SlideShare a Scribd company logo
1 of 5
Download to read offline
Schneider Electric Security Notification
23-Nov-18 (08-Oct-19) Document Reference Number – SEVD-2018-327-01 V3.0 Page 1 of 5
Security Notification – Embedded Web Servers for Modicon (V3.0)
23 November 2018 (08 October 2019)
Overview
Schneider Electric is aware of multiple vulnerabilities in the HTTP (web) server of its Modicon
family of programmable logic controllers. Users are advised to take the necessary steps to
secure their PLCs.
Failure to address these vulnerabilities could result in unauthorized access to the controllers,
denial of service and/or other malicious activity.
Affected Product(s)
The products affected include all Modicon M340, Premium, Quantum PLCs and BMXNOR0200
controllers.
Vulnerability Details
CVE ID: CVE-2018-7811
CVSS v3.0 Base Score 9.8 | (Critical) | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
A CWE-620: Unverified Password Change vulnerability exists on the embedded web server
which could allow an unauthenticated remote user to access the “change password” function of
the web server.
CVE ID: CVE-2018-7809
CVSS v3.0 Base Score 6.5 | (Medium) | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
A CWE-620: Unverified Password Change vulnerability exists, which could allow an
unauthenticated remote user to access the “password delete” function of the web server.
CVE ID: CVE-2018-7810
CVSS v3.0 Base Score 6.1 | (Medium) | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
A CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site
Scripting') vulnerability exists, which could allow an attacker to craft a URL containing
Schneider Electric Security Notification
23-Nov-18 (08-Oct-19) Document Reference Number – SEVD-2018-327-01 V3.0 Page 2 of 5
JavaScript that would be executed within the user’s browser, potentially impacting the machine
the browser is running on.
CVE ID: CVE-2018-7831
CVSS v3.0 Base Score 5.4 | (Medium) | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
A CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
vulnerability exists, which could allow an attacker to send a specially crafted URL to a currently
authenticated web server user to execute a password change on the web server.
CVE ID: CVE-2018-7830
CVSS v3.0 Base Score 5.3 | (Medium) | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
A CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response
Splitting') vulnerability exists, where a denial of service can occur for ~1 minute by sending a
specially crafted HTTP request.
CVE ID: CVE-2018-7804
CVSS v3.0 Base Score 4.7 | (Medium) | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L
A CWE-601: URL Redirection to Untrusted Site vulnerability exists, where a user clicking on a
specially crafted link can be redirected to a URL of the attacker’s choosing.
CVE ID: CVE-2018-7812
CVSS v3.0 Base Score 5.3 | (Medium) | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
A CWE-203: Information Exposure Through Discrepancy vulnerability exists, where the web
server sends different responses in a way that exposes security-relevant information about the
state of the product, such as whether a particular operation was successful or not.
CVE ID: CVE-2018-7833
CVSS v3.0 Base Score 7.5 | (Medium) | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
A CWE-754: Improper Check for Unusual or Exceptional Conditions vulnerability exists, where
an unauthenticated user can send a specially crafted XML data via a POST request to cause
the web server to become unavailable.
Remediation
Schneider Electric recommends customers follow the instructions outlined in the Modicon
Controllers Platform Cyber Security Reference Manual to install Modicon PLCs securely.
Schneider Electric Security Notification
23-Nov-18 (08-Oct-19) Document Reference Number – SEVD-2018-327-01 V3.0 Page 3 of 5
Customers are advised that the web server is disabled by default. Because web services are
only necessary for specific maintenance, configuration or monitoring activities, it is advised to
disable web services all together during times when the services are not needed.
Customers are also advised to:
• Configure access control lists to restrict web server access to authorized IP addresses;
• Protect access to Modicon products with network, industrial, and application firewalls.
Fixes for CVE-2018-7833 and CVE-2018-7804
• The vulnerabilities are fixed for M340 controller in the version V3.20. The fix is available
for download below:
M340 V3.20 firmware
BMXP3420302 and CL
and H
https://www.schneider-
electric.com/en/download/document/BMXP3420302_Firmwares/
BMXP342020 and H
https://www.schneider-
electric.com/en/download/document/BMXP342020_Firmwares/
BMXP342000
https://www.schneider-
electric.com/en/download/document/BMXP342000_Firmwares/
BMXP341000 and H
https://www.schneider-
electric.com/en/download/document/BMXP341000_Firmwares/
BMXP3420102 and CL
https://www.schneider-
