motion Builder software versions 1.2.1 and prior in which an unauthenticated user can execute arbitrary code and exfiltrate files.

    CVSS Score: N/A

    Priority

    D

    CISA Data

    EPSS Data

    • EPSS: 0.077970000
    • Percentile: 0.918000000
    • Date: 2026-02-28

    ExploitDB

    No data available.

    HackerOne Data

    • Rank: 8793
    • Reports submitted count: 0
    • Unknown: 0
    • None: 0
    • Low: 0
    • Medium: 0
    • High: 0
    • Critical: 0

    GitHub PoCs

      Nuclei Templates

      No data available.

      VulnCheck Data

      Affected Products:

      • Schneider Electric SE U.Motion - Versions: U.motion Builder Versions 1.2.1 and prior.

      References:

      Risk Assessment

      1. Risk Assessment
      The vulnerability CVE-2017-7974 is a path traversal flaw within Schneider Electric’s U.motion Builder software, affecting versions 1.2.1 and prior. This means an unauthenticated user, requiring no login credentials, can potentially access and exfiltrate files from the system. The business impact can range from moderate to severe depending on the sensitivity of the files accessible. The likelihood of exploitation is considered moderate, as path traversal vulnerabilities are often relatively easy to exploit, and the unauthenticated nature lowers the barrier to entry. The ease of exploitation is also moderate, requiring some knowledge of the file system structure, but not necessarily deep system expertise. Confidentiality is the primary impact, as files can be read and potentially stolen. Integrity could be impacted if the attacker can write to accessible directories, though the description focuses on information disclosure. Availability is less directly impacted, but could suffer if the exfiltration process consumes significant resources. The EPSS score of 0.077970000 indicates a relatively low but non-negligible risk.

      2. Potential Attack Scenarios
      An attacker could leverage this path traversal vulnerability to steal configuration files containing database credentials. The attacker, without needing to authenticate to the U.motion Builder system, crafts a malicious request that utilizes ‘../’ sequences to navigate outside the intended directory. By iteratively traversing the file system, the attacker locates and retrieves the configuration file containing the database username and password. The attacker then uses these credentials to access the backend database, potentially exfiltrating sensitive operational data or even modifying configurations to disrupt operations. The attack vector is network-based, leveraging typical HTTP/HTTPS communication. The attack process involves sending a carefully crafted request, analyzing the response to confirm successful traversal, and then downloading the desired file.

      3. Mitigation Recommendations
      The primary mitigation is to upgrade to a version of U.motion Builder later than 1.2.1. Schneider Electric has released updates to address this vulnerability. If immediate patching isn't feasible, consider implementing web application firewall (WAF) rules to filter out requests containing excessive ‘../’ sequences. Regularly review file permissions to ensure only necessary files are accessible. Implement file integrity monitoring to detect unauthorized file modifications. Further information and the patch can be found at http://www.schneider-electric.com/en/download/document/SEVD-2017-178-01/ and securityfocus.com/bid/99344. Also, segment the network to limit the blast radius if the vulnerability is exploited.

      4. Executive Summary
      Schneider Electric’s U.motion Builder software, versions 1.2.1 and prior, is vulnerable to a path traversal flaw allowing unauthenticated users to potentially steal sensitive files. This means anyone, without needing a username or password, could access important data stored on systems running the software. The risk is moderate, and the potential impact includes loss of confidential information, potentially including database credentials. We recommend upgrading to the latest version of U.motion Builder as soon as possible. If patching is delayed, consider implementing temporary protections like web application firewall rules. Addressing this vulnerability is important to protect critical data and maintain the integrity of operations. Failure to do so could lead to data breaches and operational disruptions.

      CVE-2017-9956

      Severity: Unknown

      Description: An authentication bypass vulnerability exists in Schneider Electric's U.motion Builder software versions 1.2.1 and prior in which the system contains a hard-coded valid session. An attacker can use that session ID as part of the HTTP cookie of a web request, resulting in authentication bypass

      CVSS Score: N/A

      Priority

      D

      CISA Data

      EPSS Data

      • EPSS: 0.004860000
      • Percentile: 0.649440000
      • Date: 2026-02-26

      ExploitDB

      No data available.

