ID

VAR-201905-1045


CVE

CVE-2018-7842


TITLE

plural Modicon Vulnerabilities related to authorization, authority, and access control in products

Trust: 0.8

sources: JVNDB: JVNDB-2018-015484

DESCRIPTION

A CWE-290: Authentication Bypass by Spoofing vulnerability exists in all versions of the Modicon M580, Modicon M340, Modicon Quantum, and Modicon Premium which could cause an elevation of privilege by conducting a brute force attack on Modbus parameters sent to the controller. plural Modicon The product contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Schneider Electric Modicon M580 and other products are products of Schneider Electric (France). Schneider Electric Modicon M580 is a programmable automation controller. Schneider Electric Modicon Premium is a large programmable logic controller (PLC) for discrete or process applications. Schneider Electric Modicon Quantum is a large programmable logic controller (PLC) for process applications, high availability and safety solutions. Multiple Schneider Electric products have vulnerabilities in permissions and access control issues. An attacker could exploit this vulnerability through brute force to elevate privileges. The following products and versions are affected: Schneider Electric Modicon M580 (all versions); Modicon M340 (all versions); Modicon Quantum (all versions); Modicon Premium (all versions)

Trust: 2.52

sources: NVD: CVE-2018-7842 // JVNDB: JVNDB-2018-015484 // CNVD: CNVD-2019-34831 // IVD: 0621b557-6182-4beb-bfa9-d91bbd70ed5b // VULHUB: VHN-137874 // VULMON: CVE-2018-7842

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: 0621b557-6182-4beb-bfa9-d91bbd70ed5b // CNVD: CNVD-2019-34831

AFFECTED PRODUCTS

vendor:schneider electricmodel:modicon premiumscope:eqversion:*

Trust: 1.0

vendor:schneider electricmodel:modicon quantumscope:eqversion:*

Trust: 1.0

vendor:schneider electricmodel:modicon m580scope:eqversion:*

Trust: 1.0

vendor:schneider electricmodel:modicon m340scope:eqversion:*

Trust: 1.0

vendor:schneider electricmodel:modicon m340scope: - version: -

Trust: 0.8

vendor:schneider electricmodel:modicon m580scope: - version: -

Trust: 0.8

vendor:schneider electricmodel:modicon premium plcscope: - version: -

Trust: 0.8

vendor:schneider electricmodel:modicon quantum plcscope: - version: -

Trust: 0.8

vendor:schneidermodel:electric modicon m340scope: - version: -

Trust: 0.6

vendor:schneidermodel:electric modicon m580scope: - version: -

Trust: 0.6

vendor:schneidermodel:electric modicon premiumscope: - version: -

Trust: 0.6

vendor:schneidermodel:electric modicon quantumscope: - version: -

Trust: 0.6

vendor:modicon m580model: - scope:eqversion:*

Trust: 0.2

vendor:modicon m340model: - scope:eqversion:*

Trust: 0.2

vendor:modicon quantummodel: - scope:eqversion:*

Trust: 0.2

vendor:modicon premiummodel: - scope:eqversion:*

Trust: 0.2

sources: IVD: 0621b557-6182-4beb-bfa9-d91bbd70ed5b // CNVD: CNVD-2019-34831 // JVNDB: JVNDB-2018-015484 // NVD: CVE-2018-7842

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-7842
value: CRITICAL

Trust: 1.0

NVD: CVE-2018-7842
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2019-34831
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201905-916
value: CRITICAL

Trust: 0.6

IVD: 0621b557-6182-4beb-bfa9-d91bbd70ed5b
value: CRITICAL

Trust: 0.2

VULHUB: VHN-137874
value: HIGH

Trust: 0.1

VULMON: CVE-2018-7842
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-7842
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2019-34831
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 0621b557-6182-4beb-bfa9-d91bbd70ed5b
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-137874
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-7842
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2018-7842
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: IVD: 0621b557-6182-4beb-bfa9-d91bbd70ed5b // CNVD: CNVD-2019-34831 // VULHUB: VHN-137874 // VULMON: CVE-2018-7842 // JVNDB: JVNDB-2018-015484 // CNNVD: CNNVD-201905-916 // NVD: CVE-2018-7842

