Vulnerability Details : CVE-2018-7830
Potential exploit
Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting') vulnerability exists in the embedded web servers in all Modicon M340, Premium, Quantum PLCs and BMXNOR0200 where a denial of service can occur for ~1 minute by sending a specially crafted HTTP request.
Vulnerability category: Denial of service
Products affected by CVE-2018-7830
- cpe:2.3:o:schneider-electric:modicom_m340_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:schneider-electric:modicom_premium_firmware:*:*:*:*:*:*:*:*When used together with: Schneider-electric » Modicom Premium
- cpe:2.3:o:schneider-electric:modicom_quantum_firmware:*:*:*:*:*:*:*:*When used together with: Schneider-electric » Modicom Quantum
- cpe:2.3:o:schneider-electric:modicom_bmxnor0200h_firmware:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-7830
2.67%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 84 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-7830
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2018-7830
-
The product receives data from an HTTP agent/component (e.g., web server, proxy, browser, etc.), but it does not neutralize or incorrectly neutralizes CR and LF characters before the data is included in outgoing HTTP headers.Assigned by: nvd@nist.gov (Primary)
References for CVE-2018-7830
-
https://www.schneider-electric.com/en/download/document/SEVD-2018-327-01/
Security Notification - Embedded Web Servers for Modicon V2.2 | Schneider ElectricVendor Advisory
-
https://www.tenable.com/security/research/tra-2018-38
[R1] Multiple Schneider Electric Modicon Quantum Vulnerabilities - Research Advisory | Tenable®Exploit;Third Party Advisory
Jump to