CVE-2017-7575

Schneider Electric Modicon TM221CE16R 1.3.3.3 devices allow remote attackers to discover the application-protection password via a \x00\x01\x00\x00\x00\x05\x01\x5a\x00\x03\x00 request to the Modbus port (502/tcp). Subsequently the application may be arbitrarily downloaded, modified, and uploaded.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:schneider-electric:modicon_tm221ce16r_firmware:1.3.3.3:*:*:*:*:*:*:*
cpe:2.3:h:schneider-electric:modicon_tm221ce16r:-:*:*:*:*:*:*:*

History

21 Nov 2024, 03:32

Type Values Removed Values Added
References () http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2017-097-02 - () http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2017-097-02 -
References () http://www.securityfocus.com/bid/97523 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/97523 - Third Party Advisory, VDB Entry
References () https://os-s.net/advisories/OSS-2017-01.pdf - Exploit, Third Party Advisory () https://os-s.net/advisories/OSS-2017-01.pdf - Exploit, Third Party Advisory

Information

Published : 2017-04-06 21:59

Updated : 2024-11-21 03:32


NVD link : CVE-2017-7575

Mitre link : CVE-2017-7575

CVE.ORG link : CVE-2017-7575


JSON object : View

Products Affected

schneider-electric

  • modicon_tm221ce16r_firmware
  • modicon_tm221ce16r
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor