ID

VAR-201811-0567


CVE

CVE-2018-7811


TITLE

plural Modicon Vulnerability related to password management function in products

Trust: 0.8

sources: JVNDB: JVNDB-2018-012802

DESCRIPTION

An Unverified Password Change vulnerability exists in the embedded web servers in all Modicon M340, Premium, Quantum PLCs and BMXNOR0200 which could allow an unauthenticated remote user to access the change password function of the web server. plural Modicon The product contains a vulnerability related to the password management function.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Schneider Electric Modicon M340 and other are programmable logic controller products of Schneider Electric (France). A number of Schneider Electric products have licensing issues. An attacker could use the / unsecure / embedded / builtin endpoint to exploit this vulnerability to change a user's password without authentication

Trust: 2.43

sources: NVD: CVE-2018-7811 // JVNDB: JVNDB-2018-012802 // CNVD: CNVD-2019-45185 // IVD: b0178645-6bcf-45f7-b53a-9f8fca8f0394 // VULHUB: VHN-137843

IOT TAXONOMY

category:['ICS', 'Network device']sub_category: -

Trust: 0.6

category:['ICS']sub_category: -

Trust: 0.2

sources: IVD: b0178645-6bcf-45f7-b53a-9f8fca8f0394 // CNVD: CNVD-2019-45185

AFFECTED PRODUCTS

vendor:schneider electricmodel:modicom premiumscope:eqversion:*

Trust: 1.0

vendor:schneider electricmodel:modicom m340scope:eqversion:*

Trust: 1.0

vendor:schneider electricmodel:modicom quantumscope:eqversion:*

Trust: 1.0

vendor:schneider electricmodel:modicom bmxnor0200hscope:eqversion:*

Trust: 1.0

vendor:schneider electricmodel:bmxnor0200scope: - version: -

Trust: 0.8

vendor:schneider electricmodel:modicon m340 plcscope: - version: -

Trust: 0.8

vendor:schneider electricmodel:modicon premium plcscope: - version: -

Trust: 0.8

vendor:schneider electricmodel:modicon quantum plcscope: - version: -

Trust: 0.8

vendor:schneidermodel:electric bmxnor0200scope: - version: -

Trust: 0.6

vendor:schneidermodel:electric premiumscope: - version: -

Trust: 0.6

vendor:schneidermodel:electric quantum plcsscope: - version: -

Trust: 0.6

vendor:schneidermodel:electric modicon m340scope: - version: -

Trust: 0.6

vendor:schneider electricmodel:modicom m340scope: - version: -

Trust: 0.6

vendor:schneider electricmodel:modicom premiumscope: - version: -

Trust: 0.6

vendor:schneider electricmodel:modicom quantumscope: - version: -

Trust: 0.6

vendor:schneider electricmodel:modicom bmxnor0200hscope: - version: -

Trust: 0.6

vendor:modicom m340model: - scope:eqversion:*

Trust: 0.2

vendor:modicom premiummodel: - scope:eqversion:*

Trust: 0.2

vendor:modicom quantummodel: - scope:eqversion:*

Trust: 0.2

vendor:modicom bmxnor0200hmodel: - scope:eqversion:*

Trust: 0.2

sources: IVD: b0178645-6bcf-45f7-b53a-9f8fca8f0394 // CNVD: CNVD-2019-45185 // JVNDB: JVNDB-2018-012802 // CNNVD: CNNVD-201811-885 // NVD: CVE-2018-7811

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-7811
value: CRITICAL

Trust: 1.0

NVD: CVE-2018-7811
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2019-45185
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201811-885
value: CRITICAL

Trust: 0.6

IVD: b0178645-6bcf-45f7-b53a-9f8fca8f0394
value: CRITICAL

Trust: 0.2

VULHUB: VHN-137843
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2018-7811
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2019-45185
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: b0178645-6bcf-45f7-b53a-9f8fca8f0394
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-137843
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-7811
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: IVD: b0178645-6bcf-45f7-b53a-9f8fca8f0394 // CNVD: CNVD-2019-45185 // VULHUB: VHN-137843 // JVNDB: JVNDB-2018-012802 // CNNVD: CNNVD-201811-885 // NVD: CVE-2018-7811