electric.com/en/download/document/BMXP3420102_Firmwares/
General Security Recommendations
We strongly recommend following industry cybersecurity best practices such as:
• Locate control and safety system networks and remote devices behind firewalls, and
isolate them from the business network.
• Physical controls should be in place so that no unauthorized person would have access
to the ICS and safety controllers, peripheral equipment or the ICS and safety networks.
• All controllers should reside in locked cabinets and never be left in the “Program” mode.
• All programming software should be kept in locked cabinets and should never be
connected to any network other than the network for the devices that it is intended.
• All methods of mobile data exchange with the isolated network such as CDs, USB
drives, etc. should be scanned before use in the terminals or any node connected to
these networks.
Schneider Electric Security Notification
23-Nov-18 (08-Oct-19) Document Reference Number – SEVD-2018-327-01 V3.0 Page 4 of 5
• Laptops that have connected to any other network besides the intended network should
never be allowed to connect to the safety or control networks without proper sanitation.
• Minimize network exposure for all control system devices and/or systems, and ensure
that they are not accessible from the Internet.
• When remote access is required, use secure methods, such as Virtual Private Networks
(VPNs), recognizing that VPNs may have vulnerabilities and should be updated to the
most current version available. Also recognize that VPN is only as secure as the
connected devices.
Acknowledgements
Schneider Electric would like to recognize the following researcher(s) for all their efforts related
to identification and coordination of this vulnerability:
CVE Researcher(s) Name
CVE-2018-7809, CVE-2018-7810,
CVE-2018-7830, CVE-2018-7831
Tenable, Inc.
CVE-2018-7811
Tenable, Inc. and VAPT Team/C3i Center (IIT
Kanpur, India)
CVE-2018-7812 David Castro, Head of Red Team at Novared Spain
CVE-2018-7804 Ismail Tasdelen
CVE-2018-7833
Qingtang Zheng (CodeSafe Team of Legendsec at
Qi'anxin Group)
For More Information
This document provides an overview of the identified vulnerability or vulnerabilities and actions
required to mitigate. For more details and assistance on how to protect your installation, please
contact your local Schneider Electric representative and/or Schneider Electric Industrial
Cybersecurity Services. These organizations will be fully aware of this situation and can support
you through the process.
http://www2.schneider-electric.com/sites/corporate/en/support/cybersecurity/cybersecurity.page
https://www.schneider-electric.com/en/work/services/field-services/industrial-
automation/industrial-cybersecurity/industrial-cybersecurity.jsp
Legal Disclaimer
THIS DOCUMENT IS INTENDED TO HELP PROVIDE AN OVERVIEW OF THE IDENTIFIED SITUATION AND
SUGGESTED MITIGATION ACTIONS, REMEDIATION, FIX, AND/OR GENERAL SECURITY RECOMMENDATIONS
AND IS PROVIDED ON AN “AS-IS” BASIS WITHOUT WARRANTY OF ANY KIND. SCHNEIDER ELECTRIC
Schneider Electric Security Notification
23-Nov-18 (08-Oct-19) Document Reference Number – SEVD-2018-327-01 V3.0 Page 5 of 5
DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL SCHNEIDER ELECTRIC
BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL,
CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF SCHNEIDER ELECTRIC
HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. THE USE OF THIS NOTIFICATION,
INFORMATION CONTAINED HEREIN, OR MATERIALS LINKED TO IT ARE AT YOUR OWN RISK. SCHNEIDER
ELECTRIC RESERVES THE RIGHT TO UPDATE OR CHANGE THIS NOTIFICATION AT ANY TIME AND IN ITS
SOLE DISCRETION.
About Schneider Electric
At Schneider, we believe access to energy and digital is a basic human right. We empower all to do more with less,
ensuring Life Is On everywhere, for everyone, at every moment.
We provide energy and automation digital solutions for efficiency and sustainability. We combine world-leading energy
technologies, real-time automation, software and services into integrated solutions for Homes, Buildings, Data Centers,
Infrastructure and Industries.
We are committed to unleash the infinite possibilities of an open, global, innovative community that is passionate with
our Meaningful Purpose, Inclusive and Empowered values.
www.se.com
Revision Control:
Version 1
23-Nov-2018
Original Release
Version 1.1
28-Nov-2018
CVSS Scores updated for CVE-2018-7811 (page 1) and
CVE-2018-7810 (page 2)
Version 2
13-Dec-2018
Added CVE-2018-7804, CVE-2018-7812, CVE-2018-7833
(page 2 and 3)
Version 2.1
09-May-2019
Added researcher to acknowledgement section for CVE-2018-
7811(page 4)
Version 2.2
11-Jun-2019
CVE-2018-7833 researcher acknowledgment updated
Version 3.0
08-Oct-2019
CVE-2018-7833 - Fix available for M340 controller
CVE-2018-7804 - Fix available for M340 controller
(page 3)
Product Security Office Digitally signed by Product Security Office
Date: 2019.10.04 18:14:16 -04'00'

More Related Content

What's hot

Make things come alive in a secure way - Sigfox
Make things come alive in a secure way - SigfoxMake things come alive in a secure way - Sigfox
Make things come alive in a secure way - SigfoxSigfox
 
BlackHat 2011 - Exploiting Siemens Simatic S7 PLCs (white paper)
BlackHat 2011 - Exploiting Siemens Simatic S7 PLCs (white paper)BlackHat 2011 - Exploiting Siemens Simatic S7 PLCs (white paper)
BlackHat 2011 - Exploiting Siemens Simatic S7 PLCs (white paper)Michael Smith
 
Managed Vulnerability Scan
Managed Vulnerability ScanManaged Vulnerability Scan
Managed Vulnerability ScanShawn Jordan
 
Building Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and SourcefireBuilding Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and SourcefireGlobal Knowledge Training
 
edgescan vulnerability stats report (2018)
 edgescan vulnerability stats report (2018)  edgescan vulnerability stats report (2018)
edgescan vulnerability stats report (2018) Eoin Keary
 
Cisco me4600 ont_rgw_user_manual_v3_2-4
Cisco me4600 ont_rgw_user_manual_v3_2-4Cisco me4600 ont_rgw_user_manual_v3_2-4
Cisco me4600 ont_rgw_user_manual_v3_2-4bui thequan
 
第7回VEC制御システムサイバーセキュリティカンファレンス
第7回VEC制御システムサイバーセキュリティカンファレンス第7回VEC制御システムサイバーセキュリティカンファレンス
第7回VEC制御システムサイバーセキュリティカンファレンスchomchana trevai
 
Secure Data Center Solution with FP 9300 - BDM
Secure Data Center Solution with FP 9300 - BDMSecure Data Center Solution with FP 9300 - BDM
Secure Data Center Solution with FP 9300 - BDMBill McGee
 
[CLASS 2014] Palestra Técnica - Alexandre Euclides
[CLASS 2014] Palestra Técnica - Alexandre Euclides[CLASS 2014] Palestra Técnica - Alexandre Euclides
[CLASS 2014] Palestra Técnica - Alexandre EuclidesTI Safe
 
Scada Security & Penetration Testing
Scada Security & Penetration TestingScada Security & Penetration Testing
Scada Security & Penetration TestingAhmed Sherif
 
Cisco ASA con fire power services
Cisco ASA con fire power services Cisco ASA con fire power services
Cisco ASA con fire power services Felipe Lamus
 

What's hot (20)

Improving SCADA Security
Improving SCADA SecurityImproving SCADA Security
Improving SCADA Security
 
NGFW RFP TEMPLATE - TEST PLAN
NGFW RFP TEMPLATE - TEST PLANNGFW RFP TEMPLATE - TEST PLAN
NGFW RFP TEMPLATE - TEST PLAN
 
Make things come alive in a secure way - Sigfox
Make things come alive in a secure way - SigfoxMake things come alive in a secure way - Sigfox
Make things come alive in a secure way - Sigfox
 
