{}

Nuestras marcas

Bienvenido al sitio web de Schneider Electric

Bienvenido a nuestro sitio web.
Buscar Preguntas Frecuentes
Is PowerChute Vulnerable to CVE-2011-3389?
Issue:
PowerChute is being flagged as Vulnerable to BEAST SSL security issue.

Products:
PowerChute Business Edition 9.1.0, 9.1.1
PowerChute Network Shutdown versions 3.0.0, 3.0.1, 3.1

Environment:
All supported OS

Cause:
**The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a "BEAST" attack.

Solution:

Upgrade PowerChute Business Edition to version 9.5 or above Or uninstall PowerChute Business Edition and install PowerChute Serial Shutdown.
Upgrade PowerChute Network Shutdown to version 4.x or 5.x
Or
Upgrade browser to use a version that allows for TLS 1.2 support - disable SSL 2.0/3.0 and TLS 1.0/1.1 when accessing PowerChute UI.

** Information provided by National Vulnerability Database http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3389

Schneider Electric Chile

Is PowerChute Vulnerable to CVE-2011-3389?
Issue:
PowerChute is being flagged as Vulnerable to BEAST SSL security issue.

Products:
PowerChute Business Edition 9.1.0, 9.1.1
PowerChute Network Shutdown versions 3.0.0, 3.0.1, 3.1

Environment:
All supported OS

Cause:
** The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a "BEAST" attack.

Solution:

Upgrade PowerChute Business Edition to version 9.5 or above Or uninstall PowerChute Business Edition and install PowerChute Serial Shutdown.
Upgrade PowerChute Network Shutdown to version 4.x or 5.x
Or
Upgrade browser to use a version that allows for TLS 1.2 support - disable SSL 2.0/3.0 and TLS 1.0/1.1 when accessing PowerChute UI.

** Information provided by National Vulnerability Database http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3389

Schneider Electric Chile

Explora más
Rango:
Categoría:
Explora más
Rango:
Categoría:
Explora más
Rango:
Categoría:
Explora más
Rango:
Categoría:
Your browser is out of date and has known security issues.

It also may not display all features of this website or other websites.

Please upgrade your browser to access all of the features of this website.

Latest version for Google Chrome, Mozilla Firefox or Microsoft Edgeis recommended for optimal functionality.
Your browser is out of date and has known security issues.

It also may not display all features of this website or other websites.

Please upgrade your browser to access all of the features of this website.

Latest version for Google Chrome, Mozilla Firefox or Microsoft Edgeis recommended for optimal functionality.