ID

VAR-201804-1335


CVE

CVE-2018-7759


TITLE

plural Schneider Electric Product buffer error vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2018-004489

DESCRIPTION

A buffer overflow vulnerability exists in Schneider Electric's Modicon M340, Modicon Premium, Modicon Quantum PLC, BMXNOR0200. The buffer overflow vulnerability is caused by the length of the source string specified (instead of the buffer size) as the number of bytes to be copied. plural Schneider Electric The product contains a buffer error vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Schneider Electric Modicon M340 and others are programmable logic controller products from Schneider Electric, France. A remote attacker could exploit the vulnerability by sending a specially crafted request to cause a denial of service (crash)

Trust: 2.43

sources: NVD: CVE-2018-7759 // JVNDB: JVNDB-2018-004489 // CNVD: CNVD-2018-11260 // IVD: e2f26cc1-39ab-11e9-af70-000c29342cb1 // VULHUB: VHN-137791

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: e2f26cc1-39ab-11e9-af70-000c29342cb1 // CNVD: CNVD-2018-11260

AFFECTED PRODUCTS

vendor:schneider electricmodel:140cpu65860scope:eqversion: -

Trust: 1.6

vendor:schneider electricmodel:tsxp57554mscope:eqversion: -

Trust: 1.6

vendor:schneider electricmodel:tsxh5724mscope:eqversion: -

Trust: 1.6

vendor:schneider electricmodel:tsxp574634mcscope:eqversion: -

Trust: 1.6

vendor:schneider electricmodel:140cpu65160sscope:eqversion: -

Trust: 1.6

vendor:schneider electricmodel:tsxh5744mcscope:eqversion: -

Trust: 1.6

vendor:schneider electricmodel:tsxp575634mcscope:eqversion: -

Trust: 1.6

vendor:schneider electricmodel:tsxp57454mcscope:eqversion: -

Trust: 1.6

vendor:schneider electricmodel:tsxp57554mcscope:eqversion: -

Trust: 1.6

vendor:schneider electricmodel:tsxp576634mcscope:eqversion: -

Trust: 1.6

vendor:schneider electricmodel:tsxp57154mscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:tsxp57254mcscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:modicon m340 bmxp342000scope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:tsxp57204mcscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:tsxp57254mscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:tsxp575634mscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:140cpu31110scope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:140cpu65160scope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:tsxp57104mcscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:modicon m340 bmxp341000hscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:140cpu65860cscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:tsxp57454mscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:tsxp573634mcscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:tsxp571634mcscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:tsxp573634mscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:tsxp57104mscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:tsxp57304mscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:tsxp57304mcscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:140cpu65260scope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:140cpu65150cscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:tsxp57354mscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:140cpu65160cscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:tsxh5744mscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:tsxp57154mcscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:modicon m340 bmxp342020hscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:tsxp571634mscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:modicon m340 bmxp3420302hscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:140cpu65260cscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:modicon m340 bmxp3420302clscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:bmxnor0200scope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:bmxnor0200hscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:140cpu43412ucscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:140cpu43412uscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:tsxp574634mscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:modicon m340 bmxp3420302scope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:tsxh5724mcscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:modicon m340 bmxp341000scope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:modicon m340 bmxp342020scope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:tsxp572634mcscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:140cpu65150scope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:modicon m340 bmxp3420102clscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:tsxp57204mscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:tsxp572634mscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:modicon m340 bmxp3420102scope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:140cpu31110cscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:tsxp57354mcscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:tsxp576634mscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:140cpu31110scope: - version: -

Trust: 0.8

vendor:schneider electricmodel:bmxnor0200scope: - version: -

Trust: 0.8

vendor:schneider electricmodel:bmxp341000scope: - version: -

Trust: 0.8

vendor:schneider electricmodel:tsxh5724mscope: - version: -

Trust: 0.8

vendor:schneider electricmodel:tsxp57104mscope: - version: -

Trust: 0.8

vendor:schneidermodel:electric modicon premiumscope: - version: -

Trust: 0.6

vendor:schneidermodel:electric modicon m340scope: - version: -

Trust: 0.6

vendor:schneidermodel:electric modicon quantum plcscope: - version: -

Trust: 0.6

vendor:schneidermodel:electric bmxnor0200scope: - version: -

Trust: 0.6

vendor:schneidermodel:electric modicon premiumscope:eqversion:*

Trust: 0.2

vendor:schneidermodel:electric modicon m340 noscope:eqversion:*

Trust: 0.2

vendor:schneidermodel:electric modicon quantum plcscope:eqversion:*

Trust: 0.2

vendor:schneidermodel:electric bmxnor0200scope:eqversion:*

Trust: 0.2

sources: IVD: e2f26cc1-39ab-11e9-af70-000c29342cb1 // CNVD: CNVD-2018-11260 // JVNDB: JVNDB-2018-004489 // CNNVD: CNNVD-201804-825 // NVD: CVE-2018-7759

