First published: Fri Jun 30 2017(Updated: )
A Use of Insufficiently Random Values issue was discovered in Schneider Electric Modicon PLCs Modicon M241, firmware versions prior to Version 4.0.5.11, and Modicon M251, firmware versions prior to Version 4.0.5.11. The session numbers generated by the web application are lacking randomization and are shared between several users. This may allow a current session to be compromised.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
schneider-electric Modicon M251 | <=4.0.3.20 | |
Modicon M251 | ||
Schneider Electric Modicon M241 | <=4.0.3.20 | |
Schneider Electric Modicon M241 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6026 is classified as a medium severity vulnerability due to its potential for session hijacking.
To mitigate CVE-2017-6026, upgrade the firmware of Schneider Electric Modicon M241 and M251 PLCs to version 4.0.5.11 or later.
CVE-2017-6026 affects Schneider Electric Modicon M241 and M251 PLCs operating on firmware versions prior to 4.0.5.11.
CVE-2017-6026 is categorized as a use of insufficiently random values vulnerability affecting session management.
CVE-2017-6026 was published in March 2017.