PROBLEMTYPE DATA

problemtype:CWE-640

Trust: 1.9

sources: VULHUB: VHN-137843 // JVNDB: JVNDB-2018-012802 // NVD: CVE-2018-7811

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201811-885

TYPE

authorization issue

Trust: 0.6

sources: CNNVD: CNNVD-201811-885

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-012802

PATCH

title:SEVD-2018-327-01url:https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet&p_File_Name=SEVD-2018-327-01-Embedded-Web-Servers-Modicon-V2.pdf&p_Doc_Ref=SEVD-2018-327-01

Trust: 0.8

title:Multiple Schneider Electric Product security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=87101

Trust: 0.6

sources: JVNDB: JVNDB-2018-012802 // CNNVD: CNNVD-201811-885

EXTERNAL IDS

db:NVDid:CVE-2018-7811

Trust: 3.3

db:SCHNEIDERid:SEVD-2018-327-01

Trust: 2.3

db:TENABLEid:TRA-2018-38

Trust: 1.7

db:CNNVDid:CNNVD-201811-885

Trust: 0.9

db:CNVDid:CNVD-2019-45185

Trust: 0.8

db:JVNDBid:JVNDB-2018-012802

Trust: 0.8

db:IVDid:B0178645-6BCF-45F7-B53A-9F8FCA8F0394

Trust: 0.2

db:VULHUBid:VHN-137843

Trust: 0.1

sources: IVD: b0178645-6bcf-45f7-b53a-9f8fca8f0394 // CNVD: CNVD-2019-45185 // VULHUB: VHN-137843 // JVNDB: JVNDB-2018-012802 // CNNVD: CNNVD-201811-885 // NVD: CVE-2018-7811

REFERENCES

url:https://www.schneider-electric.com/en/download/document/sevd-2018-327-01/

Trust: 2.3

url:https://security.cse.iitk.ac.in/responsible-disclosure

Trust: 1.7

url:https://www.tenable.com/security/research/tra-2018-38

Trust: 1.7

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7811

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-7811

Trust: 0.8

sources: CNVD: CNVD-2019-45185 // VULHUB: VHN-137843 // JVNDB: JVNDB-2018-012802 // CNNVD: CNNVD-201811-885 // NVD: CVE-2018-7811

SOURCES

db:IVDid:b0178645-6bcf-45f7-b53a-9f8fca8f0394
db:CNVDid:CNVD-2019-45185
db:VULHUBid:VHN-137843
db:JVNDBid:JVNDB-2018-012802
db:CNNVDid:CNNVD-201811-885
db:NVDid:CVE-2018-7811

LAST UPDATE DATE

2024-11-23T21:52:39.427000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2019-45185date:2019-12-13T00:00:00
db:VULHUBid:VHN-137843date:2019-10-02T00:00:00
db:JVNDBid:JVNDB-2018-012802date:2019-02-07T00:00:00
db:CNNVDid:CNNVD-201811-885date:2019-10-23T00:00:00
db:NVDid:CVE-2018-7811date:2024-11-21T04:12:46.583

SOURCES RELEASE DATE

db:IVDid:b0178645-6bcf-45f7-b53a-9f8fca8f0394date:2019-12-13T00:00:00
db:CNVDid:CNVD-2019-45185date:2019-12-12T00:00:00
db:VULHUBid:VHN-137843date:2018-11-30T00:00:00
db:JVNDBid:JVNDB-2018-012802date:2019-02-07T00:00:00
db:CNNVDid:CNNVD-201811-885date:2018-11-29T00:00:00
db:NVDid:CVE-2018-7811date:2018-11-30T19:29:00.500