Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2017-6028 : Security Advisory and Response

Discover the Insufficiently Protected Credentials issue in Schneider Electric Modicon PLCs Modicon M241 and M251. Learn about the impact, affected systems, and mitigation steps.

A security vulnerability has been found in Schneider Electric Modicon PLCs Modicon M241 and Modicon M251, allowing unauthorized access to the web application.

Understanding CVE-2017-6028

This CVE identifies an Insufficiently Protected Credentials issue in Schneider Electric Modicon PLCs.

What is CVE-2017-6028?

The vulnerability arises from the way log-in credentials are transmitted over the network using Base64 encoding, making them vulnerable to interception by malicious actors.

The Impact of CVE-2017-6028

If exploited, attackers can intercept credentials and gain unauthorized access to the web application, potentially leading to further compromise of the system.

Technical Details of CVE-2017-6028

This section provides more technical insights into the vulnerability.

Vulnerability Description

The issue affects all firmware versions of Schneider Electric Modicon PLCs Modicon M241 and Modicon M251, where log-in credentials are inadequately protected during transmission.

Affected Systems and Versions

        Product: Schneider Electric Modicon PLCs
        Versions: All firmware versions

Exploitation Mechanism

        Credentials are sent over the network using Base64 encoding
        Base64 encoding makes credentials susceptible to sniffing
        Sniffed credentials can be used to gain unauthorized access to the web application

Mitigation and Prevention

Protecting systems from CVE-2017-6028 is crucial to prevent unauthorized access and potential system compromise.

Immediate Steps to Take

        Implement network segmentation to restrict access to critical systems
        Monitor network traffic for any unauthorized access attempts
        Change default credentials and use strong, unique passwords

Long-Term Security Practices

        Regularly update firmware and security patches for PLCs
        Conduct security training for personnel to raise awareness of credential protection

Patching and Updates

        Apply patches provided by Schneider Electric to address the vulnerability
        Stay informed about security advisories and updates from the vendor

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now