Mind the gap_cpx2022_moti_sagey_final
Mind the gap_cpx2022_moti_sagey_finalMind the gap_cpx2022_moti_sagey_final
Mind the gap_cpx2022_moti_sagey_final
 
BlackHat 2011 - Exploiting Siemens Simatic S7 PLCs (white paper)
BlackHat 2011 - Exploiting Siemens Simatic S7 PLCs (white paper)BlackHat 2011 - Exploiting Siemens Simatic S7 PLCs (white paper)
BlackHat 2011 - Exploiting Siemens Simatic S7 PLCs (white paper)
 
Managed Vulnerability Scan
Managed Vulnerability ScanManaged Vulnerability Scan
Managed Vulnerability Scan
 
Security architecture proposal template
Security architecture proposal templateSecurity architecture proposal template
Security architecture proposal template
 
The Network as a Sensor, Cisco and Lancope
The Network as a Sensor, Cisco and LancopeThe Network as a Sensor, Cisco and Lancope
The Network as a Sensor, Cisco and Lancope
 
Building Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and SourcefireBuilding Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and Sourcefire
 
edgescan vulnerability stats report (2018)
 edgescan vulnerability stats report (2018)  edgescan vulnerability stats report (2018)
edgescan vulnerability stats report (2018)
 
Cisco me4600 ont_rgw_user_manual_v3_2-4
Cisco me4600 ont_rgw_user_manual_v3_2-4Cisco me4600 ont_rgw_user_manual_v3_2-4
Cisco me4600 ont_rgw_user_manual_v3_2-4
 
第7回VEC制御システムサイバーセキュリティカンファレンス
第7回VEC制御システムサイバーセキュリティカンファレンス第7回VEC制御システムサイバーセキュリティカンファレンス
第7回VEC制御システムサイバーセキュリティカンファレンス
 
Cdi federal 2019
Cdi federal 2019Cdi federal 2019
Cdi federal 2019
 
Talk2 esc4 muscl-ids_v1_2
Talk2 esc4 muscl-ids_v1_2Talk2 esc4 muscl-ids_v1_2
Talk2 esc4 muscl-ids_v1_2
 
Secure Data Center Solution with FP 9300 - BDM
Secure Data Center Solution with FP 9300 - BDMSecure Data Center Solution with FP 9300 - BDM
Secure Data Center Solution with FP 9300 - BDM
 
[CLASS 2014] Palestra Técnica - Alexandre Euclides
[CLASS 2014] Palestra Técnica - Alexandre Euclides[CLASS 2014] Palestra Técnica - Alexandre Euclides
[CLASS 2014] Palestra Técnica - Alexandre Euclides
 
Scada Security & Penetration Testing
Scada Security & Penetration TestingScada Security & Penetration Testing
Scada Security & Penetration Testing
 
Cisco ASA con fire power services
Cisco ASA con fire power services Cisco ASA con fire power services
Cisco ASA con fire power services
 
SCADA Security
SCADA SecuritySCADA Security
SCADA Security
 
Fortinet Broşür
Fortinet BroşürFortinet Broşür
Fortinet Broşür
 

Similar to Schneider Electric Security Notification Security Notification -Embedded Web Servers for Modicon (V3.0)

Unidirectional Network Architectures
Unidirectional Network ArchitecturesUnidirectional Network Architectures
Unidirectional Network ArchitecturesEnergySec
 
Schneider Electric Security Notification - spaceLYnk & Wiser for KNX (formerl...
Schneider Electric Security Notification - spaceLYnk & Wiser for KNX (formerl...Schneider Electric Security Notification - spaceLYnk & Wiser for KNX (formerl...
Schneider Electric Security Notification - spaceLYnk & Wiser for KNX (formerl...Ismail Tasdelen
 
Guideline for the certification of wind turbine service technicians 2015 july
Guideline for the certification of wind turbine service technicians  2015 julyGuideline for the certification of wind turbine service technicians  2015 july
Guideline for the certification of wind turbine service technicians 2015 julyMichael Mattocks
 
