CVE-2017-9627
https://notcve.org/view.php?id=CVE-2017-9627
An Uncontrolled Resource Consumption issue was discovered in Schneider Electric Wonderware ArchestrA Logger, versions 2017.426.2307.1 and prior. The uncontrolled resource consumption vulnerability could allow an attacker to exhaust the memory resources of the machine, causing a denial of service. Un problema de consumo incontrolable de recursos fue descubierto en Schneider Electric Wonderware ArchestrA Logger, en su versión 2017.426.2307.1 y anteriores. La vulnerabilidad de consumo incontrolable de recursos podía permitir a un atacante agotar la fuente de memoria de la máquina causando una denegación de servicio. • http://software.schneider-electric.com/pdf/security-bulletin/lfsec00000116 http://www.securityfocus.com/bid/99488 http://www.securitytracker.com/id/1038836 https://ics-cert.us-cert.gov/advisories/ICSA-17-187-04 • CWE-400: Uncontrolled Resource Consumption •
CVE-2017-6032
https://notcve.org/view.php?id=CVE-2017-6032
A Violation of Secure Design Principles issue was discovered in Schneider Electric Modicon Modbus Protocol. The Modicon Modbus protocol has a session-related weakness making it susceptible to brute-force attacks. Se ha descubierto un problema de violación de principios de diseño seguro en el protocolo Modicon Modbus, de Schneider Electric. El protocolo Modicon Modbus tiene una debilidad relacionada con la sesión que lo hace susceptible a ataques de fuerza bruta. • http://www.securityfocus.com/bid/97562 https://ics-cert.us-cert.gov/advisories/ICSA-17-101-01 • CWE-358: Improperly Implemented Security Check for Standard CWE-657: Violation of Secure Design Principles •
CVE-2017-6034
https://notcve.org/view.php?id=CVE-2017-6034
An Authentication Bypass by Capture-Replay issue was discovered in Schneider Electric Modicon Modbus Protocol. Sensitive information is transmitted in cleartext in the Modicon Modbus protocol, which may allow an attacker to replay the following commands: run, stop, upload, and download. Se ha descubierto un problema de omisión de autenticación por captura por reproducción en el protocolo Modicon Modbus, de Schneider Electric. Se transmite información sensible en texto claro en el protocolo Modicon Modbus, lo que podría permitir que un atacante reproduzca los siguientes comandos: run, stop, upload y download. • http://www.securityfocus.com/bid/97562 https://ics-cert.us-cert.gov/advisories/ICSA-17-101-01 • CWE-287: Improper Authentication CWE-294: Authentication Bypass by Capture-replay •
CVE-2017-6026 – Schneider Electric PLC - Session Calculation Authentication Bypass
https://notcve.org/view.php?id=CVE-2017-6026
A Use of Insufficiently Random Values issue was discovered in Schneider Electric Modicon PLCs Modicon M241, firmware versions prior to Version 4.0.5.11, and Modicon M251, firmware versions prior to Version 4.0.5.11. The session numbers generated by the web application are lacking randomization and are shared between several users. This may allow a current session to be compromised. Un problema de uso de valores aleatorios insuficientes fue encontrado en Schneider Electric Modicon PLCs Modicon M241, versiones de firmware anteriores a 4.0.5.11, y Modicon M251, versiones de firmware anteriores a 4.0.5.11. Los números de sesión generados por la aplicación web carecen de aleatorización y son compartidos entre varios usuarios. • https://www.exploit-db.com/exploits/45918 http://www.securityfocus.com/bid/97254 https://ics-cert.us-cert.gov/advisories/ICSA-17-089-02 • CWE-330: Use of Insufficiently Random Values •
CVE-2017-6028
https://notcve.org/view.php?id=CVE-2017-6028
An Insufficiently Protected Credentials issue was discovered in Schneider Electric Modicon PLCs Modicon M241, all firmware versions, and Modicon M251, all firmware versions. Log-in credentials are sent over the network with Base64 encoding leaving them susceptible to sniffing. Sniffed credentials could then be used to log into the web application. Un problema de credenciales protegidas insuficientemente fue detectado en PLCs Modicon M241, y Modicon M251 de Schneider Electric, en todas las versiones de firmware. Las credenciales de inicio de sesión se envían por medio de la red con codificación Base64 dejándolas susceptibles a ser espiadas. • http://www.securityfocus.com/bid/97254 https://ics-cert.us-cert.gov/advisories/ICSA-17-089-02 • CWE-522: Insufficiently Protected Credentials •