#VU49326 Out-of-bounds read in Schneider Electric Hardware solutions


Published: 2020-11-18 | Updated: 2021-03-30

Vulnerability identifier: #VU49326

Vulnerability risk: Medium

CVSSv3.1: 5.2 [CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:U/RC:C]

CVE-ID: CVE-2020-7562

CWE-ID: CWE-125

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
BMX P34x
Hardware solutions / Firmware
BMX NOE 0100 (H)
Hardware solutions / Firmware
BMX NOE 0110 (H)
Hardware solutions / Firmware
BMX NOC 0401
Hardware solutions / Firmware
BMX NOR 0200H
Hardware solutions / Firmware
TSXP574634
Hardware solutions / Firmware
TSXP575634
Hardware solutions / Firmware
TSXP576634
Hardware solutions / Firmware
TSXETY4103
Hardware solutions / Firmware
TSXETY5103
Hardware solutions / Firmware
140CPU65xxxxx
Hardware solutions / Firmware
140NOE771x1
Hardware solutions / Firmware
140NOC78x00
Hardware solutions / Firmware
140NOC77101
Hardware solutions / Firmware

Vendor: Schneider Electric

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary condition when uploading a specially crafted file on the controller over FTP. A remote authenticated attacker can trigger out-of-bounds read error and read contents of memory on the system.

This vulnerability affects the following Modicon products:

  • M340 CPUs
    • BMX P34x, all versions
  • M340 Communication Ethernet modules
    • BMX NOE 0100 (H), all versions
    • BMX NOE 0110 (H), all versions
    • BMX NOC 0401, all versions
    • BMX NOR 0200H, all versions
  • Premium processors with integrated Ethernet COPRO
    • TSXP574634, TSXP575634, TSXP576634, all versions
  • Premium communication modules
    • TSXETY4103, all versions
    • TSXETY5103, all versions
  • Quantum processors with integrated Ethernet COPRO
    • 140CPU65xxxxx, all versions
  • Quantum communication modules
    • 140NOE771x1, all versions
    • 140NOC78x00, all versions
    • 140NOC77101, all versions


Mitigation
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

BMX P34x: All versions

BMX NOE 0100 (H): All versions

BMX NOE 0110 (H): All versions

BMX NOC 0401: All versions

BMX NOR 0200H: All versions

TSXP574634: All versions

TSXP575634: All versions

TSXP576634: All versions

TSXETY4103: All versions

TSXETY5103: All versions

140CPU65xxxxx: All versions

140NOE771x1: All versions

140NOC78x00: All versions

140NOC77101: All versions


External links
http://www.se.com/ww/en/download/document/SEVD-2020-315-01/
http://fortiguard.com/zeroday/FG-VD-20-105


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability