CVE-2018-7794 (GCVE-0-2018-7794)

Vulnerability from cvelistv5 – Published: 2020-01-06 22:57 – Updated: 2024-08-05 06:37
VLAI?
Summary
A CWE-754: Improper Check for Unusual or Exceptional Conditions vulnerability exists in Modicon M580, Modicon M340, Modicon Quantum, Modicon Premium (see security notification for specific versions) which could cause a Denial of Service when reading data with invalid index using Modbus TCP.
Severity ?
No CVSS data available.
CWE
  • CWE-754 - Improper Check for Unusual or Exceptional Conditions
Assigner
References
Impacted products
Vendor Product Version
Schneider Electric SE Modicon M580, Modicon M340, Modicon Quantum, Modicon Premium (see security notification for specific versions) Affected: Modicon M580
Affected: Modicon M340
Affected: Modicon Quantum
Affected: Modicon Premium (see security notification for specific versions)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T06:37:59.272Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.se.com/ww/en/download/document/SEVD-2019-344-01"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Modicon M580, Modicon M340, Modicon Quantum,  Modicon Premium (see security notification for specific versions)",
          "vendor": "Schneider Electric SE",
          "versions": [
            {
              "status": "affected",
              "version": "Modicon M580"
            },
            {
              "status": "affected",
              "version": "Modicon M340"
            },
            {
              "status": "affected",
              "version": "Modicon Quantum"
            },
            {
              "status": "affected",
              "version": "Modicon Premium (see security notification for specific versions)"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A CWE-754: Improper Check for Unusual or Exceptional Conditions vulnerability exists in Modicon M580, Modicon M340, Modicon Quantum, Modicon Premium (see security notification for specific versions) which could cause a Denial of Service when reading data with invalid index using Modbus TCP."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-754",
              "description": "CWE-754: Improper Check for Unusual or Exceptional Conditions",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-01-06T22:57:09",
        "orgId": "076d1eb6-cfab-4401-b34d-6dfc2a413bdb",
        "shortName": "schneider"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.se.com/ww/en/download/document/SEVD-2019-344-01"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cybersecurity@schneider-electric.com",
          "ID": "CVE-2018-7794",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Modicon M580, Modicon M340, Modicon Quantum,  Modicon Premium (see security notification for specific versions)",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Modicon M580"
                          },
                          {
                            "version_value": "Modicon M340"
                          },
                          {
                            "version_value": "Modicon Quantum"
                          },
                          {
                            "version_value": "Modicon Premium (see security notification for specific versions)"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Schneider Electric SE"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A CWE-754: Improper Check for Unusual or Exceptional Conditions vulnerability exists in Modicon M580, Modicon M340, Modicon Quantum, Modicon Premium (see security notification for specific versions) which could cause a Denial of Service when reading data with invalid index using Modbus TCP."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-754: Improper Check for Unusual or Exceptional Conditions"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.se.com/ww/en/download/document/SEVD-2019-344-01",
              "refsource": "CONFIRM",
              "url": "https://www.se.com/ww/en/download/document/SEVD-2019-344-01"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "076d1eb6-cfab-4401-b34d-6dfc2a413bdb",
    "assignerShortName": "schneider",
    "cveId": "CVE-2018-7794",
    "datePublished": "2020-01-06T22:57:09",
    "dateReserved": "2018-03-08T00:00:00",
    "dateUpdated": "2024-08-05T06:37:59.272Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2018-7794\",\"sourceIdentifier\":\"cybersecurity@se.com\",\"published\":\"2020-01-06T23:15:10.893\",\"lastModified\":\"2024-11-21T04:12:44.850\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A CWE-754: Improper Check for Unusual or Exceptional Conditions vulnerability exists in Modicon M580, Modicon M340, Modicon Quantum, Modicon Premium (see security notification for specific versions) which could cause a Denial of Service when reading data with invalid index using Modbus TCP.\"},{\"lang\":\"es\",\"value\":\"CWE-754: Existe una vulnerabilidad de Comprobaci\u00f3n Inapropiada de Condiciones Inusuales o Excepcionales en Modicon M580, Modicon M340, Modicon Quantum, Modicon Premium (v\u00e9ase la notificaci\u00f3n de seguridad para versiones espec\u00edficas) que podr\u00eda causar una Denegaci\u00f3n de Servicio cuando se leen datos con \u00edndice no v\u00e1lido usando Modbus TCP.