Summary
Detail | |||
---|---|---|---|
Vendor | Schneider-Electric | First view | 2018-04-18 |
Product | tsxp574634mc Firmware | Last view | 2018-04-18 |
Version | Type | Os | |
Update | |||
Edition | |||
Language | |||
Sofware Edition | |||
Target Software | |||
Target Hardware | |||
Other |
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
CPE Name | Affected CVE |
---|---|
cpe:2.3:o:schneider-electric:tsxp574634mc_firmware:-:*:*:*:*:*:*:* | 6 |
Related : CVE
Date | Alert | Description | |
---|---|---|---|
7.5 | 2018-04-18 | CVE-2018-7762 | A vulnerability exists in the web services to process SOAP requests in Schneider Electric's Modicon M340, Modicon Premium, Modicon Quantum PLC, BMXNOR0200 which could allow result in a buffer overflow. |
9.8 | 2018-04-18 | CVE-2018-7761 | A vulnerability exists in the HTTP request parser in Schneider Electric's Modicon M340, Modicon Premium, Modicon Quantum PLC, BMXNOR0200 which could allow arbitrary code execution. |
9.8 | 2018-04-18 | CVE-2018-7760 | An authorization bypass vulnerability exists in Schneider Electric's Modicon M340, Modicon Premium, Modicon Quantum PLC, BMXNOR0200. Requests to CGI functions allow malicious users to bypass authorization. |
7.5 | 2018-04-18 | CVE-2018-7759 | A buffer overflow vulnerability exists in Schneider Electric's Modicon M340, Modicon Premium, Modicon Quantum PLC, BMXNOR0200. The buffer overflow vulnerability is caused by the length of the source string specified (instead of the buffer size) as the number of bytes to be copied. |
9.8 | 2018-04-18 | CVE-2018-7242 | Vulnerable hash algorithms exists in Schneider Electric's Modicon Premium, Modicon Quantum, Modicon M340, and BMXNOR0200 controllers in all versions of the communication modules. The algorithm used to encrypt the password is vulnerable to hash collision attacks. |
9.8 | 2018-04-18 | CVE-2018-7241 | Hard coded accounts exist in Schneider Electric's Modicon Premium, Modicon Quantum, Modicon M340, and BMXNOR0200 controllers in all versions of the communication modules. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
33% (2) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
16% (1) | CWE-798 | Use of Hard-coded Credentials |
16% (1) | CWE-326 | Inadequate Encryption Strength |
16% (1) | CWE-287 | Improper Authentication |
16% (1) | CWE-20 | Improper Input Validation |