Vulnerability CVE-2018-7760


Published: 2018-04-18

Description:
An authorization bypass vulnerability exists in Schneider Electric's Modicon M340, Modicon Premium, Modicon Quantum PLC, BMXNOR0200. Requests to CGI functions allow malicious users to bypass authorization.

Type:

CWE-287

(Improper Authentication)

Vendor: Schneider-electric
Product: 140cpu65150c firmware 
Product: Tsxp57254m firmware 
Product: 140cpu31110 firmware 
Product: Tsxp57154mc firmware 
Product: Tsxh5744m firmware 
Product: Bmxp3420302 firmware 
Product: Tsxp575634mc firmware 
Product: Bmxp342000 firmware 
Product: Tsxp574634m firmware 
Product: 140cpu65860c firmware 
Product: Tsxp57354mc firmware 
Product: 140cpu65160c firmware 
Product: Tsxp572634m firmware 
Product: 140cpu43412u firmware 
Product: Tsxp571634mc firmware 
Product: Tsxp57104m firmware 
Product: Bmxp3420302h firmware 
Product: Tsxp576634mc firmware 
Product: Bmxp3420102cl firmware 
Product: Tsxp57554m firmware 
Product: Bmxnor0200h firmware 
Product: Tsxp573634mc firmware 
Product: 140cpu65260 firmware 
Product: Tsxp57304m firmware 
Product: 140cpu65150 firmware 
Product: Tsxp57204mc firmware 
Product: Tsxp57154m firmware 
Product: Tsxh5724mc firmware 
Product: Bmxp342020h firmware 
Product: Tsxp575634m firmware 
Product: Bmxp341000h firmware 
Product: Tsxp57454mc firmware 
Product: 140cpu65860 firmware 
Product: Tsxp57354m firmware 
Product: 140cpu65160 firmware 
Product: Tsxp57254mc firmware 
Product: 140cpu31110c firmware 
Product: Tsxp571634m firmware 
Product: Tsxh5744mc firmware 
Product: Bmxp3420302cl firmware 
Product: Tsxp576634m firmware 
Product: Bmxp3420102 firmware 
Product: Tsxp574634mc firmware 
Product: Bmxnor0200 firmware 
Product: Tsxp573634m firmware 
Product: 140cpu65160s firmware 
Product: Tsxp572634mc firmware 
Product: 140cpu43412uc firmware 
Product: Tsxp57204m firmware 
Product: Tsxp57104mc firmware 
Product: Tsxh5724m firmware 
Product: Bmxp342020 firmware 
Product: Tsxp57554mc firmware 
Product: Bmxp341000 firmware 
Product: Tsxp57454m firmware 
Product: 140cpu65260c firmware 
Product: Tsxp57304mc firmware 

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.5/10
6.4/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial

 References:
https://www.schneider-electric.com/en/download/document/SEVD-2018-081-02/

Related CVE
CVE-2018-7787
In Schneider Electric U.motion Builder software versions prior to v1.3.4, this vulnerability is due to improper validation of input of context parameter in HTTP GET request.
CVE-2018-7786
In Schneider Electric U.motion Builder software versions prior to v1.3.4, a cross site scripting (XSS) vulnerability exists which could allow injection of malicious scripts.
CVE-2018-7785
In Schneider Electric U.motion Builder software versions prior to v1.3.4, a remote command injection allows authentication bypass.
CVE-2018-7783
Schneider Electric SoMachine Basic prior to v1.6 SP1 suffers from an XML External Entity (XXE) vulnerability using the DTD parameter entities technique resulting in disclosure and retrieval of arbitrary data on the affected node via out-of-band (OOB)...
CVE-2018-7779
In Schneider Electric Wiser for KNX V2.1.0 and prior, homeLYnk V2.0.1 and prior; and spaceLYnk V2.1.0 and prior, weak and unprotected FTP access could allow an attacker unauthorized access.
CVE-2018-7777
The vulnerability is due to insufficient handling of update_file request parameter on update_module.php in Schneider Electric U.motion Builder software versions prior to v1.3.4. A remote, authenticated attacker can exploit this vulnerability by sendi...
CVE-2018-7776
The vulnerability exists within error.php in Schneider Electric U.motion Builder software versions prior to v1.3.4. System information is returned to the attacker that contains sensitive data.
CVE-2018-7774
The vulnerability exists within processing of localize.php in Schneider Electric U.motion Builder software versions prior to v1.3.4. The underlying SQLite database query is subject to SQL injection on the username input parameter.

Copyright 2018, cxsecurity.com

 

Back to Top