First published: Wed Apr 22 2020(Updated: )
A CWE-319: Cleartext Transmission of Sensitive Information vulnerability exists which could leak sensitive information transmitted between the software and the Modicon M218, M241, M251, and M258 controllers.
Credit: cybersecurity@se.com
Affected Software | Affected Version | How to fix |
---|---|---|
Schneider Electric EcoStruxure Machine Expert | ||
Schneider Electric SoMachine | ||
Schneider Electric SoMachine Motion | ||
Schneider Electric Modicon M218 Firmware | ||
Schneider Electric Modicon M218 | ||
Schneider Electric Modicon M241 | ||
Schneider Electric Modicon M241 | ||
schneider-electric Modicon M251 | ||
Modicon M251 | ||
Schneider Electric Modicon M258 | ||
Schneider Electric Modicon M258 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-7488.
CVE-2020-7488 has a severity level of 7.5 (High).
The vulnerability affects Schneider-electric Ecostruxure Machine Expert, Schneider-electric Somachine, and Schneider-electric Somachine Motion.
CVE-2020-7488 can be exploited by an attacker intercepting and reading sensitive information transmitted between the software and the Modicon M218, M241, M251, and M258 controllers.
To fix CVE-2020-7488, it is recommended to apply the necessary patches and updates provided by Schneider-Electric. Additionally, users should ensure that sensitive information is transmitted securely.