First published: Fri Nov 30 2018(Updated: )
An Unverified Password Change vulnerability exists in the embedded web servers in all Modicon M340, Premium, Quantum PLCs and BMXNOR0200 which could allow an unauthenticated remote user to access the password delete function of the web server.
Credit: cybersecurity@se.com
Affected Software | Affected Version | How to fix |
---|---|---|
Schneider Electric Modicon M340 Firmware | ||
Schneider Electric Modicon M340 Firmware | ||
Schneider Electric Modicon Premium | ||
Schneider Electric Modicon Premium | ||
Schneider Electric Modicon Quantum Firmware | ||
Schneider Electric Modicon Quantum | ||
Schneider Electric Modicon BMXNOR0200H Firmware | ||
Schneider Electric Modicon BMXNOR0200H |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-7809 has been classified as a high severity vulnerability due to its potential to allow unauthorized remote access.
To resolve CVE-2018-7809, it is recommended to update to the latest firmware version provided by Schneider Electric.
CVE-2018-7809 affects the embedded web servers in all Modicon M340, Premium, Quantum PLCs, and BMXNOR0200 models.
Yes, CVE-2018-7809 allows unauthenticated remote users to access certain functionalities, making remote exploitation possible.
CVE-2018-7809 enables unauthorized users to potentially delete passwords through the web server.