An Improper Check for Unusual or Exceptional Conditions vulnerability exists in Schneider Electric's Modicon M221 product (all references, all versions prior to firmware V1.6.2.0). The vulnerability allows unauthorized users to remotely reboot Modicon M221 using crafted programing protocol frames.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/105171 | Third Party Advisory VDB Entry |
https://ics-cert.us-cert.gov/advisories/ICSA-18-240-02 | Mitigation Third Party Advisory US Government Resource |
https://www.schneider-electric.com/en/download/document/SEVD-2018-233-01/ | Mitigation Vendor Advisory |
http://www.securityfocus.com/bid/105171 | Third Party Advisory VDB Entry |
https://ics-cert.us-cert.gov/advisories/ICSA-18-240-02 | Mitigation Third Party Advisory US Government Resource |
https://www.schneider-electric.com/en/download/document/SEVD-2018-233-01/ | Mitigation Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 04:12
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/105171 - Third Party Advisory, VDB Entry | |
References | () https://ics-cert.us-cert.gov/advisories/ICSA-18-240-02 - Mitigation, Third Party Advisory, US Government Resource | |
References | () https://www.schneider-electric.com/en/download/document/SEVD-2018-233-01/ - Mitigation, Vendor Advisory |
Information
Published : 2018-08-29 20:29
Updated : 2024-11-21 04:12
NVD link : CVE-2018-7789
Mitre link : CVE-2018-7789
CVE.ORG link : CVE-2018-7789
JSON object : View
Products Affected
schneider-electric
- modicon_m221_firmware
- modicon_m221
CWE
CWE-754
Improper Check for Unusual or Exceptional Conditions