Unauthorized Modbus Packet Could Lead to Denial of Service and Loss of Confidentiality and Integrity
CVE-2024-11737

9.8CRITICAL

Key Information:

What is CVE-2024-11737?

CVE-2024-11737 is a vulnerability identified in Schneider Electric’s products that utilize the Modbus protocol for communication. This vulnerability arises from improper input validation, enabling an unauthenticated attacker to send crafted Modbus packets to the affected devices. The exploitation of this vulnerability could lead to a denial of service, as well as the compromise of the confidentiality and integrity of the device’s operations. Organizations relying on Schneider Electric’s solutions for industrial control and automation may face operational downtime and potential data breaches due to this flaw.

Technical Details

The vulnerability classified under CWE-20 reflects a failure in validating user inputs effectively. Specifically, when crafted Modbus packets are sent without proper authentication checks, it can disrupt the normal functioning of the device. The vulnerability does not necessitate prior access to the network, allowing remote attackers to exploit it easily. This opens up channels for various attack vectors, making the system susceptible to manipulation and disruption.

Potential impact of CVE-2024-11737

  1. Denial of Service: Attackers can exploit this vulnerability to send crafted packets that disrupt the device's normal operations, leading to service outages and interruptions in critical processes.

  2. Loss of Confidentiality: Exploitation may allow unauthorized access to sensitive information processed by the device, compromising data confidentiality and potentially exposing trade secrets or operational details.

  3. Integrity Compromise: The ability to manipulate device inputs can result in integrity issues, where data can be altered or corrupted. This could affect the reliability of control systems and lead to incorrect operations or system failures in industrial environments.

Affected Version(s)

Modicon Controllers M241 / M251 All versions

Modicon Controllers M258 / LMC058 All versions

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.