ID

VAR-201905-1046


CVE

CVE-2018-7843


TITLE

plural Modicon Resource management vulnerabilities in products

Trust: 0.8

sources: JVNDB: JVNDB-2018-015477

DESCRIPTION

A CWE-248: Uncaught Exception vulnerability exists in all versions of the Modicon M580, Modicon M340, Modicon Quantum, and Modicon Premium which could cause denial of service when reading memory blocks with an invalid data size or with an invalid data offset in the controller over Modbus. plural Modicon The product contains a resource management vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Schneider Electric Modicon M580 and other products are products of Schneider Electric (France). Schneider Electric Modicon M580 is a programmable automation controller. Schneider Electric Modicon Premium is a large programmable logic controller (PLC) for discrete or process applications. Schneider Electric Modicon Quantum is a large programmable logic controller (PLC) for process applications, high availability and safety solutions. Multiple Schneider Electric products have resource management bugs. An attacker could use this vulnerability to cause a denial of service. The following products and versions are affected: Schneider Electric Modicon M580 (all versions); Modicon M340 (all versions); Modicon Quantum (all versions); Modicon Premium (all versions)

Trust: 2.52

sources: NVD: CVE-2018-7843 // JVNDB: JVNDB-2018-015477 // CNVD: CNVD-2019-34830 // IVD: f0fc6464-0d4f-4dbd-86b8-5715c11b44c9 // VULHUB: VHN-137875 // VULMON: CVE-2018-7843

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: f0fc6464-0d4f-4dbd-86b8-5715c11b44c9 // CNVD: CNVD-2019-34830

AFFECTED PRODUCTS

vendor:schneider electricmodel:modicon premiumscope:eqversion:*

Trust: 1.0

vendor:schneider electricmodel:modicon quantumscope:eqversion:*

Trust: 1.0

vendor:schneider electricmodel:modicon m580scope:eqversion:*

Trust: 1.0

vendor:schneider electricmodel:modicon m340scope:eqversion:*

Trust: 1.0

vendor:schneider electricmodel:modicon m340scope: - version: -

Trust: 0.8

vendor:schneider electricmodel:modicon m580scope: - version: -

Trust: 0.8

vendor:schneider electricmodel:modicon premium plcscope: - version: -

Trust: 0.8

vendor:schneider electricmodel:modicon quantum plcscope: - version: -

Trust: 0.8

vendor:schneidermodel:electric modicon m340scope: - version: -

Trust: 0.6

vendor:schneidermodel:electric modicon m580scope: - version: -

Trust: 0.6

vendor:schneidermodel:electric modicon premiumscope: - version: -

Trust: 0.6

vendor:schneidermodel:electric modicon quantumscope: - version: -

Trust: 0.6

vendor:modicon m580model: - scope:eqversion:*

Trust: 0.2

vendor:modicon m340model: - scope:eqversion:*

Trust: 0.2

vendor:modicon quantummodel: - scope:eqversion:*

Trust: 0.2

vendor:modicon premiummodel: - scope:eqversion:*

Trust: 0.2

sources: IVD: f0fc6464-0d4f-4dbd-86b8-5715c11b44c9 // CNVD: CNVD-2019-34830 // JVNDB: JVNDB-2018-015477 // NVD: CVE-2018-7843

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-7843
value: HIGH

Trust: 1.0

NVD: CVE-2018-7843
value: HIGH

Trust: 0.8

CNVD: CNVD-2019-34830
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201905-917
value: HIGH

Trust: 0.6

IVD: f0fc6464-0d4f-4dbd-86b8-5715c11b44c9
value: HIGH

Trust: 0.2

VULHUB: VHN-137875
value: MEDIUM

Trust: 0.1

VULMON: CVE-2018-7843
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2018-7843
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2019-34830
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: f0fc6464-0d4f-4dbd-86b8-5715c11b44c9
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-137875
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-7843
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2018-7843
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: IVD: f0fc6464-0d4f-4dbd-86b8-5715c11b44c9 // CNVD: CNVD-2019-34830 // VULHUB: VHN-137875 // VULMON: CVE-2018-7843 // JVNDB: JVNDB-2018-015477 // CNNVD: CNNVD-201905-917 // NVD: CVE-2018-7843

