First published: Wed May 22 2019(Updated: )
A CWE-290: Authentication Bypass by Spoofing vulnerability exists in all versions of the Modicon M580, Modicon M340, Modicon Quantum, and Modicon Premium which could cause an elevation of privilege by conducting a brute force attack on Modbus parameters sent to the controller.
Credit: cybersecurity@se.com
Affected Software | Affected Version | How to fix |
---|---|---|
Schneider-electric Modicon M580 Firmware | ||
Schneider-electric Modicon M580 | ||
Schneider-electric Modicon M340 Firmware | ||
Schneider-electric Modicon M340 | ||
Schneider-electric Modicon Quantum Firmware | ||
Schneider-electric Modicon Quantum | ||
Schneider-electric Modicon Premium Firmware | ||
Schneider-electric Modicon Premium |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-7842 is a CWE-290: Authentication Bypass by Spoofing vulnerability that exists in all versions of the Modicon M580, Modicon M340, Modicon Quantum, and Modicon Premium.
CVE-2018-7842 can cause an elevation of privilege by conducting a brute force attack on Modbus parameters sent to the controller.
CVE-2018-7842 has a severity rating of 9.8 (critical).
To mitigate CVE-2018-7842, apply the recommended security patches provided by Schneider Electric and follow the guidelines mentioned in their advisory.
You can find more information about CVE-2018-7842 in the Schneider Electric security advisory (SEVD-2019-134-11) and the Talos Intelligence vulnerability report (TALOS-2018-0741).