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"cybersecurity@se.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-754\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-754\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:modicon_m580_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.80\",\"matchCriteriaId\":\"6FDEB227-D50B-402C-9C11-E29F52BC10BB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:modicon_m580:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E876C738-ABF6-4864-98A6-1E06E96A0DF4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:modicon_m340_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.01\",\"matchCriteriaId\":\"606AFE88-8C9A-4D18-9209-1193B628669F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:modicon_m340:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"138681A2-0146-492B-8E10-06849FC27C6E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:tsxh5744m_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.20\",\"matchCriteriaId\":\"6F6FF401-ED15-45EE-9A84-171166BF4414\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:tsxh5744m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B57B894-5AA4-4412-B425-7338CB2FFA3C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:tsxh5724m_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.20\",\"matchCriteriaId\":\"70CD95A2-9FAE-4A7E-8331-8904C0E0CE3D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:tsxh5724m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1F56BA4-6A19-44FB-8555-7360C77F83AF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:tsxp576634m_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.20\",\"matchCriteriaId\":\"E5EEE1F8-0DCA-4D18-A022-5DBE980F3A16\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:tsxp576634m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71146321-B31B-4C5B-A600-2E414D84916E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:tsxp57554m_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.20\",\"matchCriteriaId\":\"ED646076-2294-4253-92BF-B95D5D5E87A4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:tsxp57554m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5572E616-5D86-46FF-AEA7-4A12E66F0ED4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:tsxp575634m_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.20\",\"matchCriteriaId\":\"98B1574C-2FC7-4A3C-B260-D8372A268F4A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:tsxp575634m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57BF89C2-27F8-4FF5-9E4F-4F0CB6C2F0E9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:tsxp57454m_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.20\",\"matchCriteriaId\":\"853895C6-5EDF-4767-9653-F5F7826B4A7E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:tsxp57454m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC537593-1AB7-438E-AB71-EDB469A1DFF7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:tsxp574634m_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.20\",\"matchCriteriaId\":\"EC9FBA4C-DA99-4F22-9168-ECD281B090C3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:tsxp574634m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE60505D-0211-4E8C-B32C-988E25698B1E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:tsxp57354m_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.20\",\"matchCriteriaId\":\"DD7766E8-40EB-4C72-8234-C8D997F98F6C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:tsxp57354m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAE46047-D9AF-4720-A130-A0F989423F82\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:tsxp573634m_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.20\",\"matchCriteriaId\":\"C9246F10-84D1-4AE0-BF1A-B61EA1E965A2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:tsxp573634m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80500883-2825-46DD-8ED9-4F324A4494CC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:tsxp57304m_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.20\",\"matchCriteriaId\":\"889586D3-B64F-42DA-8872-DD44C9790881\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:tsxp57304m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5FDBAB3-C8C2-47F6-ACAA-B89BA53849B9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:tsxp57254m_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.20\",\"matchCriteriaId\":\"B6EBCADE-8F8C-402B-8FB6-62237168E788\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:tsxp57254m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57B75D71-11CA-4DDF-849A-08A9D84C95AC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:tsxp572634m_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.20\",\"matchCriteriaId\":\"33E3F062-3874-4EB6-829B-285B428E982E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:tsxp572634m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA2094F4-976F-44FA-A7E5-93E20A80DA00\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:tsxp57204m_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.20\",\"matchCriteriaId\":\"43BE3D1E-5F7D-409F-A932-073D5A566180\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:tsxp57204m_:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E25651C-E4B5-47A2-A6CE-79F7ECAE246E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:tsxp571634m_