Multiple vulnerabilities in Schneider Electric Modicon M221



Published: 2018-08-29
Risk Low
Patch available YES
Number of vulnerabilities 4
CVE-ID CVE-2018-7789
CVE-2018-7790
CVE-2018-7791
CVE-2018-7792
CWE-ID CWE-703
CWE-199
CWE-264
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Modicon M221
Hardware solutions / Firmware

Vendor Schneider Electric

Security Bulletin

This security bulletin contains information about 4 vulnerabilities.

1) Improper check for unusual or exceptional conditions

EUVDB-ID: #VU14552

Risk: Low

CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-7789

CWE-ID: CWE-703 - Improper Check or Handling of Exceptional Conditions

Exploit availability: No

Description

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The vulnerability exists due to improper check for unusual or exceptional conditions. A remote attacker can send use specially crafted programming protocol frames and reboot Modicon M221.

Mitigation

Update to version 1.6.2.0.

Vulnerable software versions

Modicon M221: before 1.6.2.0

External links

http://download.schneider-electric.com/files?p_enDocType=Technical+leaflet&p_File_Name=SEVD...


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Information management error

EUVDB-ID: #VU14553

Risk: Low

CVSSv3.1: 6.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-7790

CWE-ID: CWE-199 - Information Management Errors

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass security restrictions on the target system.

The vulnerability exists due to information management error. A remote attacker can connect to a Modicon M221, upload the original program from the PLC and replay authentication sequences.

Mitigation

Update to version 1.6.2.0.

Vulnerable software versions

Modicon M221: before 1.6.2.0

External links

http://download.schneider-electric.com/files?p_enDocType=Technical+leaflet&p_File_Name=SEVD-2018-235-01-Modicon-M221.pdf&p_Doc_Ref=SEVD-2018-235-01


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Security restrictions bypass

EUVDB-ID: #VU14554

Risk: Low

CVSSv3.1: 6.7 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-7791

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass security restrictions on the target system.

The vulnerability exists due to improper privileges and access controls. A remote attacker can overwrite the password and upload the original program from the PLC.

Mitigation

Update to version 1.6.2.0.

Vulnerable software versions

Modicon M221: before 1.6.2.0

External links

http://download.schneider-electric.com/files?p_enDocType=Technical+leaflet&p_File_Name=SEVD-2018-235-01-Modicon-M221.pdf&p_Doc_Ref=SEVD-2018-235-01


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Security restrictions bypass

EUVDB-ID: #VU14555

Risk: Low

CVSSv3.1: 6.7 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-7792

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass security restrictions on the target system.

The vulnerability exists due to improper privileges and access controls. A remote attacker can use a rainbow table and decode the password.

Mitigation

Update to version 1.6.2.0.

Vulnerable software versions

Modicon M221: before 1.6.2.0

External links

http://download.schneider-electric.com/files?p_enDocType=Technical+leaflet&p_File_Name=SEVD-2018-235-01-Modicon-M221.pdf&p_Doc_Ref=SEVD-2018-235-01


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###