Lucene search

K
nessusThis script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.OT_500080.NASL
HistoryNov 08, 2019 - 12:00 a.m.

Schneider-electric Modicon Authentication Bypass by Capture-replay

2019-11-0800:00:00
This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
14

0.002 Low

EPSS

Percentile

60.2%

An Information Management Error vulnerability exists in Schneider Electric’s Modicon M221 product (all references, all versions prior to firmware V1.6.2.0). The vulnerability allows unauthorized users to replay authentication sequences. If an attacker exploits this vulnerability and connects to a Modicon M221, the attacker can upload the original program from the PLC.

File data ot_500080.nasl
VendorProductVersionCPE
schneider-electricmodicon_m221_firmware*cpe:2.3:o:schneider-electric:modicon_m221_firmware:*:*:*:*:*:*:*:*
schneider-electricmodicon_m221-cpe:2.3:h:schneider-electric:modicon_m221:-:*:*:*:*:*:*:*

0.002 Low

EPSS

Percentile

60.2%