      HackerOne Data

      • Rank: 8788
      • Reports submitted count: 0
      • Unknown: 0
      • None: 0
      • Low: 0
      • Medium: 0
      • High: 0
      • Critical: 0

      GitHub PoCs

        Nuclei Templates

        No data available.

        VulnCheck Data

        Affected Products:

        • Schneider Electric SE U.Motion - Versions: U.motion Builder Versions 1.2.1 and prior.

        References:

        Risk Assessment

        1. Risk Assessment
        The vulnerability, CVE-2017-9956, is an improper authentication flaw in Schneider Electric's U.motion Builder software, specifically versions 1.2.1 and earlier. The core issue is a hard-coded, valid session ID that allows an attacker to bypass normal authentication procedures simply by including the ID within an HTTP cookie. This presents a moderate risk, as exploitation is relatively simple. The likelihood of exploitation is considered medium, particularly if the U.motion Builder software is exposed to a network with untrusted clients. The business impact can range from moderate to significant. A successful attack could allow unauthorized access to the U.motion Builder system, potentially impacting the control of processes or automation systems managed by the software. This can affect integrity, as an attacker could modify configurations or initiate unwanted actions. Availability could also be impacted if the attacker disrupts normal operations. While confidentiality might not be directly compromised, the attacker could potentially gain access to sensitive data depending on the system's configuration and usage. The EPSS score of 0.00486 indicates a relatively low, but present risk.

        2. Potential Attack Scenarios
        An attacker could exploit this vulnerability by crafting a simple HTTP request with the hard-coded session ID included in the cookie. The attack vector is network-based, requiring the attacker to be able to send HTTP requests to the U.motion Builder software. The attack process is as follows:
        1. The attacker identifies a system running a vulnerable version of U.motion Builder.
        2. The attacker determines the hard-coded session ID (likely through research or by observing network traffic).
        3. The attacker crafts an HTTP request to the U.motion Builder web interface, including the hard-coded session ID in the cookie.
        4. The U.motion Builder software accepts the request as authenticated, granting the attacker access as if they were a legitimate user.
        The potential outcome is that the attacker gains full access to the U.motion Builder system, allowing them to view configurations, initiate process control changes, or potentially disrupt operations. This could lead to downtime, production errors, or even safety incidents depending on the role of the U.motion Builder in the overall process.

        3. Mitigation Recommendations
        The primary mitigation for CVE-2017-9956 is to upgrade to a version of U.motion Builder that addresses the vulnerability. Schneider Electric recommends upgrading beyond version 1.2.1. Patching should be prioritized, especially for systems exposed to untrusted networks.
        1. Upgrade U.motion Builder: Upgrade to the latest version of U.motion Builder to incorporate the fix for the hard-coded session ID.
        2. Network Segmentation: Segment the network to limit access to the U.motion Builder system, reducing the potential attack surface.
        3. Web Application Firewall (WAF): Implement a WAF to inspect HTTP traffic and potentially block requests with the hard-coded session ID if upgrading is not immediately feasible.
        Relevant resources include:
        - Schneider Electric Security Bulletin: http://www.schneider-electric.com/en/download/document/SEVD-2017-178-01/
        - SecurityFocus BID: http://www.securityfocus.com/bid/99344

        4. Executive Summary
        Schneider Electric's U.motion Builder software, versions 1.2.1 and prior, is vulnerable to an authentication bypass due to a hard-coded session ID. This allows an attacker to gain unauthorized access to the system simply by including the session ID in an HTTP cookie. This vulnerability could impact the integrity and availability of processes controlled by U.motion Builder, potentially leading to downtime or production errors. While the risk is moderate, patching to a version beyond 1.2.1 is recommended as the primary mitigation strategy. Upgrading the software is critical to ensure secure operation and prevent potential disruptions to business processes. Prompt action is advised to minimize potential impact and safeguard critical automation systems.

