Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2018-7758 : Security Advisory and Response

Learn about CVE-2018-7758, a denial of service vulnerability affecting Schneider Electric's MiCOM Px4x, P540D Range, and Px4x Rejuvenated devices. Find out the impact, affected systems, exploitation mechanism, and mitigation steps.

Schneider Electric's MiCOM Px4x (excluding P540 range), MiCOM P540D Range, and MiCOM Px4x Rejuvenated are vulnerable to a denial of service issue when TCP/IP open requests are received on port 20000.

Understanding CVE-2018-7758

This CVE involves a denial of service vulnerability affecting specific Schneider Electric devices.

What is CVE-2018-7758?

CVE-2018-7758 is a vulnerability that can lead to a denial of service on Schneider Electric's MiCOM Px4x (excluding P540 range), MiCOM P540D Range, and MiCOM Px4x Rejuvenated devices.

The Impact of CVE-2018-7758

The vulnerability can result in network communication loss when TCP/IP open requests are received on port 20000, and an older TCP/IP session with the same IP address and port number remains open.

Technical Details of CVE-2018-7758

This section provides more technical insights into the vulnerability.

Vulnerability Description

The vulnerability allows attackers to disrupt network communication by exploiting TCP/IP open requests on port 20000.

Affected Systems and Versions

        Product: MiCOM P540D Range with Legacy Ethernet Board
        Vendor: Schneider Electric SE
        Versions: MiCOM P540D Range with Legacy Ethernet Board, MiCOM Px4x with Legacy Ethernet Board, MiCOM Px4x Rejuvenated

Exploitation Mechanism

The issue arises when TCP/IP open requests are received on port 20000 (DNP3oE), and an older TCP/IP session with the same IP address and port number remains open, causing network communication to be lost.

Mitigation and Prevention

Protecting systems from CVE-2018-7758 is crucial to maintaining network security.

Immediate Steps to Take

        Apply vendor-provided patches or updates promptly.
        Monitor network traffic for any suspicious activity on port 20000.
        Implement network segmentation to limit the impact of potential attacks.

Long-Term Security Practices

        Regularly update and patch all network-connected devices.
        Conduct security assessments and penetration testing to identify vulnerabilities.
        Educate users and IT staff on best practices for network security.

Patching and Updates

Schneider Electric may release patches or updates to address the vulnerability. Stay informed about security advisories and apply patches as soon as they are available.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now