漏洞信息详情
多款Schneider Electric产品安全漏洞
- CNNVD编号:CNNVD-201910-395 <!--
- 危害等级: 中危-->
- 危害等级: 中危
- CVE编号: CVE-2019-6847
- 漏洞类型: 其他
- 发布时间: 2019-10-08
- 威胁类型: 远程
- 更新时间: 2021-04-20
- 厂 商:
- 漏洞来源: H, len(clientname) + 9) transid = struct.pack(>H, random.randint(1, 255)) msg = {}x00x00{}x00x5ax00x10x3bx0ex00x00{}{}.format(transid, mbapLen, clientnameLen, clientname) s.send(msg) try: uri = http://{}/rest/umas/getcominfo.format(rhost) resp = requests.get(uri, timeout=5) except requests.exceptions.ReadTimeout: print([*] Request timed out. This usually indicates a device fault) except KeyboardInterrupt: print([*] Exiting...) s.close()if __name__ == '__main__': main() Timeline 2019-06-21 - Vendor Disclosure 2019-08-29 - Vendor requested to reject issue 2019-09-03 - Talos provided additional feedback to substantiate vulnerability 2019-09-20 - Vendor acknowledged issue as vulnerability & advised plan for October 2019 disclosure 2019-10-08 - Public Release Credit Discovered by Jared Rittle of Cisco Talos,Discovered by Jared Rittle and Patrick DeSantis of Cisco Talos ');">Discovered by Jare...
-
漏洞简介
Schneider Electric Modicon M580是法国施耐德电气(Schneider Electric)公司的一款可编程自动化控制器。
多款Schneider产品中存在安全漏洞。该漏洞源于程序使用与应用程序不兼容的版本升级固件。攻击者可利用该漏洞对FTP服务造成拒绝服务攻击。以下产品及版本受到影响:Schneider Electric Modicon M580;Modicon M340;Modicon BMxCRA模块(所有版本);Modicon 140CRA模块(所有版本)。
漏洞公告
目前厂商暂未发布修复措施解决此安全问题,建议使用此软件的用户随时关注厂商主页或参考网址以获取解决办法:
https://www.schneider-electric.com
参考网址
来源:MISC
链接:https://www.se.com/ww/en/download/document/SEVD-2019-281-02/
来源:www.schneider-electric.com
链接:https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-281-02
来源:www.talosintelligence.com
链接:https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0847
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2019-6847
受影响实体
暂无
补丁
暂无
还没有评论,来说两句吧...