        CVE-2017-9957

        Severity: Unknown

        Description: A vulnerability exists in Schneider Electric's U.motion Builder software versions 1.2.1 and prior in which the web service contains a hidden system account with a hardcoded password. An attacker can use this information to log into the system with high-privilege credentials.

        CVSS Score: N/A

        Priority

        D

        CISA Data

        EPSS Data

        • EPSS: 0.004430000
        • Percentile: 0.628850000
        • Date: 2026-02-19

        ExploitDB

        No data available.

        HackerOne Data

        • Rank: 8716
        • Reports submitted count: 0
        • Unknown: 0
        • None: 0
        • Low: 0
        • Medium: 0
        • High: 0
        • Critical: 0

        GitHub PoCs

          Nuclei Templates

          No data available.

          VulnCheck Data

          Affected Products:

          • Schneider Electric SE U.Motion - Versions: U.motion Builder Versions 1.2.1 and prior.

          References:

          Risk Assessment

          1. Risk Assessment
          The vulnerability CVE-2017-9957 centers around a hardcoded password for a hidden system account within Schneider Electric’s U.motion Builder software. This represents a moderate to high risk, particularly for organizations relying on U.motion Builder for critical industrial control systems. The nature of the vulnerability is relatively straightforward: a known credential provides attackers with high-privilege access. The likelihood of exploitation is considered moderate to high, as the hardcoded password is relatively easy to discover, and the web service provides a direct attack vector. The EPSS score of 0.004430000 suggests a low but non-negligible probability of exploitation. Impact on confidentiality is high, as attackers can access sensitive system data. Integrity is also at risk, as attackers with high privileges can modify system configurations and processes. Availability could be impacted if the attacker disrupts the web service or the underlying U.motion Builder system. The impact is exacerbated if the U.motion Builder system is exposed to the internet or a less-trusted network.

          2. Potential Attack Scenarios
          An attacker could leverage this vulnerability in the following scenario: A plant engineer is troubleshooting a U.motion Builder system remotely and the web service is accessible from the corporate network. An attacker, having gained a foothold on the corporate network (perhaps through phishing or another vulnerability), scans for exposed U.motion Builder web services. Once identified, the attacker attempts to log in using the hardcoded system account credentials. Successful authentication grants the attacker high-privilege access to the system. The attacker then proceeds to modify control parameters, potentially causing unexpected behavior in the controlled process, such as adjusting motor speeds or altering sequencing logic. This could lead to production downtime, equipment damage, or even safety incidents depending on the specific application of U.motion Builder. The attacker could also exfiltrate configuration data or sensitive process parameters.

          3. Mitigation Recommendations
          The primary mitigation is to upgrade to a version of U.motion Builder newer than 1.2.1, where the hardcoded password has been addressed. Schneider Electric provides a security advisory with further details and download links: http://www.schneider-electric.com/en/download/document/SEVD-2017-178-01/. If immediate patching isn’t possible, consider implementing network segmentation to limit access to the U.motion Builder web service to only trusted networks and users. Implement strong authentication mechanisms where possible, even alongside the hardcoded account, to provide an additional layer of security. Regularly monitor the system for unusual activity, such as unexpected configuration changes or data access patterns. Consider changing the default password on any related systems or services.

          4. Executive Summary
          Schneider Electric’s U.motion Builder software, versions 1.2.1 and earlier, contains a vulnerability where a hidden system account utilizes a hardcoded password. This allows attackers with network access to gain high-privilege control of the system. This could disrupt production processes, damage equipment, or compromise sensitive data. The risk is moderate to high, and prompt action is recommended. Upgrading to the latest version of U.motion Builder is the most effective mitigation. If immediate upgrade is not feasible, network segmentation and monitoring can help reduce the risk. Addressing this vulnerability is critical to maintaining the reliability and security of industrial control systems using U.motion Builder. Failure to address this could result in operational disruptions and potential financial losses.

