CVE-2017-5178
high-risk
Published 2017-03-08
An issue was discovered in Schneider Electric Tableau Server/Desktop Versions 7.0 to 10.1.3 in Wonderware Intelligence Versions 2014R3 and prior. These versions contain a system account that is installed by default. The default system account is difficult to configure with non-default credentials after installation, and changing the default credentials in the embedded Tableau Server is not documented. If Tableau Server is used with Windows integrated security (Active Directory), the software is not vulnerable. However, when Tableau Server is used with local authentication mode, the software is vulnerable. The default system account could be used to gain unauthorized access.
Do I need to act?
~
2.5% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (5)
Tableau Desktop
Tableau Desktop
Tableau Server
Tableau Server
Wonderware Intelligence
Affected Vendors
References (6)
Third Party Advisory
http://www.securityfocus.com/bid/96721
Third Party Advisory
https://ics-cert.us-cert.gov/advisories/ICSA-17-066-01
Third Party Advisory
http://www.securityfocus.com/bid/96721
Third Party Advisory
https://ics-cert.us-cert.gov/advisories/ICSA-17-066-01
50
/ 100
high-risk
Severity
32/34 · Critical
Exploitability
6/34 · Minimal
Exposure
12/34 · Low