ID

VAR-202203-0230


CVE

CVE-2022-24323


TITLE

Schneider Electric EcoStruxure Control Expert and Schneider Electric EcoStruxure Process Exper Code problem vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-202203-829

DESCRIPTION

A CWE-754: Improper Check for Unusual or Exceptional Conditions vulnerability exists that could cause a disruption of communication between the Modicon controller and the engineering software, when an attacker is able to intercept and manipulate specific Modbus response data. Affected Product: EcoStruxure Process Expert (V2021 and prior), EcoStruxure Control Expert (V15.0 SP1 and prior)

Trust: 1.0

sources: NVD: CVE-2022-24323

AFFECTED PRODUCTS

vendor:schneider electricmodel:ecostruxure control expertscope:ltversion:15.0

Trust: 1.0

vendor:schneider electricmodel:ecostruxure process expertscope:lteversion:2021

Trust: 1.0

vendor:schneider electricmodel:ecostruxure control expertscope:eqversion:15.0

Trust: 1.0

sources: NVD: CVE-2022-24323

CVSS

SEVERITY

CVSSV2

CVSSV3

NVD: CVE-2022-24323
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-202203-829
value: MEDIUM

Trust: 0.6

NVD: CVE-2022-24323
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: FALSE
obtainAllPrivilege: FALSE
obtainUserPrivilege: FALSE
obtainOtherPrivilege: FALSE
userInteractionRequired: FALSE
version: 2.0

Trust: 1.0

NVD: CVE-2022-24323
baseSeverity: MEDIUM
baseScore: 5.9
vectorString: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 2.2
impactScore: 3.6
version: 3.1

Trust: 1.0

sources: CNNVD: CNNVD-202203-829 // NVD: CVE-2022-24323

PROBLEMTYPE DATA

problemtype:CWE-754

Trust: 1.0

sources: NVD: CVE-2022-24323

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202203-829

TYPE

code problem

Trust: 0.6

sources: CNNVD: CNNVD-202203-829

CONFIGURATIONS

sources: NVD: CVE-2022-24323

PATCH

title:Schneider Electric EcoStruxure Control Expert and Schneider Electric EcoStruxure Process Exper Fixes for code issue vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=185691

Trust: 0.6

sources: CNNVD: CNNVD-202203-829

EXTERNAL IDS

db:NVDid:CVE-2022-24323

Trust: 1.6

db:SCHNEIDERid:SEVD-2022-067-01

Trust: 1.6

db:CNNVDid:CNNVD-202203-829

Trust: 0.6

sources: CNNVD: CNNVD-202203-829 // NVD: CVE-2022-24323

REFERENCES

url:https://download.schneider-electric.com/files?p_doc_ref=sevd-2022-067-01

Trust: 1.6

url:https://cxsecurity.com/cveshow/cve-2022-24323/

Trust: 0.6

sources: CNNVD: CNNVD-202203-829 // NVD: CVE-2022-24323

SOURCES

db:CNNVDid:CNNVD-202203-829
db:NVDid:CVE-2022-24323

LAST UPDATE DATE

2022-05-04T09:37:30.871000+00:00


SOURCES UPDATE DATE

db:CNNVDid:CNNVD-202203-829date:2022-03-14T00:00:00
db:NVDid:CVE-2022-24323date:2022-03-12T02:39:00

SOURCES RELEASE DATE

db:CNNVDid:CNNVD-202203-829date:2022-03-09T00:00:00
db:NVDid:CVE-2022-24323date:2022-03-09T23:15:00