First published: Thu Apr 06 2017(Updated: )
Schneider Electric Modicon TM221CE16R 1.3.3.3 devices allow remote attackers to discover the application-protection password via a \x00\x01\x00\x00\x00\x05\x01\x5a\x00\x03\x00 request to the Modbus port (502/tcp). Subsequently the application may be arbitrarily downloaded, modified, and uploaded.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
schneider-electric Modicon TM221CE16R | =1.3.3.3 | |
Schneider Electric Modicon TM221CE16R firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-7575 is classified as a high severity vulnerability due to its ability to allow remote attackers to gain unauthorized access.
To mitigate CVE-2017-7575, it's recommended to update the affected Schneider Electric Modicon TM221CE16R devices to the latest firmware available.
CVE-2017-7575 specifically affects Schneider Electric Modicon TM221CE16R firmware version 1.3.3.3.
The impact of CVE-2017-7575 allows remote attackers to discover application-protection passwords and potentially download, modify, and upload applications.
Yes, CVE-2017-7575 can be exploited remotely through malicious requests sent to the Modbus port.