          CVE-2017-9958

          Severity: Unknown

          Description: An improper access control vulnerability exists in Schneider Electric's U.motion Builder software versions 1.2.1 and prior in which an improper handling of the system configuration can allow an attacker to execute arbitrary code under the context of root.

          CVSS Score: N/A

          Priority

          D

          CISA Data

          EPSS Data

          • EPSS: 0.000550000
          • Percentile: 0.171480000
          • Date: 2026-02-19

          ExploitDB

          No data available.

          HackerOne Data

          • Rank: 8718
          • Reports submitted count: 0
          • Unknown: 0
          • None: 0
          • Low: 0
          • Medium: 0
          • High: 0
          • Critical: 0

          GitHub PoCs

            Nuclei Templates

            No data available.

            VulnCheck Data

            Affected Products:

            • Schneider Electric SE U.Motion - Versions: U.motion Builder Versions 1.2.1 and prior.

            References:

            Risk Assessment

            1. Risk Assessment
            The vulnerability CVE-2017-9958 is an improper access control issue within Schneider Electric's U.motion Builder software, impacting versions 1.2.1 and prior. This means an attacker, by exploiting a flaw in how the system handles its configuration, can potentially execute arbitrary code with root privileges. The business impact could be significant, particularly for organizations utilizing U.motion Builder in critical industrial control systems. A successful exploit could lead to disruption of operations, potential data compromise, and even physical impacts depending on the U.motion Builder's role within the larger system. The likelihood of exploitation is moderate, as it requires access to the U.motion Builder system, but the ease of exploitation, once access is gained, is relatively high given the potential for root-level code execution. This impacts confidentiality by potentially allowing data exfiltration, integrity by allowing modification of system configurations or processes, and availability by potentially causing system crashes or disruptions. While the EPSS score is low at 0.000550000, this doesn’t necessarily diminish the risk, especially within a targeted industrial environment where a successful breach can have substantial consequences.

            2. Potential Attack Scenarios
            An attacker with network access to a system running U.motion Builder version 1.2.1 or earlier could exploit this vulnerability to gain complete control of the system. The attack vector begins with gaining access to the U.motion Builder software, potentially through a network connection or by physically accessing the system. The attacker would then craft a malicious system configuration file, leveraging the improper access control to inject arbitrary code. Once the configuration is loaded by the U.motion Builder, the injected code is executed with root privileges. The potential outcome is complete system compromise, allowing the attacker to install malware, steal data, modify system settings, or disrupt the industrial process controlled by U.motion Builder. This could lead to production downtime, compromised product quality, or even physical damage depending on the application of the U.motion Builder.

            3. Mitigation Recommendations
            The primary mitigation recommendation is to upgrade U.motion Builder to a version later than 1.2.1, if available. Schneider Electric has released a security advisory (http://www.schneider-electric.com/en/download/document/SEVD-2017-178-01/) detailing the vulnerability and providing upgrade instructions. If immediate patching is not possible, consider implementing compensating controls, such as restricting network access to the U.motion Builder system, implementing strong authentication mechanisms, and closely monitoring system logs for suspicious activity. Regularly review and harden the system configuration to minimize the attack surface. Ensure proper segmentation of the network to limit the blast radius should a compromise occur. Refer to SecurityFocus BID 99344 (http://www.securityfocus.com/bid/99344) for additional details on the vulnerability and potential mitigations.

            4. Executive Summary
            Schneider Electric's U.motion Builder software, versions 1.2.1 and earlier, is vulnerable to an improper access control flaw that could allow an attacker to execute arbitrary code with root privileges. This means an attacker could potentially take complete control of the system, leading to disruption of operations, data compromise, or even physical impacts depending on the system’s role. While the likelihood of exploitation may be moderate, the potential consequences are significant, especially within critical industrial control environments. We recommend upgrading to the latest version of U.motion Builder as soon as possible. If an immediate upgrade is not feasible, implement compensating controls such as network segmentation and strong authentication. Addressing this vulnerability is crucial to maintaining the availability, integrity, and confidentiality of systems using U.motion Builder. Prompt action will minimize the risk of a potentially disruptive and costly breach.

