Help
  • Explore Community
  • Get Started
  • Ask the Community
  • How-To & Best Practices
  • Contact Support
Notifications
Login / Register
Community
Community
Notifications
close
  • Forums
  • Knowledge Center
  • Events & Webinars
  • Ideas
  • Blogs
Help
Help
  • Explore Community
  • Get Started
  • Ask the Community
  • How-To & Best Practices
  • Contact Support
Login / Register
Sustainability
Sustainability

We Value Your Feedback!
Could you please spare a few minutes to share your thoughts on Cloud Connected vs On-Premise Services. Your feedback can help us shape the future of services.
Learn more about the survey or Click here to Launch the survey
Schneider Electric Services Innovation Team!

DCE 7.3.1 vulnerability to CVE-1999-0524

EcoStruxure IT forum

Schneider Electric support forum about installation and configuration for DCIM including EcoStruxure IT Expert, IT Advisor, Data Center Expert, and NetBotz

cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Show  only  | Search instead for 
Did you mean: 
  • Home
  • Schneider Electric Community
  • EcoStruxure IT
  • EcoStruxure IT forum
  • DCE 7.3.1 vulnerability to CVE-1999-0524
Options
  • Subscribe to RSS Feed
  • Mark Topic as New
  • Mark Topic as Read
  • Float this Topic for Current User
  • Bookmark
  • Subscribe
  • Mute
  • Printer Friendly Page
Invite a Co-worker
Send a co-worker an invite to the portal.Just enter their email address and we'll connect them to register. After joining, they will belong to the same company.
You have entered an invalid email address. Please re-enter the email address.
This co-worker has already been invited to the Exchange portal. Please invite another co-worker.
Please enter email address
Send Invite Cancel
Invitation Sent
Your invitation was sent.Thanks for sharing Exchange with your co-worker.
Send New Invite Close
Top Experts
User Count
Cory_McDonald
Admiral Cory_McDonald Admiral
124
Jef
Admiral Jef Admiral
109
gsterling
Captain gsterling Captain
71
APC_Steve
Captain APC_Steve Captain
62
View All

Invite a Colleague

Found this content useful? Share it with a Colleague!

Invite a Colleague Invite
Solved Go to Solution
Back to EcoStruxure IT forum
Solved
DCIM_Support
Picard DCIM_Support
Picard

Posted: ‎2020-07-03 12:47 AM . Last Modified: ‎2024-04-09 12:49 AM

0 Likes
5
1714
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: ‎2020-07-03 12:47 AM . Last Modified: ‎2024-04-09 12:49 AM

DCE 7.3.1 vulnerability to CVE-1999-0524

We have picked up that DCE v7.3.1 is vulnerable to CVE-1999-0524. Will there be a patch for this or will be sorted in the next release?

(CID:105467933)

Labels
  • Labels:
  • Data Center Expert
Reply

Link copied. Please paste this link to share this article on your social media post.

  • All forum topics
  • Previous Topic
  • Next Topic

Accepted Solutions
DCIM_Support
Picard DCIM_Support
Picard

Posted: ‎2020-07-03 12:48 AM . Last Modified: ‎2024-04-09 12:49 AM

0 Likes
1
1714
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: ‎2020-07-03 12:48 AM . Last Modified: ‎2024-04-09 12:49 AM

Hi Kevin,

 

From what engineering has mentioned to me, this CVE in itself does not allow any damage by itselc however as the CVE notes:

ICMP information such as (1) netmask and (2) timestamp is allowed from arbitrary hosts.

If the customer needs to have this information blocked, they can use their router or firewalls to block pings and ping responses. Here was the reply I received:

This CVE pertains to general characteristics of having ICMP enabled on your network or having devices support/respond to ICMP requests. The customer should use their firewall to block these accordingly or they could disable ICMP completely. 

 

 

Thanks,

Steve

(CID:105467989)

See Answer In Context

Reply

Link copied. Please paste this link to share this article on your social media post.

