First published: Wed Apr 18 2018(Updated: )
A cleartext transmission of sensitive information vulnerability exists in Schneider Electric's 66074 MGE Network Management Card Transverse installed in MGE UPS and MGE STS. he integrated web server (Port 80/443/TCP) of the affected devices could allow remote attackers to discover an administrative account. If default on device, it is not using a SSL in settings and if multiple request of the page "Access Control" (IP-address device/ups/pas_cont.htm) account data will be sent in cleartext
Credit: cybersecurity@se.com
Affected Software | Affected Version | How to fix |
---|---|---|
Schneider-electric MGE Network Management Card Transverse | ||
Schneider Electric MGE Comet UPS | ||
Schneider Electric MGE EPS 6000 | ||
Schneider Electric MGE EPS 7000 | ||
Schneider Electric MGE EPS 8000 | ||
Schneider Electric MGE Galaxy 3000 | ||
Schneider Electric MGE Galaxy 4000 | ||
Schneider Electric MGE Galaxy 5000 | ||
Schneider Electric MGE Galaxy 6000 | ||
Schneider Electric MGE Galaxy 9000 | ||
Schneider Electric MGE Galaxy PW |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-7246 is rated as a high severity vulnerability due to the risk of cleartext transmission of sensitive information.
To fix CVE-2018-7246, ensure that sensitive information is transmitted over secure protocols rather than cleartext.
CVE-2018-7246 affects the Schneider Electric 66074 MGE Network Management Card Transverse.
Yes, CVE-2018-7246 can be exploited remotely due to vulnerabilities in the integrated web server.
CVE-2018-7246 risks exposing administrative credentials and other sensitive information transmitted in cleartext.