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.20\",\"matchCriteriaId\":\"D1DEF9B5-6BC0-43A7-AD74-81F9D23BA843\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:tsxp571634m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31A5DCC8-9E3D-4919-9DE3-73FC8733E73D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:tsxp57154m_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.20\",\"matchCriteriaId\":\"4E358F77-1F8F-4F2F-A54C-B5F2373EFEE6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:tsxp57154m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CC8F0AB-C4A8-40B3-88E0-92F52EA05692\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:tsxp57104m_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.20\",\"matchCriteriaId\":\"56724F0C-2DA8-4710-9D82-EE51FA9B062C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:tsxp57104m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"587226C6-6BE2-4A42-B593-34498F647B24\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:140cpu65150_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.52\",\"matchCriteriaId\":\"97C6F04E-FEF7-4DA4-A819-7E4C3DA173F9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:140cpu65150:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC3E5496-C3D0-4DF4-A9AF-F227F889840E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:140cpu65160_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.52\",\"matchCriteriaId\":\"E9552C20-F295-4AB7-A44E-FB1072BAD1B3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:140cpu65160:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2C2AF70-F0BB-4D17-901C-1FCBECDC44FB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:140cpu65260_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.52\",\"matchCriteriaId\":\"1BB8ACFC-C693-4C5A-B256-51FF0835FD69\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:140cpu65260:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D7304B0-EE18-454B-B3F0-5EF387285D90\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:140cpu67261_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.52\",\"matchCriteriaId\":\"370F0F62-AA12-496B-8107-EEC24B070621\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:140cpu67261:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"164AEEA1-666F-428A-BFCB-5DEEEFE1D771\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:140cpu67060_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.52\",\"matchCriteriaId\":\"06F31148-8213-4B01-AA48-D9D7C515E38A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:140cpu67060:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AF2A7A3-89EF-480D-8E6E-20E11CF60A97\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:140cpu67160_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.52\",\"matchCriteriaId\":\"D6E3B57D-062A-431D-B96F-28463DE757DF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:140cpu67160:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3870E952-7A32-43DA-8C66-DE43C862639B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:140cpu67261_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.52\",\"matchCriteriaId\":\"370F0F62-AA12-496B-8107-EEC24B070621\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:140cpu67261:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"164AEEA1-666F-428A-BFCB-5DEEEFE1D771\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:140cpu67260_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.52\",\"matchCriteriaId\":\"108BA75E-B7B4-4A51-9DB8-B928154DD51A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:140cpu67260:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9E4FCBA-4980-4C8F-A185-5E9C4CF9E8B5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:140cpu65860_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.52\",\"matchCriteriaId\":\"C4D81FBC-7C66-4367-8A0F-7F96C09A56A4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:140cpu65860:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B8230FD-0C0A-467C-9BAD-09257739D462\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:140cpu67861_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.52\",\"matchCriteriaId\":\"4419CB2D-AABC-4F77-9C75-42ABA62CBA6B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:140cpu67861:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF97B5A6-960F-42BA-A397-09C819A3200C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:140cpu65160s_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.52\",\"matchCriteriaId\":\"D793BE48-1025-4C6C-8E7D-82E013DDDE5D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:140cpu65160s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95E48F27-F241-4491-AFF7-8BD562F21A52\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:140cpu67160s_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.52\",\"matchCriteriaId\":\"41654852-0E58-46CC-A734-F59FE9B83990\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:140cpu67160s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71C1C17A-9111-49B8-A2CE-3A2FB87616F1\"}]}]}],\"references\":[{\"url\":\"https://www.se.com/ww/en/download/document/SEVD-2019-344-01\",\"source\":\"cybersecurity@se.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.se.com/ww/en/download/document/SEVD-2019-344-01\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…