ID

VAR-202407-0346


CVE

CVE-2024-6528


TITLE

plural  Schneider Electric  Cross-site scripting vulnerability in the product

Trust: 0.8

sources: JVNDB: JVNDB-2024-004305

DESCRIPTION

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability exists that could cause a vulnerability leading to a cross-site scripting condition where attackers can have a victim’s browser run arbitrary JavaScript when they visit a page containing the injected payload. Modicon M241 firmware, Modicon M251 firmware, Modicon M258 firmware etc. Schneider Electric A cross-site scripting vulnerability exists in the product.Information may be obtained and information may be tampered with. Schneider Electric (China) Co., Ltd. is a global electrical company and an expert in global energy efficiency management and automation. Schneider Electric (China) Co., Ltd. TM241CE24T_U has an XSS vulnerability, which can be exploited by attackers to obtain sensitive information such as user cookies

Trust: 2.16

sources: NVD: CVE-2024-6528 // JVNDB: JVNDB-2024-004305 // CNVD: CNVD-2024-32452

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2024-32452

AFFECTED PRODUCTS

vendor:schneider electricmodel:modicon m251scope:eqversion:*

Trust: 1.0

vendor:schneider electricmodel:modicon m258scope:eqversion:*

Trust: 1.0

vendor:schneider electricmodel:modicon m241scope:eqversion:*

Trust: 1.0

vendor:schneider electricmodel:modicon m262scope:eqversion:*

Trust: 1.0

vendor:schneider electricmodel:modicon lmc058scope:eqversion:*

Trust: 1.0

vendor:schneider electricmodel:modicon m262scope: - version: -

Trust: 0.8

vendor:schneider electricmodel:modicon m258scope: - version: -

Trust: 0.8

vendor:schneider electricmodel:modicon m241scope: - version: -

Trust: 0.8

vendor:schneider electricmodel:modicon m251scope: - version: -

Trust: 0.8

vendor:schneider electricmodel:modicon lmc058scope: - version: -

Trust: 0.8

vendor:schneider electricmodel:tm241ce24t uscope:eqversion:1.1.0.0

Trust: 0.6

sources: CNVD: CNVD-2024-32452 // JVNDB: JVNDB-2024-004305 // NVD: CVE-2024-6528

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2024-6528
value: MEDIUM

Trust: 1.0

cybersecurity@se.com: CVE-2024-6528
value: MEDIUM

Trust: 1.0

NVD: CVE-2024-6528
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2024-32452
value: LOW

Trust: 0.6

CNVD: CNVD-2024-32452
severity: LOW
baseScore: 3.6
vectorString: AV:N/AC:H/AU:S/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: HIGH
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2024-6528
baseSeverity: MEDIUM
baseScore: 6.1
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 2.7
version: 3.1

Trust: 1.0

cybersecurity@se.com: CVE-2024-6528
baseSeverity: MEDIUM
baseScore: 5.4
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 2.3
impactScore: 2.7
version: 3.1

Trust: 1.0

NVD: CVE-2024-6528
baseSeverity: MEDIUM
baseScore: 6.1
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2024-32452 // JVNDB: JVNDB-2024-004305 // NVD: CVE-2024-6528 // NVD: CVE-2024-6528

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.0

problemtype:Cross-site scripting (CWE-79) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2024-004305 // NVD: CVE-2024-6528

PATCH

title:Patch for Schneider Electric (China) Co., Ltd. TM241CE24T_U has an XSS vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/583351

Trust: 0.6

sources: CNVD: CNVD-2024-32452

EXTERNAL IDS

db:NVDid:CVE-2024-6528

Trust: 3.2

db:SCHNEIDERid:SEVD-2024-191-04

Trust: 1.8

db:ICS CERTid:ICSA-24-354-07

Trust: 0.8

db:JVNid:JVNVU92082022

Trust: 0.8

db:JVNDBid:JVNDB-2024-004305

Trust: 0.8

db:CNVDid:CNVD-2024-32452

Trust: 0.6

sources: CNVD: CNVD-2024-32452 // JVNDB: JVNDB-2024-004305 // NVD: CVE-2024-6528

REFERENCES

url:https://download.schneider-electric.com/files?p_doc_ref=sevd-2024-191-04&p_endoctype=security+and+safety+notice&p_file_name=sevd-2024-191-04.pdf

Trust: 1.8

url:https://jvn.jp/vu/jvnvu92082022/index.html

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2024-6528

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-24-354-07

Trust: 0.8

sources: JVNDB: JVNDB-2024-004305 // NVD: CVE-2024-6528

SOURCES

db:CNVDid:CNVD-2024-32452
db:JVNDBid:JVNDB-2024-004305
db:NVDid:CVE-2024-6528

LAST UPDATE DATE

2024-12-24T22:57:36.636000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2024-32452date:2024-08-20T00:00:00
db:JVNDBid:JVNDB-2024-004305date:2024-12-23T03:27:00
db:NVDid:CVE-2024-6528date:2024-07-12T16:37:20.283

SOURCES RELEASE DATE

db:CNVDid:CNVD-2024-32452date:2024-08-20T00:00:00
db:JVNDBid:JVNDB-2024-004305date:2024-07-16T00:00:00
db:NVDid:CVE-2024-6528date:2024-07-11T09:15:04.867