Multiple vulnerabilities in Schneider Electric Modicon M221



Published: 2018-08-29
Risk Low
Patch available YES
Number of vulnerabilities 4
CVE-ID CVE-2018-7789
CVE-2018-7790
CVE-2018-7791
CVE-2018-7792
CWE-ID CWE-703
CWE-199
CWE-264
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Modicon M221
Hardware solutions / Firmware

Vendor Schneider Electric

Security Bulletin

This security bulletin contains information about 4 vulnerabilities.

1) Improper check for unusual or exceptional conditions

EUVDB-ID: #VU14552

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2018-7789

CWE-ID: CWE-703 - Improper Check or Handling of Exceptional Conditions

Exploit availability: No

Description

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The vulnerability exists due to improper check for unusual or exceptional conditions. A remote attacker can send use specially crafted programming protocol frames and reboot Modicon M221.

Mitigation

Update to version 1.6.2.0.

Vulnerable software versions

Modicon M221: before 1.6.2.0


CPE2.3 External links

http://download.schneider-electric.com/files?p_enDocType=Technical+leaflet&p_File_Name=SEVD...

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

2) Information management error

EUVDB-ID: #VU14553

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2018-7790

CWE-ID: CWE-199 - Information Management Errors

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass security restrictions on the target system.

The vulnerability exists due to information management error. A remote attacker can connect to a Modicon M221, upload the original program from the PLC and replay authentication sequences.

Mitigation

Update to version 1.6.2.0.

Vulnerable software versions

Modicon M221: before 1.6.2.0


CPE2.3 External links

http://download.schneider-electric.com/files?p_enDocType=Technical+leaflet&p_File_Name=SEVD-2018-235-01-Modicon-M221.pdf&p_Doc_Ref=SEVD-2018-235-01

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

3) Security restrictions bypass

EUVDB-ID: #VU14554

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2018-7791

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass security restrictions on the target system.

The vulnerability exists due to improper privileges and access controls. A remote attacker can overwrite the password and upload the original program from the PLC.

Mitigation

Update to version 1.6.2.0.

Vulnerable software versions

Modicon M221: before 1.6.2.0


CPE2.3 External links

http://download.schneider-electric.com/files?p_enDocType=Technical+leaflet&p_File_Name=SEVD-2018-235-01-Modicon-M221.pdf&p_Doc_Ref=SEVD-2018-235-01

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

4) Security restrictions bypass

EUVDB-ID: #VU14555

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2018-7792

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass security restrictions on the target system.

The vulnerability exists due to improper privileges and access controls. A remote attacker can use a rainbow table and decode the password.

Mitigation

Update to version 1.6.2.0.

Vulnerable software versions

Modicon M221: before 1.6.2.0


CPE2.3 External links

http://download.schneider-electric.com/files?p_enDocType=Technical+leaflet&p_File_Name=SEVD-2018-235-01-Modicon-M221.pdf&p_Doc_Ref=SEVD-2018-235-01

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?



###SIDEBAR###