CVE-2017-6026
high-risk
Published 2017-06-30
A Use of Insufficiently Random Values issue was discovered in Schneider Electric Modicon PLCs Modicon M241, firmware versions prior to Version 4.0.5.11, and Modicon M251, firmware versions prior to Version 4.0.5.11. The session numbers generated by the web application are lacking randomization and are shared between several users. This may allow a current session to be compromised.
Do I need to act?
!
18.6% chance of exploitation in next 30 days
EPSS score — higher than 81% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
!
1 public exploit available
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.1/10
Critical
NETWORK
/ LOW complexity
Affected Products (2)
Modicon M251 Firmware
Modicon M241 Firmware
Affected Vendors
References (6)
Third Party Advisory
http://www.securityfocus.com/bid/97254
Third Party Advisory
https://ics-cert.us-cert.gov/advisories/ICSA-17-089-02
Third Party Advisory
http://www.securityfocus.com/bid/97254
Third Party Advisory
https://ics-cert.us-cert.gov/advisories/ICSA-17-089-02
51
/ 100
high-risk
Severity
31/34 · Critical
Exploitability
13/34 · Low
Exposure
7/34 · Low