var-202012-1384
Vulnerability from variot
A CWE-754: Improper Check for Unusual or Exceptional Conditions vulnerability exists in the Web Server on Modicon M340, Legacy Offers Modicon Quantum and Modicon Premium and associated Communication Modules (see security notification for affected versions), that could cause denial of HTTP and FTP services when a series of specially crafted requests is sent to the controller over HTTP. plural Schneider Electric The product contains a vulnerability related to checking for exceptional conditions.Denial of service (DoS) It may be put into a state. Schneider Electric Modicon M340 is a medium-range PLC (Programmable Logic Controller) of French Schneider Electric (Schneider Electric) for industrial processes and infrastructure.
Schneider Electric Modicon M340 has a code issue vulnerability. Attackers can use the vulnerability to make HTTP and FTP services deny when a request for preparation is sent to the controller via HTTP
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202012-1384", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "bmxnoe0110", "scope": "lt", "trust": 1.0, "vendor": "schneider electric", "version": "6.6" }, { "model": "140cpu65150", "scope": "eq", "trust": 1.0, "vendor": "schneider electric", "version": "*" }, { "model": "tsxety4103", "scope": "eq", "trust": 1.0, "vendor": "schneider electric", "version": "*" }, { "model": "tsxety5103", "scope": "eq", "trust": 1.0, "vendor": "schneider electric", "version": "*" }, { "model": "modicon m340 bmxp3420102", "scope": "lt", "trust": 1.0, "vendor": "schneider electric", "version": "3.30" }, { "model": "modicon m340 bmxp3420302", "scope": "lt", "trust": 1.0, "vendor": "schneider electric", "version": "3.30" }, { "model": "tsxp575634", "scope": "eq", "trust": 1.0, "vendor": "schneider electric", "version": "*" }, { "model": "modicon m340 bmxp342020", "scope": "lt", "trust": 1.0, "vendor": "schneider electric", "version": "3.30" }, { "model": "modicon m340 bmxp341000", "scope": "lt", "trust": 1.0, "vendor": "schneider electric", "version": "3.30" }, { "model": "bmxnoe0100", "scope": "lt", "trust": 1.0, "vendor": "schneider electric", "version": "3.4" }, { "model": "tsxp576634", "scope": "eq", "trust": 1.0, "vendor": "schneider electric", "version": "*" }, { "model": "modicon m340 bmxp3420102cl", "scope": "lt", "trust": 1.0, "vendor": "schneider electric", "version": "3.30" }, { "model": "140noc78100", "scope": "eq", "trust": 1.0, "vendor": "schneider electric", "version": "*" }, { "model": "140noc78000", "scope": "eq", "trust": 1.0, "vendor": "schneider electric", "version": "*" }, { "model": "modicon m340 bmxp3420302cl", "scope": "lt", "trust": 1.0, "vendor": "schneider electric", "version": "3.30" }, { "model": "bmxnoc0401", "scope": "eq", "trust": 1.0, "vendor": "schneider electric", "version": "*" }, { "model": "140noe77111", "scope": "lt", "trust": 1.0, "vendor": "schneider electric", "version": "7.3" }, { "model": "tsxp574634", "scope": "eq", "trust": 1.0, "vendor": "schneider electric", "version": "*" }, { "model": "modicon m340 bmxp342000", "scope": "lt", "trust": 1.0, "vendor": "schneider electric", "version": "3.30" }, { "model": "bmxnoc0401", "scope": null, "trust": 0.8, "vendor": "schneider electric", "version": null }, { "model": "bmxnoe0110", "scope": null, "trust": 0.8, "vendor": "schneider electric", "version": null }, { "model": "bmxp3420102", "scope": null, "trust": 0.8, "vendor": "schneider electric", "version": null }, { "model": "bmxp3420302cl", "scope": null, "trust": 0.8, "vendor": "schneider electric", "version": null }, { "model": "bmxp3420102cl", "scope": null, "trust": 0.8, "vendor": "schneider electric", "version": null }, { "model": "bmxp342020", "scope": null, "trust": 0.8, "vendor": "schneider electric", "version": null }, { "model": "bmxp342000", "scope": null, "trust": 0.8, "vendor": "schneider electric", "version": null }, { "model": "bmxp341000", "scope": null, "trust": 0.8, "vendor": "schneider electric", "version": null }, { "model": "bmxp3420302", "scope": null, "trust": 0.8, "vendor": "schneider electric", "version": null }, { "model": "bmxnoe0100", "scope": null, "trust": 0.8, "vendor": "schneider electric", "version": null }, { "model": "electric modicon m340", "scope": null, "trust": 