Guideline for the Chartered Certification WTSR of Wind Turbine Service Techni...
Guideline for the Chartered Certification WTSR of Wind Turbine Service Techni...Guideline for the Chartered Certification WTSR of Wind Turbine Service Techni...
Guideline for the Chartered Certification WTSR of Wind Turbine Service Techni...Michael Mattocks
 
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...TI Safe
 
IRJET - Implementation of Firewall in a Cooperate Environment
IRJET - Implementation of Firewall in a Cooperate EnvironmentIRJET - Implementation of Firewall in a Cooperate Environment
IRJET - Implementation of Firewall in a Cooperate EnvironmentIRJET Journal
 
Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldAdvanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldCisco Canada
 
7 en02 0330-00
7 en02 0330-007 en02 0330-00
7 en02 0330-00pilyoing
 
De-Authentication attack on wireless network 802.11i using Kali Linux
De-Authentication attack on wireless network 802.11i using Kali LinuxDe-Authentication attack on wireless network 802.11i using Kali Linux
De-Authentication attack on wireless network 802.11i using Kali LinuxIRJET Journal
 
Secure Out Of Band Management - Comm Devices Inc.
Secure Out Of Band Management - Comm Devices Inc.Secure Out Of Band Management - Comm Devices Inc.
Secure Out Of Band Management - Comm Devices Inc.Communication Devices Inc
 
A Diet of Poisoned Fruit: Designing Implants & OT Payloads for ICS Embedded D...
A Diet of Poisoned Fruit: Designing Implants & OT Payloadsfor ICS Embedded D...A Diet of Poisoned Fruit: Designing Implants & OT Payloadsfor ICS Embedded D...
A Diet of Poisoned Fruit: Designing Implants & OT Payloads for ICS Embedded D...Marina Krotofil
 
Securing the Digital Frontier: SecurityGen's Telecom Cybersecurity Solutions
Securing the Digital Frontier: SecurityGen's Telecom Cybersecurity SolutionsSecuring the Digital Frontier: SecurityGen's Telecom Cybersecurity Solutions
Securing the Digital Frontier: SecurityGen's Telecom Cybersecurity SolutionsSecurityGen1
 
Guardians of Connection: Signalling Protection in the Digital Age
Guardians of Connection: Signalling Protection in the Digital AgeGuardians of Connection: Signalling Protection in the Digital Age
Guardians of Connection: Signalling Protection in the Digital AgeSecurityGen1
 
IRJET- Research Paper Firewall- Prevent Unauthorized Users
IRJET- Research Paper Firewall- Prevent Unauthorized UsersIRJET- Research Paper Firewall- Prevent Unauthorized Users
IRJET- Research Paper Firewall- Prevent Unauthorized UsersIRJET Journal
 
Brochure skidweigh Defender
Brochure skidweigh DefenderBrochure skidweigh Defender
Brochure skidweigh DefenderTed Jurca
 
Hydraulische Wiegesysteme
Hydraulische WiegesystemeHydraulische Wiegesysteme
Hydraulische WiegesystemeZeljkoJurca
 
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET Journal
 
[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor Fiorim[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor FiorimTI Safe
 
Protecting the Software-Defined Data Center from Data Breach
Protecting the Software-Defined Data Center from Data BreachProtecting the Software-Defined Data Center from Data Breach
Protecting the Software-Defined Data Center from Data BreachCA Technologies
 

Similar to Schneider Electric Security Notification Security Notification -Embedded Web Servers for Modicon (V3.0) (20)

Unidirectional Network Architectures
Unidirectional Network ArchitecturesUnidirectional Network Architectures
Unidirectional Network Architectures
 
Schneider Electric Security Notification - spaceLYnk & Wiser for KNX (formerl...
Schneider Electric Security Notification - spaceLYnk & Wiser for KNX (formerl...Schneider Electric Security Notification - spaceLYnk & Wiser for KNX (formerl...
Schneider Electric Security Notification - spaceLYnk & Wiser for KNX (formerl...
 
Guideline for the certification of wind turbine service technicians 2015 july
Guideline for the certification of wind turbine service technicians  2015 julyGuideline for the certification of wind turbine service technicians  2015 july
Guideline for the certification of wind turbine service technicians 2015 july
 
Guideline for the Chartered Certification WTSR of Wind Turbine Service Techni...
Guideline for the Chartered Certification WTSR of Wind Turbine Service Techni...Guideline for the Chartered Certification WTSR of Wind Turbine Service Techni...
Guideline for the Chartered Certification WTSR of Wind Turbine Service Techni...
 
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
 
IRJET - Implementation of Firewall in a Cooperate Environment
IRJET - Implementation of Firewall in a Cooperate EnvironmentIRJET - Implementation of Firewall in a Cooperate Environment
IRJET - Implementation of Firewall in a Cooperate Environment
 
Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldAdvanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real World
 
7 en02 0330-00
7 en02 0330-007 en02 0330-00
7 en02 0330-00
 
De-Authentication attack on wireless network 802.11i using Kali Linux
De-Authentication attack on wireless network 802.11i using Kali LinuxDe-Authentication attack on wireless network 802.11i using Kali Linux
De-Authentication attack on wireless network 802.11i using Kali Linux
 
Secure Out Of Band Management - Comm Devices Inc.
Secure Out Of Band Management - Comm Devices Inc.Secure Out Of Band Management - Comm Devices Inc.
Secure Out Of Band Management - Comm Devices Inc.
 
A Diet of Poisoned Fruit: Designing Implants & OT Payloads for ICS Embedded D...
A Diet of Poisoned Fruit: Designing Implants & OT Payloadsfor ICS Embedded D...A Diet of Poisoned Fruit: Designing Implants & OT Payloadsfor ICS Embedded D...
A Diet of Poisoned Fruit: Designing Implants & OT Payloads for ICS Embedded D...
 
Securing the Digital Frontier: SecurityGen's Telecom Cybersecurity Solutions
Securing the Digital Frontier: SecurityGen's Telecom Cybersecurity SolutionsSecuring the Digital Frontier: SecurityGen's Telecom Cybersecurity Solutions
Securing the Digital Frontier: SecurityGen's Telecom Cybersecurity Solutions
 
Guardians of Connection: Signalling Protection in the Digital Age
Guardians of Connection: Signalling Protection in the Digital AgeGuardians of Connection: Signalling Protection in the Digital Age
Guardians of Connection: Signalling Protection in the Digital Age
 
IRJET- Research Paper Firewall- Prevent Unauthorized Users
IRJET- Research Paper Firewall- Prevent Unauthorized UsersIRJET- Research Paper Firewall- Prevent Unauthorized Users
IRJET- Research Paper Firewall- Prevent Unauthorized Users
 
Sprite guard on line brochure
Sprite guard on line brochureSprite guard on line brochure
Sprite guard on line brochure
 
Brochure skidweigh Defender
Brochure skidweigh DefenderBrochure skidweigh Defender
Brochure skidweigh Defender
 
Hydraulische Wiegesysteme
Hydraulische WiegesystemeHydraulische Wiegesysteme
Hydraulische Wiegesysteme
 
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTP
 
[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor Fiorim[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor Fiorim
 
Protecting the Software-Defined Data Center from Data Breach
Protecting the Software-Defined Data Center from Data BreachProtecting the Software-Defined Data Center from Data Breach
Protecting the Software-Defined Data Center from Data Breach
 

Recently uploaded

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 

Recently uploaded (20)

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 

Schneider Electric Security Notification Security Notification -Embedded Web Servers for Modicon (V3.0)

