An Authentication Bypass by Capture-Replay issue was discovered in Schneider Electric Modicon Modbus Protocol. Sensitive information is transmitted in cleartext in the Modicon Modbus protocol, which may allow an attacker to replay the following commands: run, stop, upload, and download.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/97562 | Third Party Advisory VDB Entry |
https://ics-cert.us-cert.gov/advisories/ICSA-17-101-01 | Third Party Advisory US Government Resource |
http://www.securityfocus.com/bid/97562 | Third Party Advisory VDB Entry |
https://ics-cert.us-cert.gov/advisories/ICSA-17-101-01 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 03:28
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/97562 - Third Party Advisory, VDB Entry | |
References | () https://ics-cert.us-cert.gov/advisories/ICSA-17-101-01 - Third Party Advisory, US Government Resource |
Information
Published : 2017-06-30 03:29
Updated : 2024-11-21 03:28
NVD link : CVE-2017-6034
Mitre link : CVE-2017-6034
CVE.ORG link : CVE-2017-6034
JSON object : View
Products Affected
schneider-electric
- modbus_firmware
- modbus