Help
  • Explore Community
  • Get Started
  • Ask the Community
  • How-To & Best Practices
  • Contact Support
Notifications
Login / Register
Community
Community
Notifications
close
  • Forums
  • Knowledge Center
  • Events & Webinars
  • Ideas
  • Blogs
Help
Help
  • Explore Community
  • Get Started
  • Ask the Community
  • How-To & Best Practices
  • Contact Support
Login / Register
Sustainability
Sustainability

Join our "Ask Me About" community webinar on May 20th at 9 AM CET and 5 PM CET to explore cybersecurity and monitoring for Data Center and edge IT. Learn about market trends, cutting-edge technologies, and best practices from industry experts.
Register and secure your Critical IT infrastructure

Vulnerability found in DCE & DCO

EcoStruxure IT forum

Schneider Electric support forum about installation and configuration for DCIM including EcoStruxure IT Expert, IT Advisor, Data Center Expert, and NetBotz

cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Show  only  | Search instead for 
Did you mean: 
  • Home
  • Schneider Electric Community
  • EcoStruxure IT
  • EcoStruxure IT forum
  • Vulnerability found in DCE & DCO
Options
  • Subscribe to RSS Feed
  • Mark Topic as New
  • Mark Topic as Read
  • Float this Topic for Current User
  • Bookmark
  • Subscribe
  • Mute
  • Printer Friendly Page
Invite a Co-worker
Send a co-worker an invite to the portal.Just enter their email address and we'll connect them to register. After joining, they will belong to the same company.
You have entered an invalid email address. Please re-enter the email address.
This co-worker has already been invited to the Exchange portal. Please invite another co-worker.
Please enter email address
Send Invite Cancel
Invitation Sent
Your invitation was sent.Thanks for sharing Exchange with your co-worker.
Send New Invite Close
Top Experts
User Count
Cory_McDonald
Admiral Cory_McDonald Admiral
124
Jef
Admiral Jef Admiral
108
gsterling
Captain gsterling Captain
71
APC_Steve
Captain APC_Steve Captain
62
View All

Invite a Colleague

Found this content useful? Share it with a Colleague!

Invite a Colleague Invite
Solved Go to Solution
Back to EcoStruxure IT forum
Solved
DCIM_Support
Picard DCIM_Support
Picard

Posted: ‎2020-07-04 10:47 PM . Last Modified: ‎2024-04-04 02:46 AM

0 Likes
9
992
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: ‎2020-07-04 10:47 PM . Last Modified: ‎2024-04-04 02:46 AM

Vulnerability found in DCE & DCO

Hi Team,

Customer ran a vulnerability scan on his network and did find the following on DCE & DCO, it all has to do with a update of OpenSSH to a version 7.7p1 or later.

DCE = 7.5 & DCO = 8.2.2

In which version of DCE/DCO will this be updated ?

(CID:134026904)

Labels
  • Labels:
  • Data Center Expert
  • Data Center Operation
Reply

Link copied. Please paste this link to share this article on your social media post.

  • All forum topics
  • Previous Topic
  • Next Topic

Accepted Solutions
DCIM_Support
Picard DCIM_Support
Picard

Posted: ‎2020-07-04 10:47 PM . Last Modified: ‎2024-04-04 02:46 AM

0 Likes
1
993
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: ‎2020-07-04 10:47 PM . Last Modified: ‎2024-04-04 02:46 AM

Hi Cees,

 

. The current suggestion I can make and what we’re asked to do for customer is to note:

  • For customers or researchers to report incidents, Schneider provides the external email address, cybersecurity@schneider-electric.com
  • All vulnerability disclosures are reported on Schneider Electric's global web site; SE.com Cybersecurity Portal. You  can review Security Notifications here as well

And that

  • Schneider Agents should refer customer to cybersecurity@schneider-electric.com or https://www.schneider-electric.com/en/work/support/cybersecurity/report-an-incident.jsp to submit their question or concern along with any pertinent details.
  • Customers should expect a response within 3-5 business days.

Thanks,

Steve

(CID:134027416)

See Answer In Context

Reply

Link copied. Please paste this link to share this article on your social media post.

