SB2020072418 - Improper access control in Schneider Electric Tricon Communication Module



SB2020072418 - Improper access control in Schneider Electric Tricon Communication Module

Published: July 24, 2020

Security Bulletin ID SB2020072418
Severity
High
Patch available
YES
Number of vulnerabilities 5
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

High 20% Medium 40% Low 40%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 5 secuirty vulnerabilities.


1) Cleartext transmission of sensitive information (CVE-ID: CVE-2020-7483)

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists within the "password" feature due to software uses insecure communication channel to transmit sensitive information. A remote attacker with ability to intercept network traffic can gain access to sensitive data.


2) Resource exhaustion (CVE-ID: CVE-2020-7484)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to application does not properly control consumption of internal resources, related to the "password" feature. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.


3) Hidden functionality (CVE-ID: CVE-2020-7485)

The vulnerability allows a local user to compromise vulnerable system

The vulnerability exists due to hidden functionality (backdoor) is present in software, related to a legacy support account. A local user can use this functionality to inappropriate access to the TriStation 1131 project file.


4) Resource exhaustion (CVE-ID: CVE-2020-7486)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to application does not properly control consumption of internal resources. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.


5) Improper access control (CVE-ID: CVE-2020-7491)

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions in a legacy debug port account. A remote attacker can bypass implemented security restrictions and gain unauthorized access to the application.

Note: This vulnerability affects the following versions:

  • 10.2.0 through 10.5.3


Remediation

Install update from vendor's website.