Authentication Bypass in Schneider Electric Modicon Modbus Protocol
CVE-2017-6034
9.8CRITICAL
Summary
The Schneider Electric Modicon Modbus Protocol is susceptible to an authentication bypass due to a capture-replay vulnerability. Sensitive information, including commands for operation such as run, stop, upload, and download, is transmitted in cleartext format. This flaw enables a potential attacker to gain unauthorized access and execute these commands without proper authentication, posing severe risks to system integrity and confidentiality.
Affected Version(s)
Schneider Electric Modicon Modbus Protocol Schneider Electric Modicon Modbus Protocol
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved