SB2024112909 - Multiple vulnerabilities in Schneider Electric EcoStruxure Control Expert, EcoStruxure Process Expert and Modicon M340, M580 and M580 Safety PLCs



SB2024112909 - Multiple vulnerabilities in Schneider Electric EcoStruxure Control Expert, EcoStruxure Process Expert and Modicon M340, M580 and M580 Safety PLCs

Published: November 29, 2024

Security Bulletin ID SB2024112909
Severity
High
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 67% Low 33%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Improper Enforcement of Message Integrity During Transmission in a Communication Channel (CVE-ID: CVE-2023-6408)

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to improper enforcement of message integrity during transmission in a communication channel. A remote attacker can perform a man-in-the-middle (MitM) attack and execute arbitrary code on the system.


2) Use of hard-coded credentials (CVE-ID: CVE-2023-6409)

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to presence of hard-coded credentials in application code. A remote attacker can gain access to a project file protected with application password.


3) Insufficiently protected credentials (CVE-ID: CVE-2023-27975)

The vulnerability allows a local user to compromise the target system.

The vulnerability exists due to insufficiently protected credentials. A local user can gain access to the project file.


Remediation

Install update from vendor's website.