SEVD-2018-228-01 Modicon M221

Document preview
File info: application/pdf · 3 pages · 216.85KB

SEVD-2018-228-01 Modicon M221

security notification

Patched bug could have allowed attackers to remotely disconnect PLC devices from ICS systems | SC Media In a company

Full PDF Document

Loading PDF...
Download PDF

If the inline viewer fails, it will open the original document in compatibility mode automatically. You can also open the file directly.

Extracted Text

21-Aug-2018

Important Security Notification
Security Notification � Modicon M221

Overview

Schneider Electric has become aware of a vulnerability in the Modicon M221 product.

Vulnerability Overview

The vulnerability identified is Improper Check for Unusual or Exceptional Conditions.

Product(s) Affected

The product(s) affected: � Modicon M221, all references, all versions prior to firmware V1.6.2.0.

Vulnerability Details

CVE ID: CVE-2018-7789 The vulnerability allows unauthorized users to remotely reboot Modicon M221 using crafted programing protocol frames. Overall CVSS Score: 4.8 (CVSS V3 Vector): CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L

Mitigation

A fix for this vulnerability is implemented in Modicon M221 Firmware V1.6.2.0, delivered within SoMachine Basic V1.6 SP2, which is available for download below or by using Schneider Electric Software Update tool:

21-Aug-2018

Document Reference Number � SEVD-2018-233-01

Page 1 of 3

Important Security Notification
https://www.schneider-electric.com/en/download/document/SoMachineBasicV1.6SP2/
As a temporary mitigation, Modicon M221 users should take the following measures:
� Set up a firewall blocking all remote/external access to port 502. � Within Modicon M221 application, user must disable all unused protocols, especially
Programming protocol, as described in section "Configuring Ethernet Network" of SoMachine Basic online help. This will prevent remote programming of the M221 PLCS

Acknowledgements

Schneider Electric would like to thank Yehonatan Kfir of Radiflow for all his efforts related to identification and coordination of this vulnerability.

For More Information

This document is intended to help provide an overview of the identified situation and actions required to mitigate it. To obtain full details on the issues and assistance on how to protect your installation, please contact your local Schneider Electric representative. These organizations will be fully aware of the situation and can support you through the process.
For further information related to cybersecurity in Schneider Electric's products, please visit the company's cybersecurity web page:
http://www2.schneider-electric.com/sites/corporate/en/support/cybersecurity/cybersecurity.page
THIS DOCUMENT IS INTENDED TO HELP PROVIDE AN OVERVIEW OF THE IDENTIFIED SITUATION AND MITIGATION ACTIONS AND IS NOT INTENDED AS A WARRANTY OR GUARANTEE OF ANY KIND, INCLUDING WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. THE USE OF THIS NOTIFICATION, INFORMATION CONTAINED HEREIN, OR MATERIALS LINKED TO IT ARE AT YOUR OWN RISK. WE RESERVE THE RIGHT TO UPDATE OR CHANGE THIS INFORMATION AT ANY TIME AND IN OUR SOLE DISCRETION.

About Schneider Electric Schneider Electric is leading the Digital Transformation of Energy Management and Automation in Homes, Buildings, Data Centers, Infrastructure and Industries.
With global presence in over 100 countries, Schneider is the undisputable leader in Power Management � Medium Voltage, Low Voltage and Secure Power, and in Automation Systems. We provide integrated efficiency solutions, combining energy, automation and software.
In our global Ecosystem, we collaborate with the largest Partner, Integrator and Developer Community on our Open Platform to deliver real-time control and operational efficiency.
We believe that great people and partners make Schneider a great company and that our commitment to Innovation, Diversity and Sustainability ensures that Life Is On everywhere, for everyone and at every moment.

21-Aug-2018

Document Reference Number � SEVD-2018-233-01

Page 2 of 3

Important Security Notification

www.schneider-electric.com
Revision Control:
Version 1 21 Aug 2018
Product Security Office

Original Release
Digitally signed by Product Security Office DN: cn=Product Security Office, o=Schneider Electric, ou=Global Technology, email=cybersecurity@schneiderelectric.com, c=US Date: 2018.08.22 06:58:12 -04'00'

21-Aug-2018

Document Reference Number � SEVD-2018-233-01

Page 3 of 3