Vulnerability Description
An Authentication Bypass by Capture-Replay issue was discovered in Schneider Electric Modicon Modbus Protocol. Sensitive information is transmitted in cleartext in the Modicon Modbus protocol, which may allow an attacker to replay the following commands: run, stop, upload, and download.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Schneider-Electric | Modbus Firmware | - |
| Schneider-Electric | Modbus | - |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/97562Third Party AdvisoryVDB Entry
- https://ics-cert.us-cert.gov/advisories/ICSA-17-101-01Third Party AdvisoryUS Government Resource
- http://www.securityfocus.com/bid/97562Third Party AdvisoryVDB Entry
- https://ics-cert.us-cert.gov/advisories/ICSA-17-101-01Third Party AdvisoryUS Government Resource
FAQ
What is CVE-2017-6034?
CVE-2017-6034 is a vulnerability with a CVSS score of 9.8 (CRITICAL). An Authentication Bypass by Capture-Replay issue was discovered in Schneider Electric Modicon Modbus Protocol. Sensitive information is transmitted in cleartext in the Modicon Modbus protocol, which m...
How severe is CVE-2017-6034?
CVE-2017-6034 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2017-6034?
Check the references section above for vendor advisories and patch information. Affected products include: Schneider-Electric Modbus Firmware, Schneider-Electric Modbus.