ID

VAR-201804-1337


CVE

CVE-2018-7761


TITLE

plural Schneider Electric Vulnerability related to input validation in products

Trust: 0.8

sources: JVNDB: JVNDB-2018-004491

DESCRIPTION

A vulnerability exists in the HTTP request parser in Schneider Electric's Modicon M340, Modicon Premium, Modicon Quantum PLC, BMXNOR0200 which could allow arbitrary code execution. plural Schneider Electric The product contains an input validation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Schneider Electric Modicon M340 and others are programmable logic controller products from Schneider Electric, France. The HTTP request parser is one of the HTTP request parsers. A remote attacker can exploit this vulnerability to execute arbitrary code

Trust: 2.43

sources: NVD: CVE-2018-7761 // JVNDB: JVNDB-2018-004491 // CNVD: CNVD-2018-11261 // IVD: e2f26cc0-39ab-11e9-b2f8-000c29342cb1 // VULHUB: VHN-137793

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: e2f26cc0-39ab-11e9-b2f8-000c29342cb1 // CNVD: CNVD-2018-11261

AFFECTED PRODUCTS

vendor:schneider electricmodel:140cpu65860scope:eqversion: -

Trust: 1.6

vendor:schneider electricmodel:140cpu31110cscope:eqversion: -

Trust: 1.6

vendor:schneider electricmodel:140cpu65160sscope:eqversion: -

Trust: 1.6

vendor:schneider electricmodel:140cpu65260scope:eqversion: -

Trust: 1.6

vendor:schneider electricmodel:140cpu65160scope:eqversion: -

Trust: 1.6

vendor:schneider electricmodel:140cpu43412ucscope:eqversion: -

Trust: 1.6

vendor:schneider electricmodel:140cpu65150cscope:eqversion: -

Trust: 1.6

vendor:schneider electricmodel:140cpu65860cscope:eqversion: -

Trust: 1.6

vendor:schneider electricmodel:140cpu65160cscope:eqversion: -

Trust: 1.6

vendor:schneider electricmodel:tsxp57154mscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:tsxp57254mcscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:modicon m340 bmxp342000scope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:tsxp57204mcscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:tsxp57254mscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:tsxp57454mcscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:tsxp575634mscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:tsxp57554mscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:140cpu31110scope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:tsxp57554mcscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:tsxp57104mcscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:tsxp575634mcscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:tsxp574634mcscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:modicon m340 bmxp341000hscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:tsxp57454mscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:tsxp573634mcscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:tsxp571634mcscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:tsxp573634mscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:tsxp57104mscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:tsxh5744mcscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:tsxp57304mscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:tsxp57304mcscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:tsxp57354mscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:tsxh5744mscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:tsxp57154mcscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:tsxp576634mcscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:modicon m340 bmxp342020hscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:tsxp571634mscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:modicon m340 bmxp3420302hscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:140cpu65260cscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:modicon m340 bmxp3420302clscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:bmxnor0200scope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:bmxnor0200hscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:140cpu43412uscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:tsxp574634mscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:modicon m340 bmxp3420302scope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:tsxh5724mcscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:modicon m340 bmxp341000scope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:modicon m340 bmxp342020scope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:tsxp572634mcscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:140cpu65150scope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:modicon m340 bmxp3420102clscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:tsxp57204mscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:tsxp572634mscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:modicon m340 bmxp3420102scope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:tsxp57354mcscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:tsxp576634mscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:tsxh5724mscope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:140cpu31110scope: - version: -

