ID

VAR-201512-0029


CVE

CVE-2015-7937


TITLE

Schneider Electric Modicon M340 PLC BMXNOx and BMXPx Device stack-based buffer overflow vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2015-006488

DESCRIPTION

Stack-based buffer overflow in the GoAhead Web Server on Schneider Electric Modicon M340 PLC BMXNOx and BMXPx devices allows remote attackers to execute arbitrary code via a long password in HTTP Basic Authentication data. Schneider Electric Modicon M340 PLC BMXNOx and BMXPx are programmable controller products from Schneider Electric, France. GoAhead Web Server is one of the embedded web servers. Schneider Electric Modicon M340 is prone to an unspecified stack-based buffer-overflow vulnerability. Failed exploit attempts may crash the application, denying service to legitimate users

Trust: 2.7

sources: NVD: CVE-2015-7937 // JVNDB: JVNDB-2015-006488 // CNVD: CNVD-2015-08446 // BID: 79622 // IVD: 6d82e7a8-2351-11e6-abef-000c29c66e3d // VULHUB: VHN-85898

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: 6d82e7a8-2351-11e6-abef-000c29c66e3d // CNVD: CNVD-2015-08446

AFFECTED PRODUCTS

vendor:schneider electricmodel:bmxnoe0110scope:eqversion: -

Trust: 1.6

vendor:schneider electricmodel:bmxnoe0100scope:eqversion: -

Trust: 1.6

vendor:schneider electricmodel:bmxnor0200hscope:eqversion: -

Trust: 1.6

vendor:schneider electricmodel:bmxnoc0401scope:eqversion: -

Trust: 1.6

vendor:schneider electricmodel:bmxnoe0100hscope:eqversion: -

Trust: 1.6

vendor:schneider electricmodel:bmxnor0200scope:eqversion: -

Trust: 1.6

vendor:schneider electricmodel:bmxnoe0110hscope:eqversion: -

Trust: 1.6

vendor:schneider electricmodel:modicon m340 bmxp342020hscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:modicon m340 bmxp342030scope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:modicon m340 bmxp342020scope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:modicon m340 bmxp3420302hscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:bmxpra0100scope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:modicon m340 bmxp3420302scope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:bmxnoc0401scope: - version: -

