Schneider Electric Modicon TM221CE16R 1.3.3.3 devices allow remote attackers to discover the application-protection password via a \x00\x01\x00\x00\x00\x05\x01\x5a\x00\x03\x00 request to the Modbus port (502/tcp). Subsequently the application may be arbitrarily downloaded, modified, and uploaded.
References
Link | Resource |
---|---|
http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2017-097-02 | |
http://www.securityfocus.com/bid/97523 | Third Party Advisory VDB Entry |
https://os-s.net/advisories/OSS-2017-01.pdf | Exploit Third Party Advisory |
http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2017-097-02 | |
http://www.securityfocus.com/bid/97523 | Third Party Advisory VDB Entry |
https://os-s.net/advisories/OSS-2017-01.pdf | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 03:32
Type | Values Removed | Values Added |
---|---|---|
References | () http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2017-097-02 - | |
References | () http://www.securityfocus.com/bid/97523 - Third Party Advisory, VDB Entry | |
References | () https://os-s.net/advisories/OSS-2017-01.pdf - Exploit, Third Party Advisory |
Information
Published : 2017-04-06 21:59
Updated : 2024-11-21 03:32
NVD link : CVE-2017-7575
Mitre link : CVE-2017-7575
CVE.ORG link : CVE-2017-7575
JSON object : View
Products Affected
schneider-electric
- modicon_tm221ce16r_firmware
- modicon_tm221ce16r
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor