Vulnerability Description
Schneider Electric Modicon TM221CE16R 1.3.3.3 devices allow remote attackers to discover the application-protection password via a \x00\x01\x00\x00\x00\x05\x01\x5a\x00\x03\x00 request to the Modbus port (502/tcp). Subsequently the application may be arbitrarily downloaded, modified, and uploaded.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Schneider-Electric | Modicon Tm221Ce16R Firmware | 1.3.3.3 |
| Schneider-Electric | Modicon Tm221Ce16R | - |
Related Weaknesses (CWE)
References
- http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2017-097-02
- http://www.securityfocus.com/bid/97523Third Party AdvisoryVDB Entry
- https://os-s.net/advisories/OSS-2017-01.pdfExploitThird Party Advisory
- http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2017-097-02
- http://www.securityfocus.com/bid/97523Third Party AdvisoryVDB Entry
- https://os-s.net/advisories/OSS-2017-01.pdfExploitThird Party Advisory
FAQ
What is CVE-2017-7575?
CVE-2017-7575 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Schneider Electric Modicon TM221CE16R 1.3.3.3 devices allow remote attackers to discover the application-protection password via a \x00\x01\x00\x00\x00\x05\x01\x5a\x00\x03\x00 request to the Modbus po...
How severe is CVE-2017-7575?
CVE-2017-7575 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2017-7575?
Check the references section above for vendor advisories and patch information. Affected products include: Schneider-Electric Modicon Tm221Ce16R Firmware, Schneider-Electric Modicon Tm221Ce16R.