First published: Wed May 26 2021(Updated: )
Improper Check for Unusual or Exceptional Conditions vulnerability exists in Triconex Model 3009 MP installed on Tricon V11.3.x systems that could cause module reset when TCM receives malformed TriStation packets while the write-protect keyswitch is in the program position. This CVE ID is unique from CVE-2021-22742, CVE-2021-22744, CVE-2021-22745, and CVE-2021-22747.
Credit: cybersecurity@se.com
Affected Software | Affected Version | How to fix |
---|---|---|
Schneider Electric Triconex Model 3009 MP | >=11.3.0<11.8.0 | |
Schneider Electric Triconex Model 3009 MP | ||
Schneider-electric Tricon Tcm 4351b Firmware | >=11.3.0<11.5.1 | |
Schneider-electric Tricon Tcm 4351b Firmware | =11.7.0 | |
Schneider-electric Tricon Tcm 4351b Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22746 has a medium severity rating due to its potential to cause module resets.
To mitigate CVE-2021-22746, update the Triconex Model 3009 MP to a firmware version greater than 11.8.0.
CVE-2021-22746 affects Triconex Model 3009 MP systems running Tricon V11.3.x.
The improper check can lead to unexpected module resets when maliciously crafted TriStation packets are received.
A temporary workaround may include maintaining the write-protect keyswitch in the off position during operation.