Replies 5
DCIM_Support
Picard DCIM_Support
Picard

Posted: ‎2020-07-03 12:48 AM . Last Modified: ‎2024-04-09 12:49 AM

0 Likes
1
1714
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: ‎2020-07-03 12:48 AM . Last Modified: ‎2024-04-09 12:49 AM

Hi Kevin,

 

I looked at this vulnerability from 1999 and it is apparently a very low severity.

https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0524

Impact
CVSS Severity (version 2.0):
CVSS v2 Base Score: 0.0 LOW

 

This vulnerability existed before APC even purchased NetBotz so I'm assuming this was deemed too low to worry about. Still, I will double check with engineering to see if this is something that they can put on their radar but due to the age and severity, I do not think they have been looking at ti nor will they be looking at it going forward. 

 

Just to be sure, what did they use to scan DCE? Do you have the tool's output?

 

Steve

(CID:105467984)

Reply

Link copied. Please paste this link to share this article on your social media post.

DCIM_Support
Picard DCIM_Support
Picard

Posted: ‎2020-07-03 12:48 AM . Last Modified: ‎2024-04-09 12:49 AM

In response to DCIM_Support
0 Likes
0
1714
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: ‎2020-07-03 12:48 AM . Last Modified: ‎2024-04-09 12:49 AM

Thank you Steven.

(CID:105467994)

Reply

Link copied. Please paste this link to share this article on your social media post.

DCIM_Support
Picard DCIM_Support
Picard

Posted: ‎2020-07-03 12:48 AM . Last Modified: ‎2024-04-09 12:49 AM

0 Likes
1
1715
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: ‎2020-07-03 12:48 AM . Last Modified: ‎2024-04-09 12:49 AM

Hi Kevin,

 

From what engineering has mentioned to me, this CVE in itself does not allow any damage by itselc however as the CVE notes:

ICMP information such as (1) netmask and (2) timestamp is allowed from arbitrary hosts.

If the customer needs to have this information blocked, they can use their router or firewalls to block pings and ping responses. Here was the reply I received:

This CVE pertains to general characteristics of having ICMP enabled on your network or having devices support/respond to ICMP requests. The customer should use their firewall to block these accordingly or they could disable ICMP completely. 

 

 

Thanks,

Steve

(CID:105467989)

Reply

Link copied. Please paste this link to share this article on your social media post.

DCIM_Support
Picard DCIM_Support
Picard

Posted: ‎2020-07-03 12:48 AM . Last Modified: ‎2024-04-09 12:49 AM

In response to DCIM_Support
0 Likes
0
1714
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: ‎2020-07-03 12:48 AM . Last Modified: ‎2024-04-09 12:49 AM

Thank you Steven. Much appreciated

(CID:105467995)

Reply

Link copied. Please paste this link to share this article on your social media post.

DCIM_Support
Picard DCIM_Support
Picard

Posted: ‎2020-07-03 12:48 AM . Last Modified: ‎2023-10-31 10:25 PM

0 Likes
0
1714
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: ‎2020-07-03 12:48 AM . Last Modified: ‎2023-10-31 10:25 PM

superhero.png

This question is closed for comments. You're welcome to start a new topic if you have further comments on this issue.

Reply

Link copied. Please paste this link to share this article on your social media post.

To The Top!

Forums

  • APC UPS Data Center Backup Solutions
  • EcoStruxure IT
  • EcoStruxure Geo SCADA Expert
  • Metering & Power Quality
  • Schneider Electric Wiser

Knowledge Center

Events & webinars

Ideas

Blogs

Get Started

  • Ask the Community
  • Community Guidelines
  • Community User Guide
  • How-To & Best Practice
  • Experts Leaderboard
  • Contact Support
Brand-Logo
Subscribing is a smart move!
You can subscribe to this board after you log in or create your free account.
Forum-Icon

Create your free account or log in to subscribe to the board - and gain access to more than 10,000+ support articles along with insights from experts and peers.

Register today for FREE

Register Now

Already have an account? Login

Terms & Conditions Privacy Notice Change your Cookie Settings © 2025 Schneider Electric

This is a heading

With achievable small steps, users progress and continually feel satisfaction in task accomplishment.

Usetiful Onboarding Checklist remembers the progress of every user, allowing them to take bite-sized journeys and continue where they left.

of