HIGH · 7.5

CVE-2018-7833

An Improper Check for Unusual or Exceptional Conditions vulnerability exists in the embedded web servers in all Modicon M340, Premium, Quantum PLCs and BMXNOR0200 where an unauthenticated user can sen...

Vulnerability Description

An Improper Check for Unusual or Exceptional Conditions vulnerability exists in the embedded web servers in all Modicon M340, Premium, Quantum PLCs and BMXNOR0200 where an unauthenticated user can send a specially crafted XML data via a POST request to cause the web server to become unavailable

CVSS Score

7.5

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
NONE
Availability
HIGH

Affected Products

VendorProductVersions
Schneider-ElectricModicom M340 FirmwareAll versions
Schneider-ElectricModicom M340-
Schneider-ElectricModicom Premium FirmwareAll versions
Schneider-ElectricModicom PremiumAll versions
Schneider-ElectricModicom Quantum FirmwareAll versions
Schneider-ElectricModicom QuantumAll versions
Schneider-ElectricModicom Bmxnor0200H FirmwareAll versions
Schneider-ElectricModicom Bmxnor0200H-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2018-7833?

CVE-2018-7833 is a vulnerability with a CVSS score of 7.5 (HIGH). An Improper Check for Unusual or Exceptional Conditions vulnerability exists in the embedded web servers in all Modicon M340, Premium, Quantum PLCs and BMXNOR0200 where an unauthenticated user can sen...

How severe is CVE-2018-7833?

CVE-2018-7833 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2018-7833?

Check the references section above for vendor advisories and patch information. Affected products include: Schneider-Electric Modicom M340 Firmware, Schneider-Electric Modicom M340, Schneider-Electric Modicom Premium Firmware, Schneider-Electric Modicom Premium, Schneider-Electric Modicom Quantum Firmware.