ID

VAR-201304-0401


CVE

CVE-2013-2763


TITLE

Schneider Electric M340 PLC Module Denial of Service Vulnerability

Trust: 0.8

sources: IVD: 03fbfde0-2353-11e6-abef-000c29c66e3d // CNVD: CNVD-2013-02816

DESCRIPTION

The Schneider Electric M340 PLC modules allow remote attackers to cause a denial of service (resource consumption) via unspecified vectors. NOTE: the vendor reportedly disputes this issue because it "could not be duplicated" and "an attacker could not remotely exploit this observed behavior to deny PLC control functions. ** Unsettled ** This case has not been confirmed as a vulnerability. Schneider Electric provides total solutions for the energy and infrastructure, industrial, data center and network, building and residential markets in more than 100 countries. The SESU tool used by several of these products is used to update software on Windows PC systems

Trust: 2.52

sources: NVD: CVE-2013-2763 // JVNDB: JVNDB-2013-006846 // CNVD: CNVD-2013-02816 // IVD: 03fbfde0-2353-11e6-abef-000c29c66e3d // VULHUB: VHN-62765 // VULMON: CVE-2013-2763

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: 03fbfde0-2353-11e6-abef-000c29c66e3d // CNVD: CNVD-2013-02816

AFFECTED PRODUCTS

vendor:schneider electricmodel:modicon m340 bmx nor 0200hscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:modicon m340 bmxp341000scope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:modicon m340 bmxp342030scope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:modicon m340 bmx noe 0100hscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:modicon m340 bmx p34-2010scope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:modicon m340 bmx p34-2030scope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:modicon m340 bmx noc 0401scope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:modicon m340 bmxp342020scope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:modicon m340 bmxp342010scope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:modicon m340 bmx noe 0110scope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:modicon m340 bmx noe 0100scope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:modicon m340 bmx noe 0110hscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:modicon m340 pacscope: - version: -

Trust: 0.8

vendor:schneidermodel:electric m340 plc modulesscope: - version: -

Trust: 0.6

vendor:modicon m340model: - scope:eqversion: -

Trust: 0.2

sources: IVD: 03fbfde0-2353-11e6-abef-000c29c66e3d // CNVD: CNVD-2013-02816 // JVNDB: JVNDB-2013-006846 // NVD: CVE-2013-2763

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-2763
value: MEDIUM

Trust: 1.0

NVD: CVE-2013-2763
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2013-02816
value: MEDIUM

Trust: 0.6

IVD: 03fbfde0-2353-11e6-abef-000c29c66e3d
value: MEDIUM

Trust: 0.2

VULHUB: VHN-62765
value: MEDIUM

Trust: 0.1

VULMON: CVE-2013-2763
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2013-2763
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2013-02816
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 03fbfde0-2353-11e6-abef-000c29c66e3d
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-62765
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: IVD: 03fbfde0-2353-11e6-abef-000c29c66e3d // CNVD: CNVD-2013-02816 // VULHUB: VHN-62765 // VULMON: CVE-2013-2763 // JVNDB: JVNDB-2013-006846 // NVD: CVE-2013-2763

PROBLEMTYPE DATA

problemtype:CWE-400

Trust: 1.0

problemtype:CWE-119

Trust: 0.9

sources: VULHUB: VHN-62765 // JVNDB: JVNDB-2013-006846 // NVD: CVE-2013-2763

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201304-629

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-006846

PATCH

title:Top Pageurl:https://www.schneider-electric.co.uk/en/

Trust: 0.8

title:トップページurl:https://www.se.com/jp/ja/

Trust: 0.8

title:CVE-2013-2763url:https://github.com/AlAIAL90/CVE-2013-2763

Trust: 0.1

sources: VULMON: CVE-2013-2763 // JVNDB: JVNDB-2013-006846

EXTERNAL IDS

db:NVDid:CVE-2013-2763

Trust: 3.4

db:ICS CERTid:ICSA-13-077-01A

Trust: 2.4

db:CNVDid:CNVD-2013-02816

Trust: 0.8

db:JVNDBid:JVNDB-2013-006846

Trust: 0.8

db:CNNVDid:CNNVD-201304-629

Trust: 0.6

db:IVDid:03FBFDE0-2353-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:VULHUBid:VHN-62765

Trust: 0.1

db:VULMONid:CVE-2013-2763

Trust: 0.1

sources: IVD: 03fbfde0-2353-11e6-abef-000c29c66e3d // CNVD: CNVD-2013-02816 // VULHUB: VHN-62765 // VULMON: CVE-2013-2763 // JVNDB: JVNDB-2013-006846 // CNNVD: CNNVD-201304-629 // NVD: CVE-2013-2763

REFERENCES

url:http://ics-cert.us-cert.gov/pdf/icsa-13-077-01a.pdf

Trust: 2.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-2763

Trust: 0.8

url:https://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-2763

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2013-2763

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/119.html

Trust: 0.1

url:https://github.com/alaial90/cve-2013-2763

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2013-02816 // VULHUB: VHN-62765 // VULMON: CVE-2013-2763 // JVNDB: JVNDB-2013-006846 // CNNVD: CNNVD-201304-629 // NVD: CVE-2013-2763

SOURCES

db:IVDid:03fbfde0-2353-11e6-abef-000c29c66e3d
db:CNVDid:CNVD-2013-02816
db:VULHUBid:VHN-62765
db:VULMONid:CVE-2013-2763
db:JVNDBid:JVNDB-2013-006846
db:CNNVDid:CNNVD-201304-629
db:NVDid:CVE-2013-2763

LAST UPDATE DATE

2024-11-23T21:51:40.267000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2013-02816date:2013-05-28T00:00:00
db:VULHUBid:VHN-62765date:2013-04-04T00:00:00
db:VULMONid:CVE-2013-2763date:2021-08-19T00:00:00
db:JVNDBid:JVNDB-2013-006846date:2019-07-29T00:00:00
db:CNNVDid:CNNVD-201304-629date:2022-02-07T00:00:00
db:NVDid:CVE-2013-2763date:2024-11-21T01:52:19.470

SOURCES RELEASE DATE

db:IVDid:03fbfde0-2353-11e6-abef-000c29c66e3ddate:2013-04-09T00:00:00
db:CNVDid:CNVD-2013-02816date:2013-04-09T00:00:00
db:VULHUBid:VHN-62765date:2013-04-04T00:00:00
db:VULMONid:CVE-2013-2763date:2013-04-04T00:00:00
db:JVNDBid:JVNDB-2013-006846date:2019-07-29T00:00:00
db:CNNVDid:CNNVD-201304-629date:2013-04-04T00:00:00
db:NVDid:CVE-2013-2763date:2013-04-04T11:58:49.867