SB2018032802 - Multiple vulnerabilities in Schneider Electric firmware



SB2018032802 - Multiple vulnerabilities in Schneider Electric firmware

Published: March 28, 2018

Security Bulletin ID SB2018032802
Severity
High
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 33% Low 67%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Stack-based buffer overflow (CVE-ID: CVE-2018-7240)

The vulnerability allows a remote authenticated attacker to execute arbitrary code on the target system.

The weakness exists due to the FTP server does not limit the length of a command parameter. A remote attacker can supply specially crafted parameters, trigger stack-based buffer overflow and execute arbitrary code with elevated privileges.

2) Use of hard-coded credentials (CVE-ID: CVE-2018-7241)

The vulnerability allows a remote authenticated attacker to bypass security restrictions on the target system.

The weakness exists due to the FTP servers contain a hard-coded account. A remote attacker can bypass security restrictions and gain unauthorized access to the system.

3) Buffer overflow (CVE-ID: CVE-2018-7242)

The vulnerability allows a remote authenticated attacker to cause DoS condition on the target system.

The weakness exists due to the FTP server does not limit the length of a command parameter. A remote attacker can supply specially crafted parameters, trigger buffer overflow and cause the service to crash.

Remediation

Install update from vendor's website.