Replies 9
DCIM_Support
Picard DCIM_Support
Picard

Posted: ‎2020-07-04 10:47 PM . Last Modified: ‎2024-04-04 02:46 AM

0 Likes
0
993
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: ‎2020-07-04 10:47 PM . Last Modified: ‎2024-04-04 02:46 AM

...Very interesting, but even the most recent official updates for RHEL-7.5 (and for CentOS-7.5) offer a vulnerable version of OpenSSH:

$ uname -a
Linux 3.10.0-862.11.6.el7.x86_64 #1 SMP Fri Aug 10 16:55:11 UTC 2018 x86_64 x86_64 x86_64 GNU/Linux
$ rpm -qa | grep ssh
openssh-server-7.4p1-16.el7.x86_64
openssh-7.4p1-16.el7.x86_64
openssh-clients-7.4p1-16.el7.x86_64
libssh2-1.4.3-10.el7_2.1.x86_64

(CID:134027175)

Reply

Link copied. Please paste this link to share this article on your social media post.

DCIM_Support
Picard DCIM_Support
Picard

Posted: ‎2020-07-04 10:47 PM . Last Modified: ‎2024-04-04 02:46 AM

0 Likes
0
993
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: ‎2020-07-04 10:47 PM . Last Modified: ‎2024-04-04 02:46 AM

hmm, interesting ...

(CID:134027218)

Reply

Link copied. Please paste this link to share this article on your social media post.

DCIM_Support
Picard DCIM_Support
Picard

Posted: ‎2020-07-04 10:47 PM . Last Modified: ‎2024-04-04 02:46 AM

0 Likes
1
994
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: ‎2020-07-04 10:47 PM . Last Modified: ‎2024-04-04 02:46 AM

Hi Cees,

 

. The current suggestion I can make and what we’re asked to do for customer is to note:

  • For customers or researchers to report incidents, Schneider provides the external email address, cybersecurity@schneider-electric.com
  • All vulnerability disclosures are reported on Schneider Electric's global web site; SE.com Cybersecurity Portal. You  can review Security Notifications here as well

And that

  • Schneider Agents should refer customer to cybersecurity@schneider-electric.com or https://www.schneider-electric.com/en/work/support/cybersecurity/report-an-incident.jsp to submit their question or concern along with any pertinent details.
  • Customers should expect a response within 3-5 business days.

Thanks,

Steve

(CID:134027416)

Reply

Link copied. Please paste this link to share this article on your social media post.

DCIM_Support
Picard DCIM_Support
Picard

Posted: ‎2020-07-04 10:47 PM . Last Modified: ‎2024-04-04 02:46 AM

In response to DCIM_Support
0 Likes
0
993
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: ‎2020-07-04 10:47 PM . Last Modified: ‎2024-04-04 02:46 AM

Thanks Steve, I will contact the customer to sent their vulnerability report to the email address mentioned above.

 

Regards,

 

Cees

(CID:134027427)

Reply

Link copied. Please paste this link to share this article on your social media post.

DCIM_Support
Picard DCIM_Support
Picard

Posted: ‎2020-07-04 10:48 PM . Last Modified: ‎2024-04-04 02:46 AM

0 Likes
1
993
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: ‎2020-07-04 10:48 PM . Last Modified: ‎2024-04-04 02:46 AM

Hi Cees,

Here is a brief summary of our responses to the vulnerabilities highlighted within the underlying packages installed on DCE 7.5. A follow on post will do the same for DCO.

CVE-2016-1908 and CVE-2015-5600 are both addressed within DCE 7.5 as it uses a newer version of openssh (openssh-5.3p1-123.el6_9.x86_64), which contains fixes for both.

The other 3 issues are not technically fixed in our shipping version of openssh, as fixes are not available on CentOS 6, but they are generally not exploitable and/or can be mitigated by a user. Details below on that below:

  • CVE-2016-10009
    • Statement from RedHat:
      In order to exploit this flaw, the attacker needs to have control of the forwarded agent-socket and the ability to write to the filesystem of the host running ssh-agent.
    • Users are not provided with the DCE root password, and cannot access the filesystem to leverage the issue, unless under the direction of technical support.
  • CVE-2016-6515
    • SSH is disabled by default on DCE 7.x, and normally not needed unless technical support needs to access the DCE server. 
    • If concerned about this issue, leave SSH turned off, unless required for technical support usage.
  • CVE-2016-10012
    • Statement from RedHat:
      In order to exploit this flaw, the attacker needs to first compromise the sandboxed privilege-separation process by using another security flaw.  Because of this restriction for successful exploitation, this issue has been rated as having Low security impact.
    • SSH is disabled by default on DCE 7.x, and normally not needed unless technical support needs to access the DCE server. 
    • If concerned about this issue, leave SSH turned off, unless required for technical support usage.

