First published: Fri Nov 30 2018(Updated: )
Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting') vulnerability exists in the embedded web servers in all Modicon M340, Premium, Quantum PLCs and BMXNOR0200 where a denial of service can occur for ~1 minute by sending a specially crafted HTTP request.
Credit: cybersecurity@se.com
Affected Software | Affected Version | How to fix |
---|---|---|
Schneider Electric Modicon M340 Firmware | ||
Schneider Electric Modicon M340 Firmware | ||
Schneider Electric Modicon Premium | ||
Schneider Electric Modicon Premium | ||
Schneider Electric Modicon Quantum Firmware | ||
Schneider Electric Modicon Quantum | ||
Schneider Electric Modicon BMXNOR0200H Firmware | ||
Schneider Electric Modicon BMXNOR0200H |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-7830 has a medium severity level due to its potential to cause a denial of service.
To fix CVE-2018-7830, apply the latest firmware updates provided by Schneider Electric for affected Modicon PLC models.
CVE-2018-7830 affects all Modicon M340, Premium, Quantum PLCs, and BMXNOR0200 embedded web servers.
Exploiting CVE-2018-7830 can lead to a denial of service condition lasting approximately one minute.
Yes, CVE-2018-7830 is a notable vulnerability affecting multiple models of Schneider Electric's Modicon PLCs.