#VU11295 Buffer overflow in Schneider Electric products - CVE-2018-7242
Published: March 28, 2018
Vulnerability identifier: #VU11295
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2018-7242
CWE-ID: CWE-120
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vulnerable software:
Modicon X80 RTU
Modicon M340
Modicon Quantum
Modicon Premium
Modicon X80 RTU
Modicon M340
Modicon Quantum
Modicon Premium
Software vendor:
Schneider Electric
Schneider Electric
Description
The vulnerability allows a remote authenticated attacker to cause DoS condition on the target system.
The weakness exists due to the FTP server does not limit the length of a command parameter. A remote attacker can supply specially crafted parameters, trigger buffer overflow and cause the service to crash.
The weakness exists due to the FTP server does not limit the length of a command parameter. A remote attacker can supply specially crafted parameters, trigger buffer overflow and cause the service to crash.
Remediation
NCCIC recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should:
- Minimize network exposure for all control system devices and/or systems, and ensure that they are not accessible from the Internet.
- Locate control system networks and remote devices behind firewalls, and isolate them from the business network.
- When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing that VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize that VPN is only as secure as the connected devices.