0.6, "vendor": "schneider", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-46283" }, { "db": "JVNDB", "id": "JVNDB-2020-014322" }, { "db": "NVD", "id": "CVE-2020-7549" } ] }, "cve": "CVE-2020-7549", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2020-7549", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2021-46283", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2020-7549", "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "Low", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2020-7549", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-7549", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2020-7549", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2021-46283", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202012-939", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-46283" }, { "db": "JVNDB", "id": "JVNDB-2020-014322" }, { "db": "CNNVD", "id": "CNNVD-202012-939" }, { "db": "NVD", "id": "CVE-2020-7549" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A CWE-754: Improper Check for Unusual or Exceptional Conditions vulnerability exists in the Web Server on Modicon M340, Legacy Offers Modicon Quantum and Modicon Premium and associated Communication Modules (see security notification for affected versions), that could cause denial of HTTP and FTP services when a series of specially crafted requests is sent to the controller over HTTP. plural Schneider Electric The product contains a vulnerability related to checking for exceptional conditions.Denial of service (DoS) It may be put into a state. Schneider Electric Modicon M340 is a medium-range PLC (Programmable Logic Controller) of French Schneider Electric (Schneider Electric) for industrial processes and infrastructure. \n\r\n\r\nSchneider Electric Modicon M340 has a code issue vulnerability. Attackers can use the vulnerability to make HTTP and FTP services deny when a request for preparation is sent to the controller via HTTP", "sources": [ { "db": "NVD", "id": "CVE-2020-7549" }, { "db": "JVNDB", "id": "JVNDB-2020-014322" }, { "db": "CNVD", "id": "CNVD-2021-46283" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-7549", "trust": 3.0 }, { "db": "SCHNEIDER", "id": "SEVD-2020-343-06", "trust": 1.6 }, { "db": "JVNDB", "id": "JVNDB-2020-014322", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2021-46283", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202012-939", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-46283" }, { "db": "JVNDB", "id": "JVNDB-2020-014322" }, { "db": "CNNVD", "id": "CNNVD-202012-939" }, { "db": "NVD", "id": "CVE-2020-7549" } ] }, "id": "VAR-202012-1384", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2021-46283" } ], "trust": 1.5935065 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-46283" } ] }, "last_update_date": "2024-11-23T22:16:10.514000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SEVD-2020-343-06", "trust": 0.8, "url": "https://www.se.com/ww/en/download/document/SEVD-2020-343-06/" }, { "title": "Patch for Schneider Electric Modicon M340 code issue vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/276471" }, { "title": "Schneider Electric Modicon M340 Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=136601" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-46283" }, { "db": "JVNDB", "id": "JVNDB-2020-014322" }, { "db": "CNNVD", "id": "CNNVD-202012-939" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-754", "trust": 1.0 }, { "problemtype": "Improper checking in exceptional conditions (CWE-754) [ Other ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-014322" }, { "db": "NVD", "id": "CVE-2020-7549" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.6, "url": "https://www.se.com/ww/en/download/document/sevd-2020-343-06/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-7549" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-46283" }, { "db": "JVNDB", "id": "JVNDB-2020-014322" }, { "db": "CNNVD", "id": "CNNVD-202012-939" }, { "db": "NVD", "id": "CVE-2020-7549" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2021-46283" }, { "db": "JVNDB", "id": "JVNDB-2020-014322" }, { "db": "CNNVD", "id": "CNNVD-202012-939" }, { "db": "NVD", "id": "CVE-2020-7549" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-07-01T00:00:00", "db": "CNVD", "id": "CNVD-2021-46283" }, { "date": "2021-08-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-014322" }, { "date": "2020-12-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202012-939" }, { "date": "2020-12-11T01:15:12.627000", "db": "NVD", "id": "CVE-2020-7549" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-07-01T00:00:00", "db": "CNVD", "id": "CNVD-2021-46283" }, { "date": "2021-08-13T08:50:00", "db": "JVNDB", "id": "JVNDB-2020-014322" }, { "date": "2020-12-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202012-939" }, { "date": "2024-11-21T05:37:21.663000", "db": "NVD", "id": "CVE-2020-7549" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202012-939" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Schneider\u00a0Electric\u00a0 Product Exceptional Status Check Vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-014322" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202012-939" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.