Trust: 0.8

vendor:schneider electricmodel:bmxnoe0100scope: - version: -

Trust: 0.8

vendor:schneider electricmodel:bmxnoe0100hscope: - version: -

Trust: 0.8

vendor:schneider electricmodel:bmxnoe0110scope: - version: -

Trust: 0.8

vendor:schneider electricmodel:bmxnoe0110hscope: - version: -

Trust: 0.8

vendor:schneider electricmodel:bmxnor0200scope: - version: -

Trust: 0.8

vendor:schneider electricmodel:bmxnor0200hscope: - version: -

Trust: 0.8

vendor:schneider electricmodel:bmxp342020scope: - version: -

Trust: 0.8

vendor:schneider electricmodel:bmxp342020hscope: - version: -

Trust: 0.8

vendor:schneider electricmodel:bmxp342030scope: - version: -

Trust: 0.8

vendor:schneider electricmodel:bmxp3420302scope: - version: -

Trust: 0.8

vendor:schneider electricmodel:bmxp3420302hscope: - version: -

Trust: 0.8

vendor:schneider electricmodel:bmxpra0100scope: - version: -

Trust: 0.8

vendor:schneidermodel:electric modicon m340scope: - version: -

Trust: 0.6

vendor:schneider electricmodel:bmxp342020hscope:eqversion: -

Trust: 0.6

vendor:schneider electricmodel:bmxp342030scope:eqversion: -

Trust: 0.6

vendor:schneider electricmodel:bmxp342020scope:eqversion: -

Trust: 0.6

vendor:schneider electricmodel:modicon m340 bmxpra0100scope: - version: -

Trust: 0.3

vendor:schneider electricmodel:modicon m340 bmxp3420302hscope: - version: -

Trust: 0.3

vendor:schneider electricmodel:modicon m340 bmxp3420302scope: - version: -

Trust: 0.3

vendor:schneider electricmodel:modicon m340 bmxp342030scope: - version: -

Trust: 0.3

vendor:schneider electricmodel:modicon m340 bmxp342020hscope: - version: -

Trust: 0.3

vendor:schneider electricmodel:modicon m340 bmxp342020scope: - version: -

Trust: 0.3

vendor:schneider electricmodel:modicon m340 bmxnor0200hscope: - version: -

Trust: 0.3

vendor:schneider electricmodel:modicon m340 bmxnor0200scope: - version: -

Trust: 0.3

vendor:schneider electricmodel:modicon m340 bmxnoe0110hscope: - version: -

Trust: 0.3

vendor:schneider electricmodel:modicon m340 bmxnoe0110scope: - version: -

Trust: 0.3

vendor:schneider electricmodel:modicon m340 bmxnoe0100hscope: - version: -

Trust: 0.3

vendor:schneider electricmodel:modicon m340 bmxnoe0100scope: - version: -

Trust: 0.3

vendor:schneider electricmodel:modicon m340 bmxnoc0401scope: - version: -

Trust: 0.3

vendor:bmxnoc0401model: - scope:eqversion: -

Trust: 0.2

vendor:bmxnoe0100model: - scope:eqversion: -

Trust: 0.2

vendor:bmxnoe0100hmodel: - scope:eqversion: -

Trust: 0.2

vendor:bmxnoe0110model: - scope:eqversion: -

Trust: 0.2

vendor:bmxnoe0110hmodel: - scope:eqversion: -

Trust: 0.2

vendor:bmxnor0200model: - scope:eqversion: -

Trust: 0.2

vendor:bmxnor0200hmodel: - scope:eqversion: -

Trust: 0.2

vendor:bmxp342020model: - scope:eqversion: -

Trust: 0.2

vendor:bmxp342020hmodel: - scope:eqversion: -

Trust: 0.2

vendor:bmxp342030model: - scope:eqversion: -

Trust: 0.2

vendor:bmxp3420302model: - scope:eqversion: -

Trust: 0.2

vendor:bmxp3420302hmodel: - scope:eqversion: -

Trust: 0.2

vendor:bmxpra0100model: - scope:eqversion: -

Trust: 0.2

sources: IVD: 6d82e7a8-2351-11e6-abef-000c29c66e3d // CNVD: CNVD-2015-08446 // BID: 79622 // JVNDB: JVNDB-2015-006488 // CNNVD: CNNVD-201512-542 // NVD: CVE-2015-7937

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-7937
value: HIGH

Trust: 1.0

NVD: CVE-2015-7937
value: HIGH

Trust: 0.8

CNVD: CNVD-2015-08446
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201512-542
value: CRITICAL

Trust: 0.6

IVD: 6d82e7a8-2351-11e6-abef-000c29c66e3d
value: CRITICAL

Trust: 0.2

VULHUB: VHN-85898
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2015-7937
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2015-08446
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 6d82e7a8-2351-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-85898
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: IVD: 6d82e7a8-2351-11e6-abef-000c29c66e3d // CNVD: CNVD-2015-08446 // VULHUB: VHN-85898 // JVNDB: JVNDB-2015-006488 // CNNVD: CNNVD-201512-542 // NVD: CVE-2015-7937

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-85898 // JVNDB: JVNDB-2015-006488 // NVD: CVE-2015-7937

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201512-542

TYPE

Buffer overflow

Trust: 0.8

sources: IVD: 6d82e7a8-2351-11e6-abef-000c29c66e3d // CNNVD: CNNVD-201512-542

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-006488

PATCH

title:SEVD-2015-344-01url:http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2015-344-01

Trust: 0.8

title:Schneider Electric Modicon M340 PLC BMXNOx and BMXPx Stack Buffer Overflow Vulnerability Patchurl:https://www.cnvd.org.cn/patchInfo/show/68892

Trust: 0.6

title:Schneider Electric Modicon M340 PLC BMXNOx and BMXPx Fixes for stack-based buffer overflow vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=59311

Trust: 0.6

sources: CNVD: CNVD-2015-08446 // JVNDB: JVNDB-2015-006488 // CNNVD: CNNVD-201512-542

EXTERNAL IDS

db:NVDid:CVE-2015-7937

Trust: 3.6

db:ICS CERTid:ICSA-15-351-01

Trust: 3.4

db:BIDid:79622

Trust: 2.6

db:SCHNEIDERid:SEVD-2015-344-01

Trust: 1.7

db:CNNVDid:CNNVD-201512-542

Trust: 0.9

db:CNVDid:CNVD-2015-08446

Trust: 0.8

db:JVNDBid:JVNDB-2015-006488

Trust: 0.8

db:IVDid:6D82E7A8-2351-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:VULHUBid:VHN-85898

Trust: 0.1

sources: IVD: 6d82e7a8-2351-11e6-abef-000c29c66e3d // CNVD: CNVD-2015-08446 // VULHUB: VHN-85898 // BID: 79622 // JVNDB: JVNDB-2015-006488 // CNNVD: CNNVD-201512-542 // NVD: CVE-2015-7937

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-15-351-01

Trust: 3.4

url:http://www.securityfocus.com/bid/79622

Trust: 2.3

url:http://download.schneider-electric.com/files?p_doc_ref=sevd-2015-344-01

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7937

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-7937

Trust: 0.8

url:http://www.schneider-electric.com/en/all-products

Trust: 0.3

sources: CNVD: CNVD-2015-08446 // VULHUB: VHN-85898 // BID: 79622 // JVNDB: JVNDB-2015-006488 // CNNVD: CNNVD-201512-542 // NVD: CVE-2015-7937

CREDITS

Nir Giller

Trust: 0.9

sources: BID: 79622 // CNNVD: CNNVD-201512-542

SOURCES

db:IVDid:6d82e7a8-2351-11e6-abef-000c29c66e3d
db:CNVDid:CNVD-2015-08446
db:VULHUBid:VHN-85898
db:BIDid:79622
db:JVNDBid:JVNDB-2015-006488
db:CNNVDid:CNNVD-201512-542
db:NVDid:CVE-2015-7937

LAST UPDATE DATE

2024-11-23T22:01:39.956000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2015-08446date:2015-12-24T00:00:00
db:VULHUBid:VHN-85898date:2016-11-28T00:00:00
db:BIDid:79622date:2015-12-17T00:00:00
db:JVNDBid:JVNDB-2015-006488date:2015-12-22T00:00:00
db:CNNVDid:CNNVD-201512-542date:2015-12-22T00:00:00
db:NVDid:CVE-2015-7937date:2024-11-21T02:37:41.870

SOURCES RELEASE DATE

db:IVDid:6d82e7a8-2351-11e6-abef-000c29c66e3ddate:2015-12-24T00:00:00
db:CNVDid:CNVD-2015-08446date:2015-12-24T00:00:00
db:VULHUBid:VHN-85898date:2015-12-21T00:00:00
db:BIDid:79622date:2015-12-17T00:00:00
db:JVNDBid:JVNDB-2015-006488date:2015-12-22T00:00:00
db:CNNVDid:CNNVD-201512-542date:2015-12-21T00:00:00
db:NVDid:CVE-2015-7937date:2015-12-21T11:59:12.097