            CVE-2017-9960

            Severity: Unknown

            Description: An information disclosure vulnerability exists in Schneider Electric's U.motion Builder software versions 1.2.1 and prior in which the system response to error provides more information than should be available to an unauthenticated user.

            CVSS Score: N/A

            Priority

            D

            CISA Data

            EPSS Data

            • EPSS: 0.002370000
            • Percentile: 0.464770000
            • Date: 2026-02-19

            ExploitDB

            No data available.

            HackerOne Data

            • Rank: 8718
            • Reports submitted count: 0
            • Unknown: 0
            • None: 0
            • Low: 0
            • Medium: 0
            • High: 0
            • Critical: 0

            GitHub PoCs

              Nuclei Templates

              No data available.

              VulnCheck Data

              Affected Products:

              • Schneider Electric SE U.Motion - Versions: U.motion Builder Versions 1.2.1 and prior.

              References:

              Risk Assessment

              1. Risk Assessment
              The vulnerability CVE-2017-9960 is an information disclosure issue within Schneider Electric's U.motion Builder software, affecting versions 1.2.1 and prior. The core of the vulnerability lies in the system’s error handling; it reveals more information than necessary to an unauthenticated user when an error occurs. This isn't a critical vulnerability leading to system compromise, but it's a moderate risk. The business impact centers around potential disclosure of internal system details, potentially aiding an attacker in future exploitation of other vulnerabilities or providing insight into the U.motion Builder's architecture. The likelihood of exploitation is moderate, as an attacker needs to trigger an error condition. The ease of exploitation is fairly easy, requiring minimal effort to cause an error. The impact on confidentiality is moderate; details about the system's internal workings are exposed. Integrity and availability are likely less impacted, though extensive information disclosure could contribute to future attacks impacting these areas. The EPSS score of 0.002370000 indicates a relatively low, but non-zero, probability of exploitation.

              2. Potential Attack Scenarios
              An attacker could leverage this vulnerability in a scenario where they attempt to interact with the U.motion Builder software, deliberately causing an error. For instance, an attacker could submit a slightly malformed configuration file or request, triggering an error response. The error response, instead of being a generic 'Error Occurred', provides details such as internal variable names, file paths, or software versions. This detailed information could then be used to build a better understanding of the system, aiding in the planning of a more targeted attack, possibly exploiting other vulnerabilities present in the U.motion Builder. The attack vector is network-based, requiring connectivity to the U.motion Builder instance. The attack process involves simply triggering an error and observing the response. The potential outcome is the disclosure of internal system details, potentially giving the attacker a head start in a more comprehensive attack.

              3. Mitigation Recommendations
              The primary mitigation for CVE-2017-9960 is to upgrade the U.motion Builder software to a version newer than 1.2.1. Schneider Electric has released updates addressing this information disclosure vulnerability. Regularly patching is crucial for maintaining the security of the U.motion Builder system. As a secondary mitigation, network segmentation can be employed to limit the exposure of the U.motion Builder to potential attackers. Monitoring error logs for unusually verbose messages can also help identify if the vulnerability is being actively exploited. The official Schneider Electric security advisory can be found at http://www.schneider-electric.com/en/download/document/SEVD-2017-178-01/. Further information regarding the vulnerability can be found on SecurityFocus at http://www.securityfocus.com/bid/99344.

              4. Executive Summary
              Schneider Electric’s U.motion Builder software, versions 1.2.1 and prior, contains an information disclosure vulnerability (CVE-2017-9960). This vulnerability allows an attacker to gain more information about the system than they should when an error occurs, potentially aiding in future attacks. While not a critical vulnerability leading to immediate compromise, it provides valuable intelligence to potential attackers. The risk is moderate, and the impact is primarily on system confidentiality. We recommend upgrading to the latest version of U.motion Builder to remediate this vulnerability. This is a relatively straightforward fix that will reduce the risk of future exploitation. Addressing this vulnerability proactively will help protect our systems and data from potential compromise. Prompt patching is important to minimize the attack surface and maintain a strong security posture.