First published: Wed Apr 22 2020(Updated: )
A CWE-345: Insufficient Verification of Data Authenticity vulnerability exists which could allow the attacker to execute malicious code on the Modicon M218, M241, M251, and M258 controllers.
Credit: cybersecurity@se.com
Affected Software | Affected Version | How to fix |
---|---|---|
Schneider-electric Ecostruxure Machine Expert | ||
Schneider-electric Somachine | ||
Schneider-electric Somachine Motion | ||
Schneider-electric Modicon M218 Firmware | ||
Schneider-electric Modicon M218 | ||
Schneider-electric Modicon M241 Firmware | ||
Schneider-electric Modicon M241 | ||
Schneider-electric Modicon M251 Firmware | ||
Schneider-electric Modicon M251 | ||
Schneider-electric Modicon M258 Firmware | ||
Schneider-electric Modicon M258 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-7487 is a vulnerability that allows an attacker to execute malicious code on Modicon M218, M241, M251, and M258 controllers.
CVE-2020-7487 affects Schneider-electric Ecostruxure Machine Expert, Schneider-electric Somachine, and Schneider-electric Somachine Motion.
CVE-2020-7487 has a severity rating of 9.8 (Critical).
An attacker can exploit CVE-2020-7487 by leveraging the insufficient verification of data authenticity vulnerability to execute malicious code on the affected controllers.
Schneider-electric has released a security advisory (SEVD-2020-105-02) providing mitigation steps and patches to address CVE-2020-7487.