Predictable Sequence Numbers in Schneider Electric Modicon PLCs
CVE-2017-6030
6.5MEDIUM
Summary
A vulnerability has been identified in Schneider Electric Modicon PLCs where the products generate insufficiently random TCP initial sequence numbers. This predictability may allow attackers to anticipate the sequence numbers from previous values, potentially enabling them to spoof or disrupt TCP connections. The affected products include Modicon M221 (firmware versions before 1.5.0.0), Modicon M241 (versions prior to 4.0.5.11), and Modicon M251 (versions prior to 4.0.5.11). Addressing this issue is critical for maintaining secure communications in industrial environments.
Affected Version(s)
Schneider Electric Modicon PLCs Schneider Electric Modicon PLCs
References
CVSS V3.1
Score:
6.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved