An issue was discovered in Schneider Electric Unity PRO prior to V11.1. Unity projects can be compiled as x86 instructions and loaded onto the PLC Simulator delivered with Unity PRO. These x86 instructions are subsequently executed directly by the simulator. A specially crafted patched Unity project file can make the simulator execute malicious code by redirecting the control flow of these instructions.
                
            References
                    | Link | Resource | 
|---|---|
| http://www.securityfocus.com/bid/93830 | Third Party Advisory VDB Entry | 
| https://ics-cert.us-cert.gov/advisories/ICSA-16-306-03 | Third Party Advisory US Government Resource | 
Configurations
                    History
                    No history.
Information
                Published : 2017-02-13 21:59
Updated : 2017-03-15 19:57
NVD link : CVE-2016-8354
Mitre link : CVE-2016-8354
CVE.ORG link : CVE-2016-8354
JSON object : View
Products Affected
                schneider-electric
- unity_pro
 
CWE
                
                    
                        
                        CWE-94
                        
            Improper Control of Generation of Code ('Code Injection')