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-7759
value: HIGH

Trust: 1.0

NVD: CVE-2018-7759
value: HIGH

Trust: 0.8

CNVD: CNVD-2018-11260
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201804-825
value: MEDIUM

Trust: 0.6

IVD: e2f26cc1-39ab-11e9-af70-000c29342cb1
value: MEDIUM

Trust: 0.2

VULHUB: VHN-137791
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2018-7759
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2018-11260
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: e2f26cc1-39ab-11e9-af70-000c29342cb1
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-137791
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-7759
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: IVD: e2f26cc1-39ab-11e9-af70-000c29342cb1 // CNVD: CNVD-2018-11260 // VULHUB: VHN-137791 // JVNDB: JVNDB-2018-004489 // CNNVD: CNNVD-201804-825 // NVD: CVE-2018-7759

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-137791 // JVNDB: JVNDB-2018-004489 // NVD: CVE-2018-7759

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201804-825

TYPE

Buffer overflow

Trust: 0.8

sources: IVD: e2f26cc1-39ab-11e9-af70-000c29342cb1 // CNNVD: CNNVD-201804-825

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-004489

PATCH

title:SEVD-2018-081-02url:https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet&p_File_Name=SEVD-2018-081-02+Modicon.pdf&p_Doc_Ref=SEVD-2018-081-02

Trust: 0.8

sources: JVNDB: JVNDB-2018-004489

EXTERNAL IDS

db:NVDid:CVE-2018-7759

Trust: 3.3

db:SCHNEIDERid:SEVD-2018-081-02

Trust: 2.3

db:CNNVDid:CNNVD-201804-825

Trust: 0.9

db:CNVDid:CNVD-2018-11260

Trust: 0.8

db:JVNDBid:JVNDB-2018-004489

Trust: 0.8

db:IVDid:E2F26CC1-39AB-11E9-AF70-000C29342CB1

Trust: 0.2

db:VULHUBid:VHN-137791

Trust: 0.1

sources: IVD: e2f26cc1-39ab-11e9-af70-000c29342cb1 // CNVD: CNVD-2018-11260 // VULHUB: VHN-137791 // JVNDB: JVNDB-2018-004489 // CNNVD: CNNVD-201804-825 // NVD: CVE-2018-7759

REFERENCES

url:https://www.schneider-electric.com/en/download/document/sevd-2018-081-02/

Trust: 2.3

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7759

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-7759

Trust: 0.8

sources: CNVD: CNVD-2018-11260 // VULHUB: VHN-137791 // JVNDB: JVNDB-2018-004489 // CNNVD: CNNVD-201804-825 // NVD: CVE-2018-7759

SOURCES

db:IVDid:e2f26cc1-39ab-11e9-af70-000c29342cb1
db:CNVDid:CNVD-2018-11260
db:VULHUBid:VHN-137791
db:JVNDBid:JVNDB-2018-004489
db:CNNVDid:CNNVD-201804-825
db:NVDid:CVE-2018-7759

LAST UPDATE DATE

2024-11-23T21:39:00.294000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2018-11260date:2018-06-12T00:00:00
db:VULHUBid:VHN-137791date:2018-05-24T00:00:00
db:JVNDBid:JVNDB-2018-004489date:2018-06-21T00:00:00
db:CNNVDid:CNNVD-201804-825date:2018-05-09T00:00:00
db:NVDid:CVE-2018-7759date:2024-11-21T04:12:40.943

SOURCES RELEASE DATE

db:IVDid:e2f26cc1-39ab-11e9-af70-000c29342cb1date:2018-06-12T00:00:00
db:CNVDid:CNVD-2018-11260date:2018-06-12T00:00:00
db:VULHUBid:VHN-137791date:2018-04-18T00:00:00
db:JVNDBid:JVNDB-2018-004489date:2018-06-21T00:00:00
db:CNNVDid:CNNVD-201804-825date:2018-04-18T00:00:00
db:NVDid:CVE-2018-7759date:2018-04-18T20:29:00.683