CVE-2020-7564
high-risk
Published 2020-11-18
A CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability exists in the Web Server on Modicon M340, Modicon Quantum and Modicon Premium Legacy offers and their Communication Modules (see notification for details) which could cause write access and the execution of commands when uploading a specially crafted file on the controller over FTP.
Do I need to act?
~
1.2% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.8/10
High
NETWORK
/ LOW complexity
Affected Products (20)
Modicon Tsxety4103 Firmware
Modicon Tsxety5103 Firmware
Modicon Tsxp574634 Firmware
Modicon Tsxp575634 Firmware
Modicon Tsxp576634 Firmware
Modicon Quantum 140Noe77101 Firmware
Modicon Quantum 140Noe77111 Firmware
Modicon Quantum 140Noc78100 Firmware
Modicon Quantum 140Cpu65150 Firmware
Modicon Quantum 140Cpu65150C Firmware
Modicon Quantum 140Cpu65160C Firmware
Modicon Quantum 140Cpu65160 Firmware
Modicon M340 Bmx P34-2010 Firmware
Modicon M340 Bmx P34-2030 Firmware
Modicon M340 Bmx Noc 0401 Firmware
Modicon M340 Bmx Noe 0100 Firmware
Modicon M340 Bmx Noe 0100H Firmware
Modicon M340 Bmx Noe 0110 Firmware
Modicon M340 Bmx Noe 0110H Firmware
Modicon M340 Bmx Nor 0200H Firmware
Affected Vendors
References (2)
Vendor Advisory
https://www.se.com/ww/en/download/document/SEVD-2020-315-01/
Vendor Advisory
https://www.se.com/ww/en/download/document/SEVD-2020-315-01/
54
/ 100
high-risk
Severity
30/34 · Critical
Exploitability
4/34 · Minimal
Exposure
20/34 · Moderate