First published: Wed Apr 18 2018(Updated: )
An authorization bypass vulnerability exists In Schneider Electric's 66074 MGE Network Management Card Transverse installed in MGE UPS and MGE STS. The integrated web server (Port 80/443/TCP) of the affected devices could allow a remote attacker to get a full access to device, bypassing the authorization system.
Credit: cybersecurity@se.com
Affected Software | Affected Version | How to fix |
---|---|---|
Schneider-electric MGE Network Management Card Transverse | ||
Schneider Electric MGE Comet UPS | ||
Schneider Electric MGE EPS 6000 | ||
Schneider Electric MGE EPS 7000 | ||
Schneider Electric MGE EPS 8000 | ||
Schneider Electric MGE Galaxy 3000 | ||
Schneider Electric MGE Galaxy 4000 | ||
Schneider Electric MGE Galaxy 5000 | ||
Schneider Electric MGE Galaxy 6000 | ||
Schneider Electric MGE Galaxy 9000 | ||
Schneider Electric MGE Galaxy PW |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-7243 is rated as a critical severity vulnerability due to its potential for unauthorized remote access.
To mitigate CVE-2018-7243, it is recommended to update the firmware of the affected Schneider Electric 66074 MGE Network Management Card Transverse.
CVE-2018-7243 specifically affects the Schneider Electric 66074 MGE Network Management Card Transverse used in MGE UPS and MGE STS systems.
Yes, CVE-2018-7243 can be exploited remotely as it allows attackers to bypass authorization through the integrated web server.
Exploitation of CVE-2018-7243 could allow an attacker full access to the affected device, leading to potential control over critical UPS functionality.