Schneider-Electric Modicon M221 Firmware 1.10.0.0

CPE Details

Schneider-Electric Modicon M221 Firmware 1.10.0.0
1.10.0.0
2019-04-17
14h20 +00:00
2022-01-31
18h54 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:o:schneider-electric:modicon_m221_firmware:1.10.0.0:*:*:*:*:*:*:*

Informations

Vendor

schneider-electric

Product

modicon_m221_firmware

Version

1.10.0.0

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2020-28214 2020-12-10 23h51 +00:00 A CWE-760: Use of a One-Way Hash with a Predictable Salt vulnerability exists in Modicon M221 (all references, all versions), that could allow an attacker to pre-compute the hash value using dictionary attack technique such as rainbow tables, effectively disabling the protection that an unpredictable salt would provide.
5.5
Moyen
CVE-2020-7489 2020-04-22 16h15 +00:00 A CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') vulnerability exists on EcoStruxure Machine Expert – Basic or SoMachine Basic programming software (versions in security notification). The result of this vulnerability, DLL substitution, could allow the transference of malicious code to the controller.
9.8
Critique
CVE-2019-6820 2019-05-22 17h40 +00:00 A CWE-306: Missing Authentication for Critical Function vulnerability exists which could cause a modification of device IP configuration (IP address, network mask and gateway IP address) when a specific Ethernet frame is received in all versions of: Modicon M100, Modicon M200, Modicon M221, ATV IMC drive controller, Modicon M241, Modicon M251, Modicon M258, Modicon LMC058, Modicon LMC078, PacDrive Eco ,PacDrive Pro, PacDrive Pro2
8.2
Haute