First published: Wed May 22 2019(Updated: )
An Externally Controlled Reference to a Resource (CWE-610) vulnerability exists in Schneider Electric Modbus Serial Driver (For 64-bit Windows OS:V3.17 IE 37 and prior , For 32-bit Windows OS:V2.17 IE 27 and prior, and as part of the Driver Suite version:V14.12 and prior) which could allow write access to system files available only to users with SYSTEM privilege or other important user files.
Credit: cybersecurity@se.com
Affected Software | Affected Version | How to fix |
---|---|---|
schneider-electric Modbus Driver suite | <=3.17 | |
Microsoft Windows | ||
schneider-electric Modbus Driver suite | <=2.17 | |
Microsoft Windows | ||
Schneider Electric Modbus Driver Suite | <=14.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-7824 is considered a critical vulnerability due to its potential for unauthorized write access.
To fix CVE-2018-7824, update the Schneider Electric Modbus Serial Driver to version 3.17 or later for 64-bit systems and to version 2.17 or later for 32-bit systems.
CVE-2018-7824 affects Schneider Electric Modbus Serial Driver versions 3.17 and prior for 64-bit Windows and versions 2.17 and prior for 32-bit Windows.
The nature of CVE-2018-7824 is an Externally Controlled Reference to a Resource, which may lead to unauthorized access and data manipulation.
Currently, there are no officially documented workarounds for CVE-2018-7824; updating the driver is the recommended action.