First published: Fri Nov 30 2018(Updated: )
An Unverified Password Change vulnerability exists in the embedded web servers in all Modicon M340, Premium, Quantum PLCs and BMXNOR0200 which could allow an unauthenticated remote user to access the change password function of the web server
Credit: cybersecurity@se.com
Affected Software | Affected Version | How to fix |
---|---|---|
Schneider Electric Modicon M340 Firmware | ||
Schneider Electric Modicon M340 Firmware | ||
Schneider Electric Modicon Premium | ||
Schneider Electric Modicon Premium | ||
Schneider Electric Modicon Quantum Firmware | ||
Schneider Electric Modicon Quantum | ||
Schneider Electric Modicon BMXNOR0200H Firmware | ||
Schneider Electric Modicon BMXNOR0200H |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-7811 is classified as a high severity vulnerability due to the potential for unauthorized access to the password change function.
To mitigate CVE-2018-7811, ensure web server access is restricted to authorized users only and apply necessary firmware updates as they become available.
CVE-2018-7811 affects the embedded web servers in Modicon M340, Premium, Quantum PLCs, and BMXNOR0200 devices.
Yes, CVE-2018-7811 can be exploited by an unauthenticated remote user to access the change password function.
A recommended workaround for CVE-2018-7811 is to limit network access to the affected devices by using firewalls or VPNs.