Trust: 0.8

vendor:schneider electricmodel:bmxnor0200scope: - version: -

Trust: 0.8

vendor:schneider electricmodel:bmxp341000scope: - version: -

Trust: 0.8

vendor:schneider electricmodel:tsxh5724mscope: - version: -

Trust: 0.8

vendor:schneider electricmodel:tsxp57104mscope: - version: -

Trust: 0.8

vendor:schneidermodel:electric modicon premiumscope: - version: -

Trust: 0.6

vendor:schneidermodel:electric modicon m340scope: - version: -

Trust: 0.6

vendor:schneidermodel:electric modicon quantum plcscope: - version: -

Trust: 0.6

vendor:schneidermodel:electric bmxnor0200scope: - version: -

Trust: 0.6

vendor:schneider electricmodel:bmxp341000scope:eqversion: -

Trust: 0.6

vendor:140cpu65160cmodel: - scope:eqversion: -

Trust: 0.4

vendor:tsxh5724mmodel: - scope:eqversion: -

Trust: 0.4

vendor:tsxh5744mcmodel: - scope:eqversion: -

Trust: 0.4

vendor:bmxnor0200model: - scope:eqversion: -

Trust: 0.2

vendor:140cpu65150cmodel: - scope:eqversion: -

Trust: 0.2

vendor:140cpu31110cmodel: - scope:eqversion: -

Trust: 0.2

vendor:140cpu43412ucmodel: - scope:eqversion: -

Trust: 0.2

vendor:140cpu65260cmodel: - scope:eqversion: -

Trust: 0.2

vendor:140cpu65860cmodel: - scope:eqversion: -

Trust: 0.2

vendor:bmxp341000model: - scope:eqversion: -

Trust: 0.2

vendor:bmxp342000model: - scope:eqversion: -

Trust: 0.2

vendor:bmxp3420102model: - scope:eqversion: -

Trust: 0.2

vendor:bmxnor0200hmodel: - scope:eqversion: -

Trust: 0.2

vendor:bmxp3420102clmodel: - scope:eqversion: -

Trust: 0.2

vendor:bmxp342020model: - scope:eqversion: -

Trust: 0.2

vendor:bmxp3420302model: - scope:eqversion: -

Trust: 0.2

vendor:bmxp3420302clmodel: - scope:eqversion: -

Trust: 0.2

vendor:bmxp3420302hmodel: - scope:eqversion: -

Trust: 0.2

vendor:bmxp342020hmodel: - scope:eqversion: -

Trust: 0.2

vendor:bmxp341000hmodel: - scope:eqversion: -

Trust: 0.2

vendor:tsxh5744mmodel: - scope:eqversion: -

Trust: 0.2

vendor:tsxp57104mmodel: - scope:eqversion: -

Trust: 0.2

vendor:140cpu65150model: - scope:eqversion: -

Trust: 0.2

vendor:tsxp57154mmodel: - scope:eqversion: -

Trust: 0.2

vendor:tsxp571634mmodel: - scope:eqversion: -

Trust: 0.2

vendor:tsxp57204mmodel: - scope:eqversion: -

Trust: 0.2

vendor:tsxp57254mmodel: - scope:eqversion: -

Trust: 0.2

vendor:tsxp572634mmodel: - scope:eqversion: -

Trust: 0.2

vendor:tsxp57304mmodel: - scope:eqversion: -

Trust: 0.2

vendor:tsxp57354mmodel: - scope:eqversion: -

Trust: 0.2

vendor:tsxp573634mmodel: - scope:eqversion: -

Trust: 0.2

vendor:tsxp57454mmodel: - scope:eqversion: -

Trust: 0.2

vendor:tsxp574634mmodel: - scope:eqversion: -

Trust: 0.2

vendor:140cpu31110model: - scope:eqversion: -

Trust: 0.2

vendor:tsxp575634mmodel: - scope:eqversion: -

Trust: 0.2

vendor:tsxp576634mmodel: - scope:eqversion: -

Trust: 0.2

vendor:tsxh5724mcmodel: - scope:eqversion: -

Trust: 0.2

vendor:tsxp57104mcmodel: - scope:eqversion: -

Trust: 0.2

vendor:tsxp57154mcmodel: - scope:eqversion: -

Trust: 0.2

vendor:tsxp571634mcmodel: - scope:eqversion: -

Trust: 0.2

vendor:tsxp57204mcmodel: - scope:eqversion: -

Trust: 0.2

vendor:tsxp57254mcmodel: - scope:eqversion: -

Trust: 0.2

vendor:tsxp572634mcmodel: - scope:eqversion: -

Trust: 0.2

vendor:140cpu43412umodel: - scope:eqversion: -

Trust: 0.2

vendor:tsxp57304mcmodel: - scope:eqversion: -

Trust: 0.2

vendor:tsxp57354mcmodel: - scope:eqversion: -

Trust: 0.2

vendor:tsxp573634mcmodel: - scope:eqversion: -

Trust: 0.2

vendor:tsxp57454mcmodel: - scope:eqversion: -

Trust: 0.2

vendor:tsxp574634mcmodel: - scope:eqversion: -

Trust: 0.2

vendor:tsxp57554mcmodel: - scope:eqversion: -

Trust: 0.2

vendor:tsxp575634mcmodel: - scope:eqversion: -

Trust: 0.2

vendor:tsxp576634mcmodel: - scope:eqversion: -

Trust: 0.2

vendor:140cpu65160model: - scope:eqversion: -

Trust: 0.2

vendor:tsxp57554mmodel: - scope:eqversion: -

Trust: 0.2

vendor:140cpu65260model: - scope:eqversion: -

Trust: 0.2

vendor:140cpu65860model: - scope:eqversion: -

Trust: 0.2

vendor:140cpu65160smodel: - scope:eqversion: -

Trust: 0.2

sources: IVD: e2f26cc0-39ab-11e9-b2f8-000c29342cb1 // CNVD: CNVD-2018-11261 // JVNDB: JVNDB-2018-004491 // CNNVD: CNNVD-201804-823 // NVD: CVE-2018-7761