PROBLEMTYPE DATA

problemtype:CWE-290

Trust: 1.1

problemtype:CWE-264

Trust: 0.9

sources: VULHUB: VHN-137874 // JVNDB: JVNDB-2018-015484 // NVD: CVE-2018-7842

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201905-916

TYPE

permissions and access control issues

Trust: 0.6

sources: CNNVD: CNNVD-201905-916

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-015484

PATCH

title:SEVD-2019-134-11url:https://www.schneider-electric.com/en/download/document/SEVD-2019-134-11/

Trust: 0.8

title:CVE-2018-7842url:https://github.com/AlAIAL90/CVE-2018-7842

Trust: 0.1

sources: VULMON: CVE-2018-7842 // JVNDB: JVNDB-2018-015484

EXTERNAL IDS

db:NVDid:CVE-2018-7842

Trust: 3.4

db:TALOSid:TALOS-2018-0741

Trust: 1.8

db:SCHNEIDERid:SEVD-2019-134-11

Trust: 1.8

db:CNNVDid:CNNVD-201905-916

Trust: 0.9

db:CNVDid:CNVD-2019-34831

Trust: 0.8

db:JVNDBid:JVNDB-2018-015484

Trust: 0.8

db:IVDid:0621B557-6182-4BEB-BFA9-D91BBD70ED5B

Trust: 0.2

db:VULHUBid:VHN-137874

Trust: 0.1

db:VULMONid:CVE-2018-7842

Trust: 0.1

sources: IVD: 0621b557-6182-4beb-bfa9-d91bbd70ed5b // CNVD: CNVD-2019-34831 // VULHUB: VHN-137874 // VULMON: CVE-2018-7842 // JVNDB: JVNDB-2018-015484 // CNNVD: CNNVD-201905-916 // NVD: CVE-2018-7842

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2018-7842

Trust: 2.0

url:https://www.schneider-electric.com/en/download/document/sevd-2019-134-11/

Trust: 1.8

url:https://www.talosintelligence.com/vulnerability_reports/talos-2018-0741

Trust: 1.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7842

Trust: 0.8

url:https://talosintelligence.com/vulnerability_reports/talos-2018-0741

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/290.html

Trust: 0.1

url:https://github.com/alaial90/cve-2018-7842

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2019-34831 // VULHUB: VHN-137874 // VULMON: CVE-2018-7842 // JVNDB: JVNDB-2018-015484 // CNNVD: CNNVD-201905-916 // NVD: CVE-2018-7842

CREDITS

Discovered by Jared Rittle of Cisco Talos.

Trust: 0.6

sources: CNNVD: CNNVD-201905-916

SOURCES

db:IVDid:0621b557-6182-4beb-bfa9-d91bbd70ed5b
db:CNVDid:CNVD-2019-34831
db:VULHUBid:VHN-137874
db:VULMONid:CVE-2018-7842
db:JVNDBid:JVNDB-2018-015484
db:CNNVDid:CNNVD-201905-916
db:NVDid:CVE-2018-7842

LAST UPDATE DATE

2024-11-23T21:52:12.845000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2019-34831date:2019-10-12T00:00:00
db:VULHUBid:VHN-137874date:2020-08-24T00:00:00
db:VULMONid:CVE-2018-7842date:2022-02-03T00:00:00
db:JVNDBid:JVNDB-2018-015484date:2019-06-07T00:00:00
db:CNNVDid:CNNVD-201905-916date:2022-03-10T00:00:00
db:NVDid:CVE-2018-7842date:2024-11-21T04:12:51.697

SOURCES RELEASE DATE

db:IVDid:0621b557-6182-4beb-bfa9-d91bbd70ed5bdate:2019-10-12T00:00:00
db:CNVDid:CNVD-2019-34831date:2019-10-11T00:00:00
db:VULHUBid:VHN-137874date:2019-05-22T00:00:00
db:VULMONid:CVE-2018-7842date:2019-05-22T00:00:00
db:JVNDBid:JVNDB-2018-015484date:2019-06-07T00:00:00
db:CNNVDid:CNNVD-201905-916date:2019-05-22T00:00:00
db:NVDid:CVE-2018-7842date:2019-05-22T20:29:01.557