Authentication Bypass in Schneider Electric Modicon Modbus Protocol
CVE-2017-6034

9.8CRITICAL

Key Information:

Vendor
CVE Published:
30 June 2017

Summary

The Schneider Electric Modicon Modbus Protocol is susceptible to an authentication bypass due to a capture-replay vulnerability. Sensitive information, including commands for operation such as run, stop, upload, and download, is transmitted in cleartext format. This flaw enables a potential attacker to gain unauthorized access and execute these commands without proper authentication, posing severe risks to system integrity and confidentiality.

Affected Version(s)

Schneider Electric Modicon Modbus Protocol Schneider Electric Modicon Modbus Protocol

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.