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-7761
value: CRITICAL

Trust: 1.0

NVD: CVE-2018-7761
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2018-11261
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201804-823
value: HIGH

Trust: 0.6

IVD: e2f26cc0-39ab-11e9-b2f8-000c29342cb1
value: HIGH

Trust: 0.2

VULHUB: VHN-137793
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-7761
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2018-11261
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: e2f26cc0-39ab-11e9-b2f8-000c29342cb1
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-137793
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-7761
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: IVD: e2f26cc0-39ab-11e9-b2f8-000c29342cb1 // CNVD: CNVD-2018-11261 // VULHUB: VHN-137793 // JVNDB: JVNDB-2018-004491 // CNNVD: CNNVD-201804-823 // NVD: CVE-2018-7761

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-137793 // JVNDB: JVNDB-2018-004491 // NVD: CVE-2018-7761

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201804-823

TYPE

Input validation

Trust: 0.8

sources: IVD: e2f26cc0-39ab-11e9-b2f8-000c29342cb1 // CNNVD: CNNVD-201804-823

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-004491

PATCH

title:SEVD-2018-081-02url:https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet&p_File_Name=SEVD-2018-081-02+Modicon.pdf&p_Doc_Ref=SEVD-2018-081-02

Trust: 0.8

sources: JVNDB: JVNDB-2018-004491

EXTERNAL IDS

db:NVDid:CVE-2018-7761

Trust: 3.3

db:SCHNEIDERid:SEVD-2018-081-02

Trust: 2.3

db:CNNVDid:CNNVD-201804-823

Trust: 0.9

db:CNVDid:CNVD-2018-11261

Trust: 0.8

db:JVNDBid:JVNDB-2018-004491

Trust: 0.8

db:IVDid:E2F26CC0-39AB-11E9-B2F8-000C29342CB1

Trust: 0.2

db:VULHUBid:VHN-137793

Trust: 0.1

sources: IVD: e2f26cc0-39ab-11e9-b2f8-000c29342cb1 // CNVD: CNVD-2018-11261 // VULHUB: VHN-137793 // JVNDB: JVNDB-2018-004491 // CNNVD: CNNVD-201804-823 // NVD: CVE-2018-7761

REFERENCES

url:https://www.schneider-electric.com/en/download/document/sevd-2018-081-02/

Trust: 2.3

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7761

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-7761

Trust: 0.8

sources: CNVD: CNVD-2018-11261 // VULHUB: VHN-137793 // JVNDB: JVNDB-2018-004491 // CNNVD: CNNVD-201804-823 // NVD: CVE-2018-7761

SOURCES

db:IVDid:e2f26cc0-39ab-11e9-b2f8-000c29342cb1
db:CNVDid:CNVD-2018-11261
db:VULHUBid:VHN-137793
db:JVNDBid:JVNDB-2018-004491
db:CNNVDid:CNNVD-201804-823
db:NVDid:CVE-2018-7761

LAST UPDATE DATE

2024-11-23T21:39:00.367000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2018-11261date:2018-06-12T00:00:00
db:VULHUBid:VHN-137793date:2018-05-24T00:00:00
db:JVNDBid:JVNDB-2018-004491date:2018-06-21T00:00:00
db:CNNVDid:CNNVD-201804-823date:2018-05-09T00:00:00
db:NVDid:CVE-2018-7761date:2024-11-21T04:12:41.250

SOURCES RELEASE DATE

db:IVDid:e2f26cc0-39ab-11e9-b2f8-000c29342cb1date:2018-06-12T00:00:00
db:CNVDid:CNVD-2018-11261date:2018-06-12T00:00:00
db:VULHUBid:VHN-137793date:2018-04-18T00:00:00
db:JVNDBid:JVNDB-2018-004491date:2018-06-21T00:00:00
db:CNNVDid:CNNVD-201804-823date:2018-04-18T00:00:00
db:NVDid:CVE-2018-7761date:2018-04-18T20:29:00.793