PROBLEMTYPE DATA

problemtype:CWE-125

Trust: 1.1

problemtype:CWE-399

Trust: 0.9

sources: VULHUB: VHN-137875 // JVNDB: JVNDB-2018-015477 // NVD: CVE-2018-7843

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201905-917

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201905-917

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-015477

PATCH

title:SEVD-2019-134-11url:https://www.schneider-electric.com/en/download/document/SEVD-2019-134-11/

Trust: 0.8

title: - url:https://github.com/yanissec/CVE-2018-7843

Trust: 0.1

sources: VULMON: CVE-2018-7843 // JVNDB: JVNDB-2018-015477

EXTERNAL IDS

db:NVDid:CVE-2018-7843

Trust: 3.4

db:SCHNEIDERid:SEVD-2019-134-11

Trust: 1.8

db:TALOSid:TALOS-2018-0738

Trust: 1.8

db:CNNVDid:CNNVD-201905-917

Trust: 0.9

db:CNVDid:CNVD-2019-34830

Trust: 0.8

db:JVNDBid:JVNDB-2018-015477

Trust: 0.8

db:IVDid:F0FC6464-0D4F-4DBD-86B8-5715C11B44C9

Trust: 0.2

db:VULHUBid:VHN-137875

Trust: 0.1

db:VULMONid:CVE-2018-7843

Trust: 0.1

sources: IVD: f0fc6464-0d4f-4dbd-86b8-5715c11b44c9 // CNVD: CNVD-2019-34830 // VULHUB: VHN-137875 // VULMON: CVE-2018-7843 // JVNDB: JVNDB-2018-015477 // CNNVD: CNNVD-201905-917 // NVD: CVE-2018-7843

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2018-7843

Trust: 2.0

url:https://www.schneider-electric.com/en/download/document/sevd-2019-134-11/

Trust: 1.8

url:https://www.talosintelligence.com/vulnerability_reports/talos-2018-0738

Trust: 1.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7843

Trust: 0.8

url:https://talosintelligence.com/vulnerability_reports/talos-2018-0738

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/125.html

Trust: 0.1

url:https://github.com/yanissec/cve-2018-7843

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2019-34830 // VULHUB: VHN-137875 // VULMON: CVE-2018-7843 // JVNDB: JVNDB-2018-015477 // CNNVD: CNNVD-201905-917 // NVD: CVE-2018-7843

CREDITS

Discovered by Jared Rittle of Cisco Talos.

Trust: 0.6

sources: CNNVD: CNNVD-201905-917

SOURCES

db:IVDid:f0fc6464-0d4f-4dbd-86b8-5715c11b44c9
db:CNVDid:CNVD-2019-34830
db:VULHUBid:VHN-137875
db:VULMONid:CVE-2018-7843
db:JVNDBid:JVNDB-2018-015477
db:CNNVDid:CNNVD-201905-917
db:NVDid:CVE-2018-7843

LAST UPDATE DATE

2024-11-23T21:52:12.883000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2019-34830date:2019-10-12T00:00:00
db:VULHUBid:VHN-137875date:2020-08-24T00:00:00
db:VULMONid:CVE-2018-7843date:2022-02-03T00:00:00
db:JVNDBid:JVNDB-2018-015477date:2019-06-07T00:00:00
db:CNNVDid:CNNVD-201905-917date:2022-02-07T00:00:00
db:NVDid:CVE-2018-7843date:2024-11-21T04:12:51.810

SOURCES RELEASE DATE

db:IVDid:f0fc6464-0d4f-4dbd-86b8-5715c11b44c9date:2019-10-12T00:00:00
db:CNVDid:CNVD-2019-34830date:2019-10-11T00:00:00
db:VULHUBid:VHN-137875date:2019-05-22T00:00:00
db:VULMONid:CVE-2018-7843date:2019-05-22T00:00:00
db:JVNDBid:JVNDB-2018-015477date:2019-06-07T00:00:00
db:CNNVDid:CNNVD-201905-917date:2019-05-22T00:00:00
db:NVDid:CVE-2018-7843date:2019-05-22T20:29:01.590