CVE-2018-7241
high-risk
Published 2018-04-18
Hard coded accounts exist in Schneider Electric's Modicon Premium, Modicon Quantum, Modicon M340, and BMXNOR0200 controllers in all versions of the communication modules.
Do I need to act?
-
0.55% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (20)
Bmxnor0200 Firmware
Bmxnor0200H Firmware
140Cpu31110 Firmware
140Cpu43412U Firmware
140Cpu65160 Firmware
140Cpu65260 Firmware
140Cpu65860 Firmware
140Cpu65160S Firmware
140Cpu65150C Firmware
140Cpu31110C Firmware
140Cpu43412Uc Firmware
140Cpu65160C Firmware
140Cpu65260C Firmware
140Cpu65860C Firmware
Modicon M340 Bmxp3420102Cl Firmware
Affected Vendors
References (6)
Third Party Advisory
http://www.securityfocus.com/bid/103542
Third Party Advisory
https://ics-cert.us-cert.gov/advisories/ICSA-18-086-01
Third Party Advisory
http://www.securityfocus.com/bid/103542
Third Party Advisory
https://ics-cert.us-cert.gov/advisories/ICSA-18-086-01
60
/ 100
high-risk
Severity
32/34 · Critical
Exploitability
2/34 · Minimal
Exposure
26/34 · High