Improper access control in Schneider Electric Tricon Communication Module



Published: 2020-07-24
Risk High
Patch available YES
Number of vulnerabilities 5
CVE-ID CVE-2020-7483
CVE-2020-7484
CVE-2020-7485
CVE-2020-7486
CVE-2020-7491
CWE-ID CWE-319
CWE-400
CWE-912
CWE-284
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Triconex TriStation 1131
Server applications / SCADA systems

Tricon Communications Module (TCM) Models 4351
Hardware solutions / Other hardware appliances

Tricon Communications Module (TCM) Models 4352
Hardware solutions / Other hardware appliances

Tricon Communications Module (TCM) Models 4351A/B
Hardware solutions / Other hardware appliances

Tricon Communications Module (TCM) Models 4352A/B
Hardware solutions / Other hardware appliances

Vendor Schneider Electric

Security Bulletin

This security bulletin contains information about 5 vulnerabilities.

1) Cleartext transmission of sensitive information

EUVDB-ID: #VU31810

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2020-7483

CWE-ID: CWE-319 - Cleartext Transmission of Sensitive Information

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists within the "password" feature due to software uses insecure communication channel to transmit sensitive information. A remote attacker with ability to intercept network traffic can gain access to sensitive data.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Triconex TriStation 1131: 4.12.0

CPE2.3 External links

http://www.se.com/ww/en/download/document/SESB-2020-105-01


Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

2) Resource exhaustion

EUVDB-ID: #VU31811

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2020-7484

CWE-ID: CWE-400 - Resource exhaustion

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to application does not properly control consumption of internal resources, related to the "password" feature. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Triconex TriStation 1131: 4.12.0

CPE2.3 External links

http://www.se.com/ww/en/download/document/SESB-2020-105-01


Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

3) Hidden functionality

EUVDB-ID: #VU31812

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2020-7485

CWE-ID: CWE-912 - Hidden Functionality (Backdoor)

Exploit availability: No

Description

The vulnerability allows a local user to compromise vulnerable system

The vulnerability exists due to hidden functionality (backdoor) is present in software, related to a legacy support account. A local user can use this functionality to inappropriate access to the TriStation 1131 project file.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Triconex TriStation 1131: 4.9.0 - 4.10.0

CPE2.3 External links

http://www.se.com/ww/en/download/document/SESB-2020-105-01


Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

4) Resource exhaustion

EUVDB-ID: #VU31813

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2020-7486

CWE-ID: CWE-400 - Resource exhaustion

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to application does not properly control consumption of internal resources. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Tricon Communications Module (TCM) Models 4351: 10.0.0

Tricon Communications Module (TCM) Models 4352: 10.0.0

Tricon Communications Module (TCM) Models 4351A/B: 10.0.0

Tricon Communications Module (TCM) Models 4352A/B: 10.0.0

CPE2.3 External links

http://www.se.com/ww/en/download/document/SESB-2020-105-01


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

5) Improper access control

EUVDB-ID: #VU31814

Risk: High

CVSSv3.1:

CVE-ID: CVE-2020-7491

CWE-ID: CWE-284 - Improper Access Control

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions in a legacy debug port account. A remote attacker can bypass implemented security restrictions and gain unauthorized access to the application.

Note: This vulnerability affects the following versions:

  • 10.2.0 through 10.5.3

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Tricon Communications Module (TCM) Models 4351: 10.5.3

Tricon Communications Module (TCM) Models 4352: 10.5.3

Tricon Communications Module (TCM) Models 4351A/B: 10.5.3

Tricon Communications Module (TCM) Models 4352A/B: 10.5.3

CPE2.3 External links

http://www.se.com/ww/en/download/document/SESB-2020-105-01/


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?



###SIDEBAR###