Vulnerability Details : CVE-2017-7575
Potential exploit
Schneider Electric Modicon TM221CE16R 1.3.3.3 devices allow remote attackers to discover the application-protection password via a \x00\x01\x00\x00\x00\x05\x01\x5a\x00\x03\x00 request to the Modbus port (502/tcp). Subsequently the application may be arbitrarily downloaded, modified, and uploaded.
Vulnerability category: Information leak
Products affected by CVE-2017-7575
- cpe:2.3:o:schneider-electric:modicon_tm221ce16r_firmware:1.3.3.3:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-7575
3.38%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 87 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-7575
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST | |
9.8
|
CRITICAL | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2017-7575
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-7575
-
http://www.securityfocus.com/bid/97523
Schneider Electric Modicon CVE-2017-7575 Information Disclosure VulnerabilityThird Party Advisory;VDB Entry
-
https://os-s.net/advisories/OSS-2017-01.pdf
Exploit;Third Party Advisory
-
http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2017-097-02
Jump to