{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-07T06:51:22.970","vulnerabilities":[{"cve":{"id":"CVE-2017-7967","sourceIdentifier":"cybersecurity@se.com","published":"2017-05-09T17:29:00.213","lastModified":"2025-04-20T01:37:25.860","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"All versions of VAMPSET software produced by Schneider Electric, prior to V2.2.189, are susceptible to a memory corruption vulnerability when a corrupted vf2 file is used. This vulnerability causes the software to halt or not start when trying to open the corrupted file. This vulnerability occurs when fill settings are intentionally malformed and is opened in a standalone state, without connection to a protection relay. This attack is not considered to be remotely exploitable. This vulnerability has no effect on the operation of the protection relay to which VAMPSET is connected. As Windows operating system remains operational and VAMPSET responds, it is able to be shut down through its normal closing protocol."},{"lang":"es","value":"Todas las versiones del software VAMPSET producido por Schneider Electric, anteriores a versión 2.2.189, son susceptibles a una vulnerabilidad de corrupción de memoria cuando se utiliza un archivo vf2 corrupto. Esta vulnerabilidad causa que el software se detenga o no se inicie al intentar abrir el archivo corrupto. Esta vulnerabilidad se produce cuando la configuración de llenado está malformada intencionalmente y se abre en un estado independiente, sin conexión a un relé de protección. Este ataque no se considera que sea explotable remotamente. Esta vulnerabilidad no tiene ningún efecto en la operación del relé de protección al que está conectado VAMPSET. A medida que el sistema operativo Windows se mantiene trabajando y VAMPSET responde, es capaz de apagarse por medio de su protocolo de cierre normal."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-119"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:schneider-electric:vampset:*:*:*:*:*:*:*:*","versionEndIncluding":"2.2.185","matchCriteriaId":"D951553D-F5C3-4853-AE08-155B5EE0AC99"}]}]}],"references":[{"url":"http://www.schneider-electric.com/en/download/document/SEVD-2017-061-01/","source":"cybersecurity@se.com","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/97124","source":"cybersecurity@se.com"},{"url":"http://www.schneider-electric.com/en/download/document/SEVD-2017-061-01/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/97124","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}