It's worth noting that fixes are available for these issues within CentOS 7. DCE will move to this version in a future release, likely within 2019.

Please let me know if you or your customer have any follow on questions or concerns and we'd be happy to answer them.

Thanks,

Brian Behbehani

(CID:134028283)

Reply

Link copied. Please paste this link to share this article on your social media post.

DCIM_Support
Picard DCIM_Support
Picard

Posted: ‎2020-07-04 10:48 PM . Last Modified: ‎2024-04-04 02:46 AM

In response to DCIM_Support
0 Likes
0
993
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: ‎2020-07-04 10:48 PM . Last Modified: ‎2024-04-04 02:46 AM

Hi Brian,

Thanks a lot for your clear answer, will sent this info to the customer.

Will wait for the response on DCO,

Best regards,

Cees

(CID:134028503)

Reply

Link copied. Please paste this link to share this article on your social media post.

DCIM_Support
Picard DCIM_Support
Picard

Posted: ‎2020-07-04 10:48 PM . Last Modified: ‎2024-04-04 02:46 AM

0 Likes
1
993
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: ‎2020-07-04 10:48 PM . Last Modified: ‎2024-04-04 02:46 AM

Hi Cees

 

As Brian Behbehani mentioned fixes are available for these issues within CentOS 7, Data Center Operations 8.2.2 is shipped with CentOS 7.4 and openssh packages that are installed contain fixes for mentioned vulnerabilities.

 

OpenSSH packages that are installed with Data Center Operations 8.2.2 are

openssh-server-7.4p1-13.el7_4.x86_64

openssh-7.4p1-13.el7_4.x86_64

openssh-clients-7.4p1-13.el7_4.x86_64

 

Please see here for updated packages that contain vulnerability fixes https://access.redhat.com/errata/RHSA-2017:2029

 

You are more than welcome to contact us if you have any follow up questions.

 

Regards

Elvedin 

(CID:134028629)

Reply

Link copied. Please paste this link to share this article on your social media post.

DCIM_Support
Picard DCIM_Support
Picard

Posted: ‎2020-07-04 10:48 PM . Last Modified: ‎2024-04-04 02:46 AM

In response to DCIM_Support
0 Likes
0
992
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: ‎2020-07-04 10:48 PM . Last Modified: ‎2024-04-04 02:46 AM

Hi Elvedin, thanks a lot for your response,

 

Best regards,

Cees

(CID:134028632)

Reply

Link copied. Please paste this link to share this article on your social media post.

DCIM_Support
Picard DCIM_Support
Picard

Posted: ‎2020-07-04 10:48 PM . Last Modified: ‎2023-10-22 04:16 AM

0 Likes
0
992
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: ‎2020-07-04 10:48 PM . Last Modified: ‎2023-10-22 04:16 AM

superhero.png

This question is closed for comments. You're welcome to start a new topic if you have further comments on this issue.

Reply

Link copied. Please paste this link to share this article on your social media post.

To The Top!

Forums

  • APC UPS Data Center Backup Solutions
  • EcoStruxure IT
  • EcoStruxure Geo SCADA Expert
  • Metering & Power Quality
  • Schneider Electric Wiser

Knowledge Center

Events & webinars

Ideas

Blogs

Get Started

  • Ask the Community
  • Community Guidelines
  • Community User Guide
  • How-To & Best Practice
  • Experts Leaderboard
  • Contact Support
Brand-Logo
Subscribing is a smart move!
You can subscribe to this board after you log in or create your free account.
Forum-Icon

Create your free account or log in to subscribe to the board - and gain access to more than 10,000+ support articles along with insights from experts and peers.

Register today for FREE

Register Now

Already have an account? Login

Terms & Conditions Privacy Notice Change your Cookie Settings © 2025 Schneider Electric

This is a heading

With achievable small steps, users progress and continually feel satisfaction in task accomplishment.

Usetiful Onboarding Checklist remembers the progress of every user, allowing them to take bite-sized journeys and continue where they left.

of