First published: Wed May 26 2021(Updated: )
Improper Input Validation vulnerability exists in Modicon M241/M251 logic controllers firmware prior to V5.1.9.1 that could cause denial of service when specific crafted requests are sent to the controller over HTTP.
Credit: cybersecurity@se.com
Affected Software | Affected Version | How to fix |
---|---|---|
Schneider-electric Modicon M241 Firmware | <5.1.9.1 | |
Schneider-electric Modicon M241 | ||
Schneider-electric Modicon M251 Firmware | <5.1.9.1 | |
Schneider-electric Modicon M251 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this security issue is CVE-2021-22699.
The title of this security issue is 'Improper Input Validation vulnerability exists in Modicon M241/M251 logic controllers firmware prior to V5.1.9.1'.
The severity of CVE-2021-22699 is high with a severity value of 7.5.
Modicon M241/M251 logic controllers firmware versions prior to V5.1.9.1 are affected by CVE-2021-22699.
CVE-2021-22699 can cause denial of service when specific crafted requests are sent to the Modicon M241/M251 logic controllers firmware over HTTP.
No, Schneider-electric Modicon M241 is not vulnerable to CVE-2021-22699.
No, Schneider-electric Modicon M251 is not vulnerable to CVE-2021-22699.
To fix CVE-2021-22699, update the Modicon M241/M251 logic controllers firmware to version V5.1.9.1 or later.
You can find more information about CVE-2021-22699 at the following reference: [Link](https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-130-05)
The Common Weakness Enumeration (CWE) ID associated with CVE-2021-22699 is CWE-20.