ID

VAR-202011-1275


CVE

CVE-2020-7564


TITLE

plural  Modicon  Classic buffer overflow vulnerability in the product

Trust: 0.8

sources: JVNDB: JVNDB-2020-013778

DESCRIPTION

A CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability exists in the Web Server on Modicon M340, Modicon Quantum and Modicon Premium Legacy offers and their Communication Modules (see notification for details) which could cause write access and the execution of commands when uploading a specially crafted file on the controller over FTP. plural Modicon The product contains a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state

Trust: 1.62

sources: NVD: CVE-2020-7564 // JVNDB: JVNDB-2020-013778

AFFECTED PRODUCTS

vendor:schneider electricmodel:modicon tsxp574634scope:eqversion:*

Trust: 1.0

vendor:schneider electricmodel:modicon m340 bmx nor 0200hscope:eqversion:*

Trust: 1.0

vendor:schneider electricmodel:modicon tsxety4103scope:eqversion:*

Trust: 1.0

vendor:schneider electricmodel:modicon tsxp575634scope:eqversion:*

Trust: 1.0

vendor:schneider electricmodel:modicon quantum 140cpu65150scope:eqversion:*

Trust: 1.0

vendor:schneider electricmodel:modicon tsxp576634scope:eqversion:*

Trust: 1.0

vendor:schneider electricmodel:modicon quantum 140cpu65160cscope:eqversion:*

Trust: 1.0

vendor:schneider electricmodel:modicon m340 bmx noe 0110hscope:eqversion:*

Trust: 1.0

vendor:schneider electricmodel:modicon m340 bmx p34-2030scope:eqversion:*

Trust: 1.0

vendor:schneider electricmodel:modicon m340 bmx noe 0100hscope:eqversion:*

Trust: 1.0

vendor:schneider electricmodel:modicon m340 bmx noe 0110scope:eqversion:*

Trust: 1.0

vendor:schneider electricmodel:modicon tsxety5103scope:eqversion:*

Trust: 1.0

vendor:schneider electricmodel:modicon quantum 140cpu65150cscope:eqversion:*

Trust: 1.0

vendor:schneider electricmodel:modicon m340 bmx p34-2010scope:eqversion:*

Trust: 1.0

vendor:schneider electricmodel:modicon m340 bmx noc 0401scope:eqversion:*

Trust: 1.0

vendor:schneider electricmodel:modicon quantum 140noe77111scope:eqversion:*

Trust: 1.0

vendor:schneider electricmodel:modicon quantum 140noc78100scope:eqversion:*

Trust: 1.0

vendor:schneider electricmodel:modicon quantum 140noe77101scope:eqversion:*

Trust: 1.0

vendor:schneider electricmodel:modicon m340 bmx noe 0100scope:eqversion:*

Trust: 1.0

vendor:schneider electricmodel:modicon quantum 140cpu65160scope:eqversion:*

Trust: 1.0

vendor:schneider electricmodel:modicon quantum 140noc78100scope: - version: -

Trust: 0.8

vendor:schneider electricmodel:modicon quantum 140noe77111scope: - version: -

Trust: 0.8

vendor:schneider electricmodel:modicon tsxety5103scope: - version: -

Trust: 0.8

vendor:schneider electricmodel:modicon quantum 140cpu65150scope: - version: -

Trust: 0.8

vendor:schneider electricmodel:modicon tsxp575634scope: - version: -

Trust: 0.8

vendor:schneider electricmodel:modicon tsxp574634scope: - version: -

Trust: 0.8

vendor:schneider electricmodel:modicon tsxp576634scope: - version: -

Trust: 0.8

vendor:schneider electricmodel:modicon tsxety4103scope: - version: -

Trust: 0.8

vendor:schneider electricmodel:modicon quantum 140cpu65150cscope: - version: -

Trust: 0.8

vendor:schneider electricmodel:modicon quantum 140noe77101scope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2020-013778 // NVD: CVE-2020-7564

CVSS

SEVERITY

CVSSV2

CVSSV3

NVD: CVE-2020-7564
value: HIGH

Trust: 1.8

CNNVD: CNNVD-202011-1639
value: HIGH

Trust: 0.6

NVD: CVE-2020-7564
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

NVD: CVE-2020-7564
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2020-7564
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2020-013778 // CNNVD: CNNVD-202011-1639 // NVD: CVE-2020-7564

PROBLEMTYPE DATA

problemtype:CWE-120

Trust: 1.0

problemtype:Classic buffer overflow (CWE-120) [ Other ]

Trust: 0.8

sources: JVNDB: JVNDB-2020-013778 // NVD: CVE-2020-7564

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202011-1639

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-202011-1639

CONFIGURATIONS

sources: NVD: CVE-2020-7564

PATCH

title:SEVD-2020-315-01url:https://www.se.com/ww/en/download/document/sevd-2020-315-01/

Trust: 0.8

title:Multiple Schneider Electric Product Buffer Error Vulnerability Fixurl:http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=135771

Trust: 0.6

sources: JVNDB: JVNDB-2020-013778 // CNNVD: CNNVD-202011-1639

EXTERNAL IDS

db:NVDid:CVE-2020-7564

Trust: 2.4

db:SCHNEIDERid:SEVD-2020-315-01

Trust: 1.6

db:JVNid:JVNVU91241691

Trust: 0.8

db:JVNDBid:JVNDB-2020-013778

Trust: 0.8

db:CNNVDid:CNNVD-202011-1639

Trust: 0.6

sources: JVNDB: JVNDB-2020-013778 // CNNVD: CNNVD-202011-1639 // NVD: CVE-2020-7564

REFERENCES

url:https://www.se.com/ww/en/download/document/sevd-2020-315-01/

Trust: 1.6

url:https://nvd.nist.gov/vuln/detail/cve-2020-7564

Trust: 1.4

url:https://jvn.jp/vu/jvnvu91241691/

Trust: 0.8

sources: JVNDB: JVNDB-2020-013778 // CNNVD: CNNVD-202011-1639 // NVD: CVE-2020-7564

SOURCES

db:JVNDBid:JVNDB-2020-013778
db:CNNVDid:CNNVD-202011-1639
db:NVDid:CVE-2020-7564

LAST UPDATE DATE

2022-05-04T09:15:37.776000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2020-013778date:2021-07-13T07:59:00
db:CNNVDid:CNNVD-202011-1639date:2020-12-03T00:00:00
db:NVDid:CVE-2020-7564date:2020-12-02T21:08:00

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2020-013778date:2021-07-13T00:00:00
db:CNNVDid:CNNVD-202011-1639date:2020-11-18T00:00:00
db:NVDid:CVE-2020-7564date:2020-11-18T14:15:00