Unauthorized Modbus Packet Could Lead to Denial of Service and Loss of Confidentiality and Integrity
CVE-2024-11737
Key Information:
- Vendor
- Schneider Electric
- Vendor
- CVE Published:
- 11 December 2024
What is CVE-2024-11737?
CVE-2024-11737 is a vulnerability identified in Schneider Electric’s products that utilize the Modbus protocol for communication. This vulnerability arises from improper input validation, enabling an unauthenticated attacker to send crafted Modbus packets to the affected devices. The exploitation of this vulnerability could lead to a denial of service, as well as the compromise of the confidentiality and integrity of the device’s operations. Organizations relying on Schneider Electric’s solutions for industrial control and automation may face operational downtime and potential data breaches due to this flaw.
Technical Details
The vulnerability classified under CWE-20 reflects a failure in validating user inputs effectively. Specifically, when crafted Modbus packets are sent without proper authentication checks, it can disrupt the normal functioning of the device. The vulnerability does not necessitate prior access to the network, allowing remote attackers to exploit it easily. This opens up channels for various attack vectors, making the system susceptible to manipulation and disruption.
Potential impact of CVE-2024-11737
-
Denial of Service: Attackers can exploit this vulnerability to send crafted packets that disrupt the device's normal operations, leading to service outages and interruptions in critical processes.
-
Loss of Confidentiality: Exploitation may allow unauthorized access to sensitive information processed by the device, compromising data confidentiality and potentially exposing trade secrets or operational details.
-
Integrity Compromise: The ability to manipulate device inputs can result in integrity issues, where data can be altered or corrupted. This could affect the reliability of control systems and lead to incorrect operations or system failures in industrial environments.
Affected Version(s)
Modicon Controllers M241 / M251 All versions
Modicon Controllers M258 / LMC058 All versions
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved