2022-11-22 14:00:36 +00:00
{
2023-08-09 14:00:35 +00:00
"data_version" : "4.0" ,
"data_type" : "CVE" ,
"data_format" : "MITRE" ,
2022-11-22 14:00:36 +00:00
"CVE_data_meta" : {
"ID" : "CVE-2022-45789" ,
2023-08-09 14:00:35 +00:00
"ASSIGNER" : "cybersecurity@schneider-electric.com" ,
2023-01-30 17:57:20 +05:30
"STATE" : "PUBLIC"
2022-11-22 14:00:36 +00:00
} ,
2023-08-09 14:00:35 +00:00
"description" : {
"description_data" : [
{
"lang" : "eng" ,
"value" : "A CWE-294: Authentication Bypass by Capture-replay vulnerability exists that could cause execution of unauthorized Modbus functions on the controller when hijacking an authenticated Modbus session. Affected Products: EcoStruxure Control Expert (All Versions), EcoStruxure Process Expert (All Versions), Modicon M340 CPU - part numbers BMXP34* (All Versions), Modicon M580 CPU - part numbers BMEP* and BMEH* (All Versions), Modicon M580 CPU Safety - part numbers BMEP58*S and BMEH58*S (All Versions)\n\n"
}
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "CWE-294: Authentication Bypass by Capture-Replay" ,
"cweId" : "CWE-294"
}
]
}
]
} ,
2023-01-30 17:57:20 +05:30
"affects" : {
"vendor" : {
"vendor_data" : [
{
2023-08-09 14:00:35 +00:00
"vendor_name" : "Schneider Electric" ,
2023-01-30 17:57:20 +05:30
"product" : {
"product_data" : [
{
2023-08-09 14:00:35 +00:00
"product_name" : "EcoStruxure Control Expert " ,
2023-01-30 17:57:20 +05:30
"version" : {
"version_data" : [
{
"version_affected" : "=" ,
2023-02-02 16:44:33 -08:00
"version_value" : "All Versions"
2023-01-30 17:57:20 +05:30
}
]
}
} ,
{
2023-08-09 14:00:35 +00:00
"product_name" : "EcoStruxure Process Expert" ,
2023-01-30 17:57:20 +05:30
"version" : {
"version_data" : [
{
2023-08-09 14:00:35 +00:00
"version_affected" : "=" ,
"version_value" : "All Versions"
2023-01-30 17:57:20 +05:30
}
]
}
} ,
{
"product_name" : "Modicon M340 CPU (part numbers BMXP34*)" ,
"version" : {
"version_data" : [
{
"version_affected" : "=" ,
2023-02-02 16:44:33 -08:00
"version_value" : "All Versions"
2023-01-30 17:57:20 +05:30
}
]
}
} ,
{
2023-02-02 16:44:33 -08:00
"product_name" : "Modicon M580 CPU (part numbers BMEP* and BMEH*) " ,
2023-01-30 17:57:20 +05:30
"version" : {
"version_data" : [
{
"version_affected" : "=" ,
2023-02-02 16:44:33 -08:00
"version_value" : "All Versions"
2023-01-30 17:57:20 +05:30
}
]
}
} ,
{
"product_name" : "Modicon M580 CPU Safety (part numbers BMEP58*S and BMEH58*S)" ,
"version" : {
"version_data" : [
{
"version_affected" : "=" ,
2023-02-02 16:44:33 -08:00
"version_value" : "All Versions"
2023-01-30 17:57:20 +05:30
}
]
}
}
]
2023-08-09 14:00:35 +00:00
}
2023-01-30 17:57:20 +05:30
}
]
}
} ,
2023-08-09 14:00:35 +00:00
"references" : {
"reference_data" : [
2022-11-22 14:00:36 +00:00
{
2023-08-09 14:00:35 +00:00
"url" : "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-010-06&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-010-06_Modicon_Controllers_Security_Notification.pdf" ,
"refsource" : "MISC" ,
"name" : "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-010-06&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-010-06_Modicon_Controllers_Security_Notification.pdf"
2023-01-30 17:57:20 +05:30
}
]
} ,
"generator" : {
"engine" : "Vulnogram 0.0.9"
} ,
2023-08-09 14:00:35 +00:00
"source" : {
"discovery" : "UNKNOWN"
2023-01-30 17:57:20 +05:30
} ,
2023-08-09 14:00:35 +00:00
"impact" : {
"cvss" : [
2023-01-30 17:57:20 +05:30
{
2023-08-09 14:00:35 +00:00
"attackComplexity" : "HIGH" ,
"attackVector" : "NETWORK" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 8.1 ,
"baseSeverity" : "HIGH" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"privilegesRequired" : "NONE" ,
"scope" : "UNCHANGED" ,
"userInteraction" : "NONE" ,
"vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" ,
"version" : "3.1"
2023-01-30 17:57:20 +05:30
}
]
2022-11-22 14:00:36 +00:00
}
}