  • 1. Schneider Electric Security Notification 23-Nov-18 (08-Oct-19) Document Reference Number – SEVD-2018-327-01 V3.0 Page 1 of 5 Security Notification – Embedded Web Servers for Modicon (V3.0) 23 November 2018 (08 October 2019) Overview Schneider Electric is aware of multiple vulnerabilities in the HTTP (web) server of its Modicon family of programmable logic controllers. Users are advised to take the necessary steps to secure their PLCs. Failure to address these vulnerabilities could result in unauthorized access to the controllers, denial of service and/or other malicious activity. Affected Product(s) The products affected include all Modicon M340, Premium, Quantum PLCs and BMXNOR0200 controllers. Vulnerability Details CVE ID: CVE-2018-7811 CVSS v3.0 Base Score 9.8 | (Critical) | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H A CWE-620: Unverified Password Change vulnerability exists on the embedded web server which could allow an unauthenticated remote user to access the “change password” function of the web server. CVE ID: CVE-2018-7809 CVSS v3.0 Base Score 6.5 | (Medium) | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L A CWE-620: Unverified Password Change vulnerability exists, which could allow an unauthenticated remote user to access the “password delete” function of the web server. CVE ID: CVE-2018-7810 CVSS v3.0 Base Score 6.1 | (Medium) | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N A CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability exists, which could allow an attacker to craft a URL containing
  • 2. Schneider Electric Security Notification 23-Nov-18 (08-Oct-19) Document Reference Number – SEVD-2018-327-01 V3.0 Page 2 of 5 JavaScript that would be executed within the user’s browser, potentially impacting the machine the browser is running on. CVE ID: CVE-2018-7831 CVSS v3.0 Base Score 5.4 | (Medium) | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L A CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability exists, which could allow an attacker to send a specially crafted URL to a currently authenticated web server user to execute a password change on the web server. CVE ID: CVE-2018-7830 CVSS v3.0 Base Score 5.3 | (Medium) | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L A CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting') vulnerability exists, where a denial of service can occur for ~1 minute by sending a specially crafted HTTP request. CVE ID: CVE-2018-7804 CVSS v3.0 Base Score 4.7 | (Medium) | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L A CWE-601: URL Redirection to Untrusted Site vulnerability exists, where a user clicking on a specially crafted link can be redirected to a URL of the attacker’s choosing. CVE ID: CVE-2018-7812 CVSS v3.0 Base Score 5.3 | (Medium) | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N A CWE-203: Information Exposure Through Discrepancy vulnerability exists, where the web server sends different responses in a way that exposes security-relevant information about the state of the product, such as whether a particular operation was successful or not. CVE ID: CVE-2018-7833 CVSS v3.0 Base Score 7.5 | (Medium) | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H A CWE-754: Improper Check for Unusual or Exceptional Conditions vulnerability exists, where an unauthenticated user can send a specially crafted XML data via a POST request to cause the web server to become unavailable. Remediation Schneider Electric recommends customers follow the instructions outlined in the Modicon Controllers Platform Cyber Security Reference Manual to install Modicon PLCs securely.
  • 3. Schneider Electric Security Notification 23-Nov-18 (08-Oct-19) Document Reference Number – SEVD-2018-327-01 V3.0 Page 3 of 5 Customers are advised that the web server is disabled by default. Because web services are only necessary for specific maintenance, configuration or monitoring activities, it is advised to disable web services all together during times when the services are not needed. Customers are also advised to: • Configure access control lists to restrict web server access to authorized IP addresses; • Protect access to Modicon products with network, industrial, and application firewalls. Fixes for CVE-2018-7833 and CVE-2018-7804 • The vulnerabilities are fixed for M340 controller in the version V3.20. The fix is available for download below: M340 V3.20 firmware BMXP3420302 and CL and H https://www.schneider- electric.com/en/download/document/BMXP3420302_Firmwares/ BMXP342020 and H https://www.schneider- electric.com/en/download/document/BMXP342020_Firmwares/ BMXP342000 https://www.schneider- electric.com/en/download/document/BMXP342000_Firmwares/ BMXP341000 and H https://www.schneider- electric.com/en/download/document/BMXP341000_Firmwares/ BMXP3420102 and CL