Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2022-37301 Explained : Impact and Mitigation

Learn about CVE-2022-37301, an Integer Underflow vulnerability affecting Schneider Electric products, leading to denial of service. Follow mitigation steps to secure your systems.

A CWE-191: Integer Underflow (Wrap or Wraparound) vulnerability exists that could cause a denial of service of the controller due to memory access violations when using the Modbus TCP protocol in Schneider Electric products.

Understanding CVE-2022-37301

This CVE identifies an Integer Underflow vulnerability in Schneider Electric products that could lead to denial of service.

What is CVE-2022-37301?

CVE-2022-37301 is a CWE-191: Integer Underflow (Wrap or Wraparound) vulnerability that affects Modicon M340 CPU, Modicon M580 CPU, Legacy Modicon Quantum/Premium, Modicon Momentum MDI, and Modicon MC80 products by Schneider Electric.

The Impact of CVE-2022-37301

This vulnerability could result in denial of service for the controller due to memory access violations when the affected products are using the Modbus TCP protocol.

Technical Details of CVE-2022-37301

Vulnerability Description

The vulnerability is classified as CWE-191 and involves an Integer Underflow issue that can trigger a denial of service condition in the affected Schneider Electric products.

Affected Systems and Versions

        Modicon M340 CPU (part numbers BMXP34*): Versions up to and including 3.40
        Modicon M580 CPU (part numbers BMEP* and BMEH*): Versions up to and including 3.22
        Legacy Modicon Quantum/Premium: All Versions
        Modicon Momentum MDI (171CBU*): All Versions
        Modicon MC80 (BMKC80): Versions up to and including 1.7

Exploitation Mechanism

The vulnerability can be exploited by leveraging the Modbus TCP protocol, leading to memory access violations and subsequent denial of service.

Mitigation and Prevention

Immediate Steps to Take

Ensure proper network segmentation, access controls, and monitoring to mitigate the risk of exploitation. Apply vendor-supplied patches and updates promptly.

Long-Term Security Practices

Regularly update and patch affected systems, conduct security assessments, and train employees on best security practices to prevent similar vulnerabilities.

Patching and Updates

Refer to vendor recommendations and apply the necessary security patches provided by Schneider Electric to address CVE-2022-37301.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now