5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
0.001 Low
EPSS
Percentile
43.0%
Vulnerable products
Modicon Premium, Modicon Quantum, and Modicon M340
Version: all versions
Link:
<https://www.schneider-electric.com/>
Severity level
Severity level: High
Impact: Denial of Service
Access Vector: Remote
CVSS v3:
Base Score: 7.5
Vector: (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
CVE: CVE-2018-7759
Vulnerability description
The specialists of the Positive Research center have detected a Buffer Overflow vulnerability in Schneider Electricβs Modicon Premium, Modicon Quantum, and Modicon M340.
A buffer overflow vulnerability, due to the length of the source string specified as the number of bytes to be copied (instead of the buffer size), allows attackers to cause a denial of service.
How to fix
Use the vendorβs advisory:
<https://www.schneider-electric.com/en/download/document/SEVD-2018-081-02/>
Advisory status
28.04.2017 - Vendor gets vulnerability details
22.03.2018 - Vendor releases fixed version and details
03.09.2018 - Public disclosure
Credits
The vulnerability was detected by Nikita Maximov, Positive Research Center (Positive Technologies Company)
References
<http://en.securitylab.ru/lab/PT-2018-18>
<https://www.ptsecurity.com/ww-en/about/news/294214/>
Reports on the vulnerabilities previously discovered by Positive Research:
https://www.ptsecurity.com/
<https://en.securitylab.ru/lab/>
About Positive Technologies
Positive Technologies is a leading digital security firm with over 15 years of experience in 360Β° protection of critical IT systems against the most advanced cyberthreats. State-of-the-art solutions are developed at the companyβs research centerβone of the largest in Europe. Positive Technologies experts have helped to identify and fix over 250 zero-day vulnerabilities in products from Cisco, Google, Honeywell, Huawei, Microsoft, Oracle, SAP, Schneider Electric, Siemens, and others, earning a reputation for world-class expertise in protection of devices and infrastructures at all scales from ATMs to nuclear power stations. Findings by Positive Technologies researchers are used for updating the MaxPatrol knowledge base and for development of security solutions including PT Application Firewall, PT Application Inspector, MaxPatrol. These products allow securing web applications, evaluating network protection, blocking attacks in real time, ensuring compliance with industry and national standards, and training security specialists. Positive Technologies is the organizer of the annual Positive Hack Days international forum and security competition.
5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
0.001 Low
EPSS
Percentile
43.0%