SB2018082906 - Multiple vulnerabilities in Schneider Electric Modicon M221



SB2018082906 - Multiple vulnerabilities in Schneider Electric Modicon M221

Published: August 29, 2018

Security Bulletin ID SB2018082906
Severity
Low
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Improper check for unusual or exceptional conditions (CVE-ID: CVE-2018-7789)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The vulnerability exists due to improper check for unusual or exceptional conditions. A remote attacker can send use specially crafted programming protocol frames and reboot Modicon M221.


2) Information management error (CVE-ID: CVE-2018-7790)

The vulnerability allows a remote attacker to bypass security restrictions on the target system.

The vulnerability exists due to information management error. A remote attacker can connect to a Modicon M221, upload the original program from the PLC and replay authentication sequences.


3) Security restrictions bypass (CVE-ID: CVE-2018-7791)

The vulnerability allows a remote attacker to bypass security restrictions on the target system.

The vulnerability exists due to improper privileges and access controls. A remote attacker can overwrite the password and upload the original program from the PLC.


4) Security restrictions bypass (CVE-ID: CVE-2018-7792)

The vulnerability allows a remote attacker to bypass security restrictions on the target system.

The vulnerability exists due to improper privileges and access controls. A remote attacker can use a rainbow table and decode the password.


Remediation

Install update from vendor's website.