https://www.schneider- electric.com/en/download/document/BMXP3420102_Firmwares/ General Security Recommendations We strongly recommend following industry cybersecurity best practices such as: • Locate control and safety system networks and remote devices behind firewalls, and isolate them from the business network. • Physical controls should be in place so that no unauthorized person would have access to the ICS and safety controllers, peripheral equipment or the ICS and safety networks. • All controllers should reside in locked cabinets and never be left in the “Program” mode. • All programming software should be kept in locked cabinets and should never be connected to any network other than the network for the devices that it is intended. • All methods of mobile data exchange with the isolated network such as CDs, USB drives, etc. should be scanned before use in the terminals or any node connected to these networks.
  • 4. Schneider Electric Security Notification 23-Nov-18 (08-Oct-19) Document Reference Number – SEVD-2018-327-01 V3.0 Page 4 of 5 • Laptops that have connected to any other network besides the intended network should never be allowed to connect to the safety or control networks without proper sanitation. • Minimize network exposure for all control system devices and/or systems, and ensure that they are not accessible from the Internet. • When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing that VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize that VPN is only as secure as the connected devices. Acknowledgements Schneider Electric would like to recognize the following researcher(s) for all their efforts related to identification and coordination of this vulnerability: CVE Researcher(s) Name CVE-2018-7809, CVE-2018-7810, CVE-2018-7830, CVE-2018-7831 Tenable, Inc. CVE-2018-7811 Tenable, Inc. and VAPT Team/C3i Center (IIT Kanpur, India) CVE-2018-7812 David Castro, Head of Red Team at Novared Spain CVE-2018-7804 Ismail Tasdelen CVE-2018-7833 Qingtang Zheng (CodeSafe Team of Legendsec at Qi'anxin Group) For More Information This document provides an overview of the identified vulnerability or vulnerabilities and actions required to mitigate. For more details and assistance on how to protect your installation, please contact your local Schneider Electric representative and/or Schneider Electric Industrial Cybersecurity Services. These organizations will be fully aware of this situation and can support you through the process. http://www2.schneider-electric.com/sites/corporate/en/support/cybersecurity/cybersecurity.page https://www.schneider-electric.com/en/work/services/field-services/industrial- automation/industrial-cybersecurity/industrial-cybersecurity.jsp Legal Disclaimer THIS DOCUMENT IS INTENDED TO HELP PROVIDE AN OVERVIEW OF THE IDENTIFIED SITUATION AND SUGGESTED MITIGATION ACTIONS, REMEDIATION, FIX, AND/OR GENERAL SECURITY RECOMMENDATIONS AND IS PROVIDED ON AN “AS-IS” BASIS WITHOUT WARRANTY OF ANY KIND. SCHNEIDER ELECTRIC
  • 5. Schneider Electric Security Notification 23-Nov-18 (08-Oct-19) Document Reference Number – SEVD-2018-327-01 V3.0 Page 5 of 5 DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL SCHNEIDER ELECTRIC BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF SCHNEIDER ELECTRIC HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. THE USE OF THIS NOTIFICATION, INFORMATION CONTAINED HEREIN, OR MATERIALS LINKED TO IT ARE AT YOUR OWN RISK. SCHNEIDER ELECTRIC RESERVES THE RIGHT TO UPDATE OR CHANGE THIS NOTIFICATION AT ANY TIME AND IN ITS SOLE DISCRETION. About Schneider Electric At Schneider, we believe access to energy and digital is a basic human right. We empower all to do more with less, ensuring Life Is On everywhere, for everyone, at every moment. We provide energy and automation digital solutions for efficiency and sustainability. We combine world-leading energy technologies, real-time automation, software and services into integrated solutions for Homes, Buildings, Data Centers, Infrastructure and Industries. We are committed to unleash the infinite possibilities of an open, global, innovative community that is passionate with our Meaningful Purpose, Inclusive and Empowered values. www.se.com Revision Control: Version 1 23-Nov-2018 Original Release Version 1.1 28-Nov-2018 CVSS Scores updated for CVE-2018-7811 (page 1) and CVE-2018-7810 (page 2) Version 2 13-Dec-2018 Added CVE-2018-7804, CVE-2018-7812, CVE-2018-7833 (page 2 and 3) Version 2.1 09-May-2019 Added researcher to acknowledgement section for CVE-2018- 7811(page 4) Version 2.2 11-Jun-2019 CVE-2018-7833 researcher acknowledgment updated Version 3.0 08-Oct-2019 CVE-2018-7833 - Fix available for M340 controller CVE-2018-7804 - Fix available for M340 controller (page 3) Product Security Office Digitally signed by Product Security Office Date: